Title: Data Protection Contractual Language  
Author: Unknown User (dlwoodbe) Jan 06, 2014
Last Changed by: Valerie Vogel Feb 02, 2017
Tiny Link: (useful for email) https://spaces.at.internet2.edu/x/awEDAw
Export As: Word · PDF  
Incoming Links
Higher Ed Information Security Guide (7)
    Page: Data Incident Notification Toolkit
    Page: Cloud Computing Security
    Page: Toolkits
    Page: Compliance Management
    Page: Security Program Development
    Page: Confidential Data Handling Blueprint
    Home page: Home
Outgoing Links
External Links (12)
    policy.usc.edu/info-security/
    www.sharedassessments.org/
    www.ucop.edu/procurement-services/_files/appendix-data-secu…
    https://library.educause.edu/resources/2016/10/higher-educa…
    Google:
    counsel.cua.edu/ferpa/
    www.ssae16.org/what-is-ssae-16/introduction-to-ssae-16.html
    mailto:security-council@educause.edu?subject=Data Protectio…
    creativecommons.org/licenses/by-nc-sa/4.0/
    www.princeton.edu/oit/it-policies/it-security-policy/
    https://www.educause.edu/discuss/policy-discussion-group
    www.it.northwestern.edu/policies/contractlanguage.html
Higher Ed Information Security Guide (34)     Page: Intellectual Property Protection
    Page: Appendix 2
    Page: Contract Monitoring
    Page: federal, state, or local law, regulation, or contractual obligation
    Page: Assistance With Litigation
    Page: References to Third Party Compliance With Applicable Federal, State, and Local Laws and Regulatory Requirements
    Page: Vendor Selection
    Page: common security items
    Page: Separate Document Addressing Data Protection
    Page: Credit Card Data
    Page: References to Third Party Compliance With University Policies, Standards, Guidelines, And Procedures
    Page: Security Incident Investigations
    Page: State Breach Notification Laws
    Page: Financial Information
    Page: special conditions
    Page: Data Sharing
    Page: Data Transmission (including Encryption)
    Page: Student Education Records (FERPA)
    Page: Security Audits and Scans (Independent Verification)
    Page: Data Definition
    Page: Protected Health Information (HIPAA)
    Page: General Data Protection
    Page: Core Language
    Page: Data Protection Contractual Language
    Page: Indemnification as a Result of Security Breach
    Page: Data Protection After Contract Termination
    Page: Use of Data
    Page: Appendix 1
    Page: Contract Negotiation
    Page: Category 1
    Page: Category 2
    Page: Notification of Security Incidents
    Page: Category 3
    Page: Category 4