Log Reviews. All systems processing and/or storing County PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 73 contracts
Sources: Agreement for Special Services, Agreement for Special Services, Contract No. 2020243
Log Reviews. All systems processing and/or storing County Department PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 11 contracts
Sources: Privacy and Information Security Provisions, Standard Agreement, Privacy and Information Security Provisions
Log Reviews. All systems processing and/or storing County COUNTY PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 3 contracts
Sources: Contract No. 2018169, Contract No. 2014197, Special Services Agreement
Log Reviews. All systems processing and/or storing County PHI or PI must have a routine procedure in place to review system logs for unauthorized access.. M.
Appears in 1 contract
Sources: Special Services Agreement
Log Reviews. All systems processing and/or storing County PHI or COUNTY PHI, PI and/or PII must have a routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Sources: Memorandum of Understanding
Log Reviews. All systems processing and/or storing County COUNTY PHI or PI must have a routine procedure in place to review system logs for unauthorized access.. M.
Appears in 1 contract
Sources: Special Services Agreement
Log Reviews. All systems processing and/or storing County PHI or PI PHI, PI, and/or PII must have a routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Sources: Professional Services