Common use of Server Security Clause in Contracts

Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 45 contracts

Sources: Participation Agreement, Participation Agreement, Standard Services Agreement

Server Security. Servers containing unencrypted DHCS Department PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 11 contracts

Sources: Privacy and Information Security Provisions, Standard Agreement, Privacy and Information Security Provisions

Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 3 contracts

Sources: Business Associate Agreement, Non Emergency Transportation and Non Medical Transportation Services Agreement, Administrative Services Agreement

Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that the data, based upon a risk assessment/system security review.

Appears in 1 contract

Sources: Memorandum of Understanding

Server Security. Servers containing unencrypted DHCS the Consortium PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 1 contract

Sources: Service Agreement

Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.. DHCS ICSR 2/15

Appears in 1 contract

Sources: Standard Agreement

Server Security. Servers containing unencrypted DHCS PHI or PI Pl must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 1 contract

Sources: Provider Participation Agreement