Log Reviews. All systems processing and/or storing DHCS PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 44 contracts
Sources: Participation Agreement, Participation Agreement, Standard Services Agreement
Log Reviews. All systems processing and/or storing DHCS PHI or PI Pl must have a routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Sources: Provider Participation Agreement