Log Reviews. Any and all systems processing and/or storing PSEI or PHI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 8 contracts
Sources: Local Implementation Agreement, Professional Services, Local Implementation Agreement