Laserfiche WebLink
<br /> <br />Attachment D - Permissible Use Requirements <br />In addition to Permissible Use limitations and requirements specific to Data imposed by the Driver <br />Protection Privacy Act (DPPA, 18 USC Ch. 123), and RCW 46.12.630-635, Licensee must comply with <br />the following requirements: <br /> <br />1. DATA USE <br />Licensee must institute and maintain written policies and procedures to ensure Confidential Information is <br />only used as authorized herein. At a minimum, the policies and procedures will include training <br />requirements for all personnel with access to Confidential Information on the Permissible Use(s) of <br />Confidential Information. Licensee must be capable of demonstrating the training and education was <br />delivered to all applicable personnel. <br /> <br />2. DEMONSTRATE PERMISSIBLE USE <br />Licensee at all times must be able to verify its use(s) of the Confidential Information is in accordance with <br />the limited Permissible Uses established in the Agreement. This requirement applies at all times <br />regardless of changes in staff or other personnel. It is not a defense that certain uses may be consistent <br />with other Acts, such as the DPPA, if such acts, or portions of such acts, are not fully consistent with this <br />Agreement. It is also not a defense that the improper use was due to a request from any law <br />enforcement agency. <br /> <br />3. ACCESS <br />For every commercial product Licensee makes available to Subrecipients for the purpose of obtaining <br />Confidential Information, Licensee must provide DOL one active and valid login credential on Licensee’s <br />product as an authorized user at no cost to DOL for the duration of the period Licensee receives data. <br />Access is limited to searching DOL employees with prior written consent. Licensee will not be charged for <br />such access and Licensee shall not pay DOL for those inquiries. <br /> <br />4. SECURE USE <br />Licensee must maintain and support administrative, technical or physical methods used to monitor <br />compliance with the Permissible Use(s) authorized in this Agreement across all Licensee business <br />practices, including any Subrecipients. Methods may include, but are not limited to, any of the following: <br />a) View only access to Confidential Information <br />b) System limitations or controls <br />c) Use of confidentiality agreements executed by all personnel with access to Confidential <br />Information <br /> <br />