Information System Activity Review. Business Associate will regularly capture and review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Business Associate will employ Security Event and Incident Monitoring (▇▇▇▇) technology such as intrusion detection and prevention systems on IT systems that create, receive, transmit, transact, or store PHI and will review and analyze activity records for indications of inappropriate or unusual activities daily. Business Associate will retain the activity logs for a minimum of six (6) years. Business Associate shall make such logs available to ▇▇▇▇▇▇, upon request, as ▇▇▇▇▇▇ reasonably determines is necessary to investigate a potential unauthorized Use or Disclosure.
Appears in 2 contracts
Sources: Business Associate Agreement, Business Associate Agreement
Information System Activity Review. Business Associate will regularly capture and review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Business Associate will employ Security Event and Incident Monitoring (▇▇▇▇) technology such as intrusion detection and prevention systems on IT systems that create, receive, transmit, transact, or store PHI and will review and analyze activity records for indications of inappropriate or unusual activities daily. Business Associate will retain the activity logs for a minimum of six (6) years. Business Associate shall make such logs available to ▇▇▇▇▇▇Sutter, upon request, as ▇▇▇▇▇▇ Sutter reasonably determines is necessary to investigate a potential unauthorized Use or Disclosure.
Appears in 1 contract
Sources: Business Associate Agreement
Information System Activity Review. Business Associate will regularly capture and review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Business Associate will employ Security Event and Incident Monitoring (▇▇▇▇) technology such as intrusion detection and prevention systems on IT systems that create, receive, transmit, transact, or store PHI and will review and analyze activity records for indications of inappropriate or unusual activities daily. Business Associate will retain the activity logs for a minimum of six (6) years. Business Associate shall make such logs available to ▇▇▇▇▇▇Sutter, upon request, as ▇▇▇▇▇▇ Sutter reasonably determines is necessary to investigate a potential unauthorized Use or Disclosure. 1 “Enhancements” means improvements which add features to, or otherwise improve functionality or performance of, a software product.
Appears in 1 contract
Sources: Business Associate Agreement