22.08.2013 Views

ECEAP-Head Start Data Share - Snohomish County

ECEAP-Head Start Data Share - Snohomish County

ECEAP-Head Start Data Share - Snohomish County

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

a) Confidential Information provided by DEL will remain the property of DEL and will be returned<br />

to DEL or destroyed when the work for which the information was required has been<br />

completed.<br />

Confidential Information provided by DEL will be dooessed and used only for the purposes of<br />

carrying out activities pursuant to this Contract.<br />

c) Contractor shall not use the information provided for any purpose not specifically authorized<br />

under this Contract.<br />

d) The information provided by DEL will not be duplicated or re-disclosed without the written<br />

authority of DEL.<br />

e) The Contractor shall protect the confidentiality of the information pursuant to this Contract by<br />

adopting and implementing effective physical, electronic, and managerial safeguards against<br />

unauthorized access to and unauthorized disclosure of such information.<br />

f) If the data and analyses generated by the data recipient contain confidential information about<br />

DEL clients, then any and all reports utilizing this data shall be subject to review and approval<br />

by the providing party prior to publication in any medium or presentation in any forum.<br />

8. SAFEGUARDS AGAINST UNAUTHORIZED ACCESS AND REDISCLOSURE<br />

Contractor shall exercise due care to protect all confidential data from unauthorized physical and<br />

electronic access. Both parties shall establish and implement the following minimum physical,<br />

electronic and managerial safeguards for maintaining the confidentiality of information provided by<br />

either party pursuant to this Contract:<br />

a) Access to the information provided by DEL will be restricted to only those authorized staff,<br />

officials, and agents of the parties who need it to perform their official duties in the<br />

performance of the work requiring access to the information as detailed in the Purpose of this<br />

Contract.<br />

b) The Contractor will store the information in an area that is safe from access by unauthorized<br />

persons during duty hours as well as non-duty hours or when not in use.<br />

c) Unless specifically authorized within the Special Terms and Conditions of the Contract, the<br />

Contractor will not store any confidential or sensitive data on portable electronic devices or<br />

media, including, but not limited to laptops, handhelds/PDAs, Ultramobile PCs, flash memory<br />

devices, floppy discs, optical discs (CDs/DVDs), and portable hard disks.<br />

d) The Contractor will protect the information in a manner that prevents unauthorized persons<br />

from retrieving the information by means of computer, remote terminal or other means.<br />

e) The Contractor shall take precautions to ensure that only authorized personnel and agents are<br />

given access to on-line files containing Confidential Information.<br />

f) The Contractor shall instruct all personnel with access to the Confidential Information<br />

regarding the confidential nature of the information, the requirements of the Limitation on<br />

Access and Use and Safeguards Against Unauthorized Access and Re-Disclosure clauses of<br />

this Contract, and the sanctions specified in federal and state laws against unauthorized<br />

disclosure of information covered by this Contract.<br />

g), The Contractor shall take due care and take reasonable precautions to DEL's confidential data<br />

from unauthorized physical and electronic access. Both parties will strive to meet or exceed<br />

the requirements of the Information Services Board (ISB) policies and standards for data<br />

security and access controls to ensure the confidentiality, availability, and integrity of all data<br />

accessed.<br />

9. NOTIFICATION OF COMPROMISE OR POTENTIAL COMPROMISE<br />

If the Contractor or its agents detect a compromise or potential compromise in the information<br />

technology security for this data such that confidential information may have been accessed or<br />

disclosed without proper authorization, the Contractor will give notice within one (1) working day of<br />

discovery to the DEL of such compromise or potential compromise and the compromised party will<br />

Page 2 of 6 <strong>Data</strong> Access and Management Contract between DEL and CONTRACTOR

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!