Laserfiche WebLink
Standards and Technology (NIST)-approved methods. Certificates of destruction shall be <br />provided to the Purchasing Entity. <br />8. Background Checks: <br />a. Upon the request of the Purchasing Entity, the Contractor shall conduct criminal <br />background checks and not utilize any staff, including subcontractors, to fulfill the <br />obligations of the Master Agreement who have been convicted of any crime of <br />dishonesty, including but not limited to criminal fraud, or otherwise convicted of any <br />felony or misdemeanor offense for which incarceration for up to 1 year is an authorized <br />penalty. The Contractor shall promote and maintain an awareness of the importance of <br />securing the Purchasing Entity's information among the Contractor's employees and <br />agents. <br />b. The Contractor and the Purchasing Entity recognize that security responsibilities are <br />shared. The Contractor is responsible for providing a secure infrastructure. The <br />Purchasing Entity is responsible for its secure guest operating system, firewalls and other <br />logs captured within the guest operating system. Specific shared responsibilities are <br />identified within the SLA. <br />c. If any of the stated personnel providing services under a Participating Addendum is not <br />acceptable to the Purchasing Entity in its sole opinion as a result of the background or <br />criminal history investigation, the Purchasing Entity, in its' sole option shall have the right <br />to either (1) request immediate replacement of the person, or (2) immediately terminate <br />the Participating Addendum and any related service agreement. <br />9. Access to Security Logs and Reports: <br />a. The Contractor shall provide reports on a schedule specified in the SLA to the Purchasing <br />Entity in a format as specified in the SLA and agreed to by both the Contractor and the <br />Purchasing Entity. Reports will include latency statistics, user access, user access IP address, <br />user access history and security logs for all Purchasing Entity files related to the Master <br />Agreement, Participating Addendum, or SLA. <br />b. The Contractor and the Purchasing Entity recognize that security responsibilities are <br />shared. The Contractor is responsible for providing a secure infrastructure. The <br />Purchasing Entity is responsible for its secure guest operating system, firewalls and other <br />logs captured within the guest operating system. Specific shared responsibilities are <br />identified within the SLA. <br />10. Contract Audit: The Contractor shall allow the Purchasing Entity to audit conformance to the <br />Master Agreement terms. The Purchasing Entity may perform this audit or contract with a third <br />party at its discretion and at the Purchasing Entity's expense. <br />11. Data Center Audit: The Contractor shall perform an independent audit of its data centers at <br />least annually at its expense, and provide an unredacted version of the audit report upon <br />