Laserfiche WebLink
the Subrecipient shall immediately report report the loss or breach to the Pass- <br /> through Entity, If the Pass-through Entity determines that notice to the <br /> Individuals whose data has been lout,or breached is appropriate,the Subrecipient <br /> r will bear any end all costs associated with the notice or en mitigation selected <br /> by the Pass-through Entity. These costs include,but are not limited to,staff <br /> time, material costs, postage,media announcements,and other identifiable costs. <br /> associated with the breach or loss of data. <br /> • <br /> f.The Subrecipient shall provide for the management and control of physical access to <br /> information assets(Including personal computer systems,computer terminals,mobile <br /> computing devices,and various electronic storage media)used in performance of this <br /> .Subgrant, This shall include,but is,not limited to,security measures to physically <br /> protect data,systems,and workstations from unauthorized access and malicious • <br /> activity;the prevention,detection,and suppression of fires;and the prevention, <br /> detection,and minimization of water damage, <br /> g.At no time will confidential data obtained pursuant to this agreement be placed en a <br /> rnebfie-oernputing-dovioe,yr on any form of removal e�'Cleattonic storage media of any <br /> kind unless the data are fully encrypted. <br /> h. Each party shall provide Its employees with access to confidential Information with <br /> written instructions fully disclosing and explaining the penalties for unauthorized <br /> use or disclosure of confidential Information found in Section 1798,55 of the • 1 <br /> California Civil Code, Section$02 of the California Penal Code,Section 2111 of the <br /> California Unemployment Insurance Code, Section 10850 of the California Welfare and <br /> Institutions Code and other applicable local,state and federal Iowa. <br /> i.Each party shall (where it is appropriate)store and process Information in <br /> electronic format,in such a way that unauthorized persons cannot.reasonably retrieve <br /> the information by means of a computer. <br /> J.All Subrecipient staff and subcontractors that are.provided access to any data <br /> systems of the Pass-through.Entity,excluding CaiJOBS, are required to complete <br /> and sign an Employee Confidentiality Statement(DE 7410). <br /> k, Each party shall promptly return to the other party confidential information when <br /> w. Its use ends,or destroy the confidential information utilizing an approved method of <br /> destroying confidential information:shredding,burning,or'certified or witnessed <br /> destruction, .Magnetic media are to be degaussed or returned to the Other party. <br /> I. If the Pass-through Entity or Subrecipient enters Into an agreement with a third <br /> party to provide WIOA services,the Pass-through Entity or Subrecipient agrees to <br /> Include these data and security and confidentiality requirements in the agreement <br /> with thatthird party.in no event shall said information be disclosed to any' <br /> individual outside of that third party's.authorized staff, subcontractor(s),.service <br /> providers,or employees. <br /> m.The Subreclplent may,in <br /> its operation of the America's Job Center of California <br /> (AJCC),permit an AJCC Operator to enter Into a subcontract to manage confidential <br /> information.This subcontract may allow an individual to register for resume <br /> distribution services at the same time the individual enrolls In CaIJOBS. <br /> Subrecipient shall ensure that all such subcontracts comply with the intellectual <br /> property requirements of this subgrant agreement,the,confidentiality requirements of <br /> this subgrant agreement and any other terms of this subgrant agreement that may be <br /> applicable. In addition,the following requirements must.be Included in the <br /> subcontracts: <br /> 1. All client information submitted over the Internet to t the subcontractor's <br /> databases must,be protected,at a minimum, by 128-bit Secure Socket Layer(S.51.) <br /> encryption.Clients'social security numbers must be stored in a separate <br /> database within the subcontractor's network of servers,and protected by a <br /> flrewall and a secondary database server flrewall or AES data encryption. If a <br /> subcontractor receives client social security numbers or other confidential <br /> information in the course of business,for example a resume-distribution service <br /> that provides enrollment in CaIJOBS, social security numbers must be destroyed <br /> within two days after the client registers for CaIJOBS. if a subcontractor <br /> obtains confidential Information as an agent of the Subrecipient,the subcontract <br /> must speoiflcally state the purpose for the data collection and the term of <br /> records retention must be stated,and directly related,to the purpose and use of <br /> the Information. Social security numbers and other client specific information <br /> Page tent 16 <br />