Audit Controls definition

Audit Controls means mechanisms employed to record and examine system activity. Audit Files means records of information related to system activity that may be located in different locations of a network.
Audit Controls. Meaning hardware, software, and/or procedural mechanisms that record and examine activity in GLMX's information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements.

Examples of Audit Controls in a sentence

  • Such security audit shall review whether Subcontractor is strictly following all [**] security rules and procedures as made available to the Subcontractor for use of [**]’s electronic resources provided to Subcontractor and that Subcontractor is in strict compliance with [**]’s then-current security policies, architectures, standards, rules and procedures, all as set forth in the most current version of [**]’s Offshore Management Office External Audit Controls.

  • Such security audit shall review whether Subcontractor is strictly following all AT&T security rules and procedures as made available to the Subcontractor for use of AT&T’s electronic resources provided to Subcontractor and that Subcontractor is in strict compliance with AT&T’s then-current security policies, architectures, standards, rules and procedures, all as set forth in the most current version of AT&T’s Offshore Management Office External Audit Controls.

  • AS 3.3.3, Termination Procedure AS 3.5.5, Password Management AS 3.7, Contingency Plan PS 4.1.1, Contingency Operations PS 4.2, Workstation Use PS4.3, Workstation Security TS 5.2, Audit Controls TS 5.3, Integrity Controls TS 5.4, Authentication of Entity or Person TS5.5.2, Encryption 45 C.F.R. § 164.312(a) Effective Date: 9/26/2013 GCHD will implement hardware, software, and/or procedural mechanisms that record and examine activity occurring on organizational information systems that contain or use ePHI.

  • Audit Controls  Clinicea provides complete audit trails on all operations associated with encrypted files.

  • AS 3.1.4, Information Systems Activity Review AS 3.3, Workforce Security AS 3.5.4, Log-In Monitoring AS 3.6, Security Incident Procedure AS 3.7, Contingency Plan AS 3.8. Evaluation TS 5.1.2, Emergency Access Procedure TS 5.2, Audit Controls 45 C.F.R. § 164.310(a) GCHD will implement an adequate level of security procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the workstations that can access ePHI.

  • Audit Controls are implemented to detect and remediate workstation compliance deviations.

  • In addition, as applicable, Workforce members will be prohibited from attempting to bypass security protections and must follow all relevant security measures including: Workstation Security (Section IV-D), Facility Access Controls (Section IV-B), Authorization and/or Supervision (Section III-D), Access Control (Section V-B), Audit Controls (Section V-C), Person or Entity Authentication (Section V-E), and Transmission Security (Section V-F).

  • Audit Controls – hardware, software and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements and compliance therewith.

  • AS 3.1.4, Information Systems Activity Review TS 5.2, Audit Controls 45 C.F.R. § 164.312(c) Effective Date: 9/26/2013 GCHD will implement procedures to verify that a person or entity seeking access to ePHI is the one claimed.

  • The policies and procedures describe:  Access Control  Audit Controls  Integrity of Data  Person or Entity Authentication  Transmission Security The Alaska HIE will incorporate a Public Key Infrastructure (PKI) or other mechanisms as deemed necessary to support digital signature and encryption in its messaging services.

Related to Audit Controls

  • Interim controls means a set of measures designed to temporarily reduce human exposure or likely exposure to lead-based paint hazards, including specialized cleaning, repairs, maintenance, painting, temporary containment, ongoing monitoring of lead-based paint hazards or potential hazards, and the establishment and operation of management and resident education programs.

  • Engineering controls means constructed containment barriers or systems that control one or more of the following: downward migration, infiltration, or seepage of surface runoff or rain; or natural leaching migration of contaminants through the subsurface over time. Examples include caps, engineered bottom barriers, immobilization processes, and vertical barriers.

  • Export Controls Software available on the Services is further subject to United States Export Controls. No software available on the Services may be downloaded or exported (i) into (or to a national or resident of) any country to which the United States has embargoed goods; or (ii) to anyone on the United States Treasury Department's list of Specially Designated Nationals or using the Commerce Department's Table of Deny Orders. By downloading any Software, you represent and warrant that you are not located in, or under the control of, or a national or resident of any such country or on any such list.

  • Internal Controls has the meaning set forth in Section 4.07(d).

  • Institutional Controls or “ICs” shall mean Proprietary Controls and state or local laws, regulations, ordinances, zoning restrictions, or other governmental controls or notices that: (a) limit land, water, or other resource use to minimize the potential for human exposure to Waste Material at or in connection with the Site; (b) limit land, water, or other resource use to implement, ensure non-interference with, or ensure the protectiveness of the RA; and/or (c) provide information intended to modify or guide human behavior at or in connection with the Site.