Common use of Technical Security Controls Clause in Contracts

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 107 contracts

Sources: Housing Navigator Services Agreement, Agreement for Provision of Recovery Residence Services, Contract for Provision of Mental Health Services

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 59 contracts

Sources: Contract for Provision of Psychiatric and Basic Medical Services, Contract for Provision of Services, Agreement for Provision of Behavioral Health Outpatient Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 23 contracts

Sources: Agreement No. Ma 042 18010156 for Children’s Crisis Residential Services, Agreement for Provision of Services, Agreement for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 21 contracts

Sources: Digital Health Solution Services Agreement, Subordinate Contract for Unarmed Security Guard Services, Contract for Behavioral Health System Transformation

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 18 contracts

Sources: Agreement for Provision of Recovery Residence Services, Agreement for Provision of Recovery Residence Services, Agreement for Provision of Recovery Residence Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 16 contracts

Sources: Agreement for Provision of Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services, Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services Agreement, Contract for Provision of Services

Technical Security Controls. 35 28 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 29 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 30 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 31 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 32 COUNTY.

Appears in 16 contracts

Sources: Contract for Provision of Behavioral Health Services, Contract for Provision of Services, Contract for Provision of Behavioral Health Services

Technical Security Controls. 35 2 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 3 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 4 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 5 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 6 disk unless approved by the 2 COUNTY.

Appears in 15 contracts

Sources: Hospital Services Agreement, Contract for Provision of Hiv Housing Services, Contract for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 2 disk unless approved by the 2 COUNTY.

Appears in 12 contracts

Sources: Master Contract for Provision of Services, Contract for Provision of Services, Contract for Provision of Services

Technical Security Controls. 35 30 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 31 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 32 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 33 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 34 COUNTY.

Appears in 9 contracts

Sources: Recovery Residence Services, Contract for Provision of Medi Cal Mental Health Managed Care Psychiatric Inpatient Hospital Services, Agreement for Provision of Recovery Residence Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 7 contracts

Sources: Agreement for Provision of Adult Residential Drug Medi Cal Withdrawal Management Services, Agreement for Provision of Adult Residential Drug Medi Cal Withdrawal Management Services, Agreement for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT B 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 6 contracts

Sources: Agreement for Provision of Supplemental Security Income Outreach Services, Crisis Prevention Hotline Services Agreement, Agreement for Provision of Adult Supported Employment Services

Technical Security Controls. 35 4 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 5 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 6 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 7 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 8 COUNTY.

Appears in 6 contracts

Sources: Agreement for Provision of Inpatient Mental Health Services for Youth, Agreement for Provision of Behavioral Health Services, Agreement for Provision of Inpatient Mental Health Services for Youth

Technical Security Controls. 35 30 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 31 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 32 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 33 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 34 the 2 COUNTY.

Appears in 4 contracts

Sources: Agreement for Provision of Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services, Agreement for Provision of Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services, Agreement for Provision of Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 4 contracts

Sources: Contract for Provision of Services, Contract for Transitional Age Youth Crisis Residential Services, Contract for Provision of Services

Technical Security Controls. 35 34 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 35 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 36 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 37 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.the

Appears in 4 contracts

Sources: Agreement for Provision of Short Term Housing Services, Contract for Parent Education Services, Outreach and Engagement Services

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 4 contracts

Sources: Contract for Wraparound Behavioral Health Outpatient Services, Contract for Wraparound Behavioral Health Outpatient Services, Contract for Wraparound Behavioral Health Outpatient Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.which

Appears in 3 contracts

Sources: Contract for Provision of Services, Agreement for Provision of Services, Agreement for Provision of Perinatal Residential Substance Use Disorder Treatment Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-140- 2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Sources: Phlebotomy and Laboratory Testing Services Contract, Contract for Electronic Nurse Case Management System

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Sources: Contract for Provision of Services, Contract for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT B 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 2 disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Sources: Contract for Provision of Services, Agreement for Provision of Recuperative Care Services

Technical Security Controls. 35 22 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 23 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 24 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 25 COUNTY.

Appears in 2 contracts

Sources: Contract for Provision of Administrative Services, Agreement for Provision of Adult Mental Health Inpatient Services

Technical Security Controls. 35 31 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 32 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 33 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 34 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 35 COUNTY.

