Audit Controls definition
Examples of Audit Controls in a sentence
Such security audit shall review whether Subcontractor is strictly following all [**] security rules and procedures as made available to the Subcontractor for use of [**]’s electronic resources provided to Subcontractor and that Subcontractor is in strict compliance with [**]’s then-current security policies, architectures, standards, rules and procedures, all as set forth in the most current version of [**]’s Offshore Management Office External Audit Controls.
Such security audit shall review whether Subcontractor is strictly following all AT&T security rules and procedures as made available to the Subcontractor for use of AT&T’s electronic resources provided to Subcontractor and that Subcontractor is in strict compliance with AT&T’s then-current security policies, architectures, standards, rules and procedures, all as set forth in the most current version of AT&T’s Offshore Management Office External Audit Controls.
AS 3.3.3, Termination Procedure AS 3.5.5, Password Management AS 3.7, Contingency Plan PS 4.1.1, Contingency Operations PS 4.2, Workstation Use PS4.3, Workstation Security TS 5.2, Audit Controls TS 5.3, Integrity Controls TS 5.4, Authentication of Entity or Person TS5.5.2, Encryption 45 C.F.R. § 164.312(a) Effective Date: 9/26/2013 GCHD will implement hardware, software, and/or procedural mechanisms that record and examine activity occurring on organizational information systems that contain or use ePHI.
Audit Controls Clinicea provides complete audit trails on all operations associated with encrypted files.
AS 3.1.4, Information Systems Activity Review AS 3.3, Workforce Security AS 3.5.4, Log-In Monitoring AS 3.6, Security Incident Procedure AS 3.7, Contingency Plan AS 3.8. Evaluation TS 5.1.2, Emergency Access Procedure TS 5.2, Audit Controls 45 C.F.R. § 164.310(a) GCHD will implement an adequate level of security procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the workstations that can access ePHI.
Audit Controls are implemented to detect and remediate workstation compliance deviations.
In addition, as applicable, Workforce members will be prohibited from attempting to bypass security protections and must follow all relevant security measures including: Workstation Security (Section IV-D), Facility Access Controls (Section IV-B), Authorization and/or Supervision (Section III-D), Access Control (Section V-B), Audit Controls (Section V-C), Person or Entity Authentication (Section V-E), and Transmission Security (Section V-F).
Audit Controls – hardware, software and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information, including appropriate logs and reports concerning these security requirements and compliance therewith.
AS 3.1.4, Information Systems Activity Review TS 5.2, Audit Controls 45 C.F.R. § 164.312(c) Effective Date: 9/26/2013 GCHD will implement procedures to verify that a person or entity seeking access to ePHI is the one claimed.
The policies and procedures describe: Access Control Audit Controls Integrity of Data Person or Entity Authentication Transmission Security The Alaska HIE will incorporate a Public Key Infrastructure (PKI) or other mechanisms as deemed necessary to support digital signature and encryption in its messaging services.