Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 45 contracts
Sources: Participation Agreement, Participation Agreement, Standard Services Agreement
Server Security. Servers containing unencrypted DHCS Department PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 11 contracts
Sources: Privacy and Information Security Provisions, Standard Agreement, Privacy and Information Security Provisions
Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 3 contracts
Sources: Business Associate Agreement, Non Emergency Transportation and Non Medical Transportation Services Agreement, Administrative Services Agreement
Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that the data, based upon a risk assessment/system security review.
Appears in 1 contract
Sources: Memorandum of Understanding
Server Security. Servers containing unencrypted DHCS the Consortium PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 1 contract
Sources: Service Agreement
Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.. DHCS ICSR 2/15
Appears in 1 contract
Sources: Standard Agreement
Server Security. Servers containing unencrypted DHCS PHI or PI Pl must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 1 contract
Sources: Provider Participation Agreement