Appears in 2 contracts

Sources: Medi Cal Mental Health Managed Care Psychiatric Inpatient Hospital Services Agreement, Agreement for Provision of Medi Cal Mental Health Managed Care Psychiatric Inpatient Hospital Services

Technical Security Controls. 35 6 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 7 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 8 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 9 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 10 COUNTY.

Appears in 2 contracts

Sources: Contract for Provision of Behavioral Health Calworks Services, Agreement for Provision of Adult Non Medical Detoxification and Residential Treatment Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Sources: Contract for Provision of Recovery Education Institute Services, Agreement for Provision of Drug Medi Cal Narcotic Replacement Therapy Treatment Services

Technical Security Controls. 35 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 36 COUNTY.. 37 //

Appears in 2 contracts

Sources: Contract for Provision of Drug Medi Cal Narcotic Replacement Therapy Treatment Services, Agreement for Provision of Mental Health Outpatient Services

Technical Security Controls. 35 23 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 24 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 25 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 26 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 27 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Administrative Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 147 of 1414 EXHIBIT B 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Recovery Education Institute Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 7 of 14 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT D 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Mental Health Services Agreement

Technical Security Controls. 35 33 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 34 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 35 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 36 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 37 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 OF 14 EXHIBIT C 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Mental Health Inpatient Services

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.the

Appears in 1 contract

Sources: Agreement for Provision of Services

Technical Security Controls. 35 5 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 6 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 7 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Contract for Transitional Age Youth and Young Adult Mental Health Community Networking Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Telehealth and Digital Mental Health Support Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 22 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 23 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Crisis Stabilization Services Agreement

Technical Security Controls. 35 29 a. Workstation/Laptop encryptionEncryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Collaborative Court Full Service Partnership Services

Technical Security Controls. 35 7 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 8 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 9 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 10 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 11 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Behavioral Health Calworks Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.which

Appears in 1 contract

Sources: Contract for Provision of Services

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 14 COUNTY.

Appears in 1 contract

Sources: Master Agreement for Provision of Adult Mental Health Inpatient Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 7 of 14 EXHIBIT B 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 1 contract

Sources: Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services Agreement

Technical Security Controls. 35 18 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 19 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 20 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 21 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 22 disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Hiv Housing Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 7 of 1415 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Sober Living Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which the 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Hiv Residential Substance Use Disorder Treatment Services Agreement

Technical Security Controls. 35 21 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 22 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 23 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Supplemental Security Income Outreach Services

Technical Security Controls. 35 25 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 26 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 27 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 1 disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Rental Assistance Program Services

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Psychiatric and Basic Medical Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 14 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 15 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 16 COUNTY.

Appears in 1 contract

Sources: Outreach and Engagement Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 17 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 18 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Adult Mental Health Representative Payee Services

Technical Security Controls. 35 10 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 11 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 12 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 13 COUNTY.

Appears in 1 contract

Sources: Contract for Physician Services

Technical Security Controls. 35 12 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 13 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 14 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 15 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 16 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Recovery Education Institute Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 OF 14 EXHIBIT B 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Mental Health Peer Support and Wellness Center Services

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 32 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 33 the 2 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Mental Health Community Educational Events Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 7 of 1514 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Narcotic Replacement Therapy Treatment Services

Technical Security Controls. 35 16 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 17 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 18 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 19 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 20 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Services

Technical Security Controls. 35 27 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 28 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 29 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 30 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 31 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Medical Staffing Services

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must 15 be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 10 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 11 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Narcotic Replacement Therapy Treatment Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Mental Health Residential Rehabilitation and Enhanced Residential Rehabilitation Services

Technical Security Controls. 35 17 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 18 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 19 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 20 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT C 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Sources: Contract for Amendment

Technical Security Controls. 35 36 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 37 7 of 14 EXHIBIT B 1 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 2 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 3 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 4 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Medi Cal Mental Health Managed Care Psychiatric Inpatient Hospital Services

Technical Security Controls. 35 12 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 13 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.

Appears in 1 contract

Sources: Outreach and Engagement Services

Technical Security Controls. 35 28 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 29 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 30 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 31 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 32 COUNTY.

Appears in 1 contract

Sources: Contract for Provision of Services

Technical Security Controls. 35 37 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 7 of 14 EXHIBIT FC 1 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 2 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 3 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 4 COUNTY.

Appears in 1 contract

Sources: Agreement for Provision of Services