Log Reviews. All systems processing and/or storing PII must have a process or automated procedure in place to review system logs for unauthorized access.
Appears in 20 contracts
Sources: Contract for the Provision of Bringing Families Home Services, Contract for the Provision of Integrated Job Services, Contract for the Provision of Integrated Job Services
Log Reviews. All systems processing and/or storing PII must shall have a process or automated procedure in place to review system logs for unauthorized access.
Appears in 6 contracts
Sources: Privacy and Security Agreement, Data Privacy & Security, Data Sharing Agreement
Log Reviews. All systems processing and/or storing Covered Entity PHI or PII must have a process or automated routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Sources: Business Associate Agreement
Log Reviews. All systems processing and/or storing PII must mustshall have a process or automated procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Sources: Privacy and Security Agreement