Laserfiche WebLink
<br />Professional Services Provisional Agreement <br />Page 12 <br />25.2 The Contractor shall protect and maintain all Confidential Information gained <br />by reason of this Provisional Agreement against unauthorized use, access, <br />disclosure, modification or loss. This duty requires the Contractor to employ <br />reasonable security measures, which include restricting access to the <br />Confidential Information by: <br /> <br />25.2.1 Allowing access only to staff that have an authorized business <br />requirement to view the confidential information. <br /> <br />25.2.2 Physically securing any computers, documents, or other media <br />containing the Confidential Information. <br /> <br />25.2.3 Ensure the security of Confidential Information transmitted via fax <br />(facsimile) by verifying the recipient phone number to prevent <br />accidental transmittal of Confidential Information to unauthorized <br />persons. <br /> <br />25.2.4 When transporting six (6) to one hundred forty nine (149) records <br />containing Confidential Information outside a Secure Area, do one or <br />more of the following as appropriate: <br /> <br />25.2.4(1) Use a Trusted System <br />. <br />25.2.4(2) Encrypt the Confidential Information, including: <br /> <br />25.2.4(2)(i) Email and/or email attachments. <br /> <br />25.2.4(2)(ii) Confidential Information when it is stored on <br />portable devices or media, including but not limited to <br />laptop computers and flash memory devices. <br /> <br />25.2.5 When transporting one hundred fifty (150) records or more containing <br />Confidential Information outside a Secure Area refer to the <br />requirements in Attachment D, Exhibit A: Data Security Requirements. <br /> <br />25.2.6 Send paper documents containing Confidential Information via a <br />Trusted System <br /> <br />25.3 To the extent allowed by law, at the end of the Provisional Agreement term, <br />or when no longer needed, the parties shall return Confidential Information or <br />certify in writing the destruction of Confidential Information upon written <br />request by the other party. <br />