Common use of Information System Activity Review Clause in Contracts

Information System Activity Review. Business Associate will regularly capture and review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Business Associate will employ Security Event and Incident Monitoring (▇▇▇▇) technology such as intrusion detection and prevention systems on IT systems that create, receive, transmit, transact, or store PHI and will review and analyze activity records for indications of inappropriate or unusual activities daily. Business Associate will retain the activity logs for a minimum of six (6) years. Business Associate shall make such logs available to ▇▇▇▇▇▇, upon request, as ▇▇▇▇▇▇ reasonably determines is necessary to investigate a potential unauthorized Use or Disclosure.

Appears in 2 contracts

Sources: Business Associate Agreement, Business Associate Agreement

Information System Activity Review. Business Associate will regularly capture and review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Business Associate will employ Security Event and Incident Monitoring (▇▇▇▇) technology such as intrusion detection and prevention systems on IT systems that create, receive, transmit, transact, or store PHI and will review and analyze activity records for indications of inappropriate or unusual activities daily. Business Associate will retain the activity logs for a minimum of six (6) years. Business Associate shall make such logs available to ▇▇▇▇▇▇Sutter, upon request, as ▇▇▇▇▇▇ Sutter reasonably determines is necessary to investigate a potential unauthorized Use or Disclosure.

Appears in 1 contract

Sources: Business Associate Agreement

Information System Activity Review. Business Associate will regularly capture and review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Business Associate will employ Security Event and Incident Monitoring (▇▇▇▇) technology such as intrusion detection and prevention systems on IT systems that create, receive, transmit, transact, or store PHI and will review and analyze activity records for indications of inappropriate or unusual activities daily. Business Associate will retain the activity logs for a minimum of six (6) years. Business Associate shall make such logs available to ▇▇▇▇▇▇Sutter, upon request, as ▇▇▇▇▇▇ Sutter reasonably determines is necessary to investigate a potential unauthorized Use or Disclosure. 1 “Enhancements” means improvements which add features to, or otherwise improve functionality or performance of, a software product.

Appears in 1 contract

Sources: Business Associate Agreement