System Logging. i. The systems which provide access to PII must maintain an automated audit trail that can identify the user or system process which initiates a request for PII or alters PII. ii. The audit trail shall: A. Be date and time stamped; B. Log both successful and failed accesses; C. Be read-access only; and D. Be restricted to authorized users. iii. If PII is stored in a database, database logging functionality shall be enabled. iv. Audit trail data shall be archived for at least three (3) years from the occurrence.
Appears in 16 contracts
Sources: Contract for Family Resource Center Services, Contract for the Provision of Bringing Families Home Services, Contract for the Provision of Bridge Program Child Care Navigator, Trauma Informed Training and Coaching, and Emergency Child Care Voucher Services
System Logging. i. 1. The systems which provide access to PII must maintain an automated audit trail that can identify the user or system process which initiates a request for PII PII, or alters PII.
ii2. The audit trail shall:
A. a. Be date and time stamped;
B. b. Log both successful and failed accesses;
C. c. Be read-access only; and
D. d. Be restricted to authorized users.
iii3. If PII is stored in a database, database logging functionality shall be enabled.
iv4. Audit trail data shall be archived for at least three (3) years from the occurrence.
Appears in 7 contracts
Sources: Subrecipient Agreement, Subrecipient Agreement, Service Agreement
System Logging. i. 1. The systems which that provide access to PII must shall maintain an automated audit trail that can identify the user or system process which initiates a request for PII PII, or alters PII.
ii2. The audit trail shall:
A. a. Be date and time stamped;
B. b. Log both successful and failed accesses;
C. c. Be read-access only; and
D. d. Be restricted to authorized usersusers of the audit trail.
iii3. If PII is stored in a database, database logging functionality shall be enabled.
iv4. Audit trail data shall be archived for at least three (3) years from the occurrence.
Appears in 4 contracts
Sources: Privacy and Security Agreement, Data Privacy & Security, Data Sharing Agreement
System Logging. i. The systems which provide access to PII must maintain an automated audit trail that can identify the user or system process which initiates a request for PII PII, or alters PII.
ii. The audit trail shall:
A. 1. Be date and time stamped;
B. 2. Log both successful and failed accesses;
C. 3. Be read-access only; and
D. 4. Be restricted to authorized users.
iii. If PII is stored in a database, database logging functionality shall be enabled.
iv. Audit trail data shall be archived for at least three (3) years from the occurrence.
Appears in 2 contracts
Sources: Professional Services Contract, Professional Services
System Logging. i. The systems which provide access to PII must maintain an automated audit trail that can identify the user or system process which initiates a request for PII or alters PII.
ii. The audit trail shall:
A. Be date and time stamped;
B. Log both successful and failed accesses;
C. Be read-read access only; and
D. Be restricted to authorized users.
iii. If PII is stored in a database, database logging functionality shall be enabled.
iv. Audit trail data shall be archived for at least three (3) years from the occurrence.
Appears in 1 contract
System Logging. i. The systems which provide access to PII must maintain an automated audit trail that can identify the user or system process which initiates a request for PII PII, or alters PII.
ii. The audit trail shall:
A. Be date and time stamped;
B. Log both successful and failed accesses;
C. Be read-access only; and
D. Be restricted to authorized users.
iii. If PII is stored in a database, database logging functionality shall be enabled.
iv. Audit trail data shall be archived for at least three (3) years from the occurrence.
Appears in 1 contract
Sources: Professional Services Contract