Laserfiche WebLink
security measures, which include restricting access to the Confidential <br />Information by: <br />25.2.1 Allowing access only to staff that have an authorized business <br />requirement to view the confidential information. <br />25.2.2 Physically securing any computers, documents, or other media <br />containing the Confidential Information. <br />25.2.3 Ensure the security of Confidential Information transmitted via fax <br />(facsimile) by verifying the recipient phone number to prevent <br />accidental transmittal of Confidential Information to unauthorized <br />persons. <br />25.2.4 When transporting six (6) to one hundred forty nine (149) records <br />containing Confidential Information outside a Secure Area, do one or <br />more of the following as appropriate: <br />25.2.4(1) Use a Trusted System <br />25.2.4(2) Encrypt the Confidential Information, including: <br />25.2.4(2)(i) Email and/or email attachments. <br />25.2.4(2)(ii) Confidential Information when it is stored <br />on portable devices or media, including but not limited <br />to laptop computers and flash memory devices. <br />25.2.5 When transporting one hundred fifty (150) records or more containing <br />Confidential Information outside a Secure Area refer to the <br />requirements in Attachment D, Exhibit A: Data Security <br />Requirements. <br />25.2.6 Send paper documents containing Confidential Information via a <br />Trusted System <br />25.3 To the extent allowed by law, at the end of the Agreement term, or when no <br />longer needed, the parties shall return Confidential Information or certify in <br />writing the destruction of Confidential Information upon written request by <br />the other party. <br />25.4 Paper documents with Confidential Information may be recycled through a <br />contracted firm, provided the contract with the recycler specifies that the <br />confidentiality of the information will be protected, and the information <br />Professional Services Agreement <br />Page 12 <br />