Workstation/Laptop encryption. All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.
Appears in 72 contracts
Sources: Agreement for Special Services, Agreement for Special Services, Contract No. 2020243
Workstation/Laptop encryption. All workstations and laptops that process and/or store County PHI or PI either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County County’s Information Security Office.
Appears in 1 contract
Workstation/Laptop encryption. All workstations and laptops that process and/or store County PHI or PI either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Privacy and Security Office.
Appears in 1 contract
Sources: Agreement for Mobile Crisis Response Program Funding
Workstation/Laptop encryption. All workstations and laptops that process and/or store County PHI or PI PHI, PI, and/or PII must be encrypted using a FIPS 140-2 certified algorithm which is 128bit 128-bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security OfficeOfficer.
Appears in 1 contract
Sources: Professional Services
Workstation/Laptop encryption. All workstations and laptops that process and/or store County PHI or PHI, PI and/or PII must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.
Appears in 1 contract
Sources: Memorandum of Understanding