Audit Capabilities. Auditing and logging capabilities will permit HCA to identify, and possibly reverse, unauthorized or unintended changes to application. • Application must support the identification of the nature of each access and/or modification through the use of logging. • Application must employ audit capabilities to sufficiently track details that can establish accountability for each step or task taken in a clinical or operational process. • All audit logs must be protected from human alteration. • Access to logs must be limited to authorized users. • The application must employ basic query tools and reports to easily search logs. • OCHCA record retention policies must be followed. Currently OCHCA requires that this period be at least six years from the time the record was initiated. • Logging and auditing functionality must include the following: ♦ Record of who did what to which object, when and on which system. ♦ Successful/unsuccessful log-in and log-out of users. ♦ Add, modify and delete actions on data/files/objects. ♦ Read/view actions on data classified as restricted/confidential. ♦ Changes to user accounts or privileges (creation, modification, deletion). ♦ Switching to another users access or privileges after logging in (if applicable).
Audit Capabilities. Auditing and logging capabilities will permit HCA to identify, and possibly reverse, unauthorized or unintended changes to application. County of Orange Health Care Agency Page 41 MA-042-17011367 • Application must support the identification of the nature of each access and/or modification through the use of logging. • Application must employ audit capabilities to sufficiently track details that can establish accountability for each step or task taken in a clinical or operational process. • All audit logs must be protected from human alteration. • Access to logs must be limited to authorized users. • The application must employ basic query tools and reports to easily search logs. • OCHCA record retention policies must be followed. Currently OCHCA requires that this period be at least six years from the time the record was initiated. • Logging and auditing functionality must include the following: ♦ Record of who did what to which object, when and on which system. ♦ Successful/unsuccessful log-in and log-out of users. ♦ Add, modify and delete actions on data/files/objects. ♦ Read/view actions on data classified as restricted/confidential. ♦ Changes to user accounts or privileges (creation, modification, deletion). ♦ Switching to another users access or privileges after logging in (if applicable).
Audit Capabilities. 5 a. Audit and logging capabilities will permit HCA to identify, and possibly reverse, 6 unauthorized or unintended changes to data resulting from error or misconduct.
Audit Capabilities. 22 1. Auditing and logging capabilities will permit HCA to identify, and possibly reverse, 23 unauthorized or unintended changes to application.
Audit Capabilities. Auditing and logging capabilities will permit HCA to identify, and possibly reverse, unauthorized or unintended changes to application. Application must support the identification of the nature of each access and/or modification through the use of logging. Application must employ audit capabilities to sufficiently track details that can establish accountability for each step or task taken during operational process. County of Orange Health Care Agency 40 MA-042-16011679 Environmental Health Data Management System All audit logs must be protected from human alteration. Access to logs must be limited to authorized users. The application must employ basic query tools and reports to easily search logs. Logging and auditing functionality must include the following: Record of who did what to which object, when and on which system. Successful/unsuccessful log-in and log-out of users. Changes to user accounts or privileges (creation, modification, deletion).
Audit Capabilities. Auditing and logging capabilities will permit HCA to identify, and possibly reverse, unauthorized or unintended changes to application. • Application must support the identification of the nature of each access and/or modification through the use of logging. • Application must employ audit capabilities to sufficiently track details that can establish accountability for each step or task taken in a clinical or operational process. • All audit logs must be protected from human alteration. • Access to logs must be limited to authorized users. • The application must employ basic query tools and reports to easily search logs. • OCHCA record retention policies must be followed. Currently OCHCA requires that this period be at least six years from the time the record was initiated. • Logging and auditing functionality must include the following: ♦ Record of who did what to which object, when and on which system. ♦ Successful/unsuccessful log-in and log-out of users. ♦ Add, modify and delete actions on data/files/objects. ♦ Read/view actions on data classified as restricted/confidential. ♦ Changes to user accounts or privileges (creation, modification, deletion). ♦ Switching to another users access or privileges after logging in (if applicable). Protection from Malicious Code For cloud hosted solutions, vendors must utilize antivirus/antispyware software on servers and monitor to prevent malicious code which may lead to a compromise of XXXXX’s data. • For local hosted solutions, vendors must ensure that the application appropriately supports the use of antivirus/antispyware software. • Remote Support Functionality • Provider must conform to OCHCA Vendor Remote Access Policy.
Audit Capabilities. 22 1. Auditing and logging capabilities will permit HCA to identify, and possibly reverse, 23 unauthorized or unintended changes to application.
24 2. Application must support the identification of the nature of each access and/or modification 25 through the use of logging.
26 3. Application must employ audit capabilities to sufficiently track details that can establish 27 accountability for each step or task taken in a clinical or operational process.
28 4. All audit logs must be protected from human alteration.
29 5. Access to logs must be limited to authorized users.
30 6. The application must employ basic query tools and reports to easily search logs.
31 7. OCHCA record retention policies must be followed. Currently OCHCA requires that this 32 period be at least six years from the time the record was initiated.
33 8. Logging and auditing functionality must include the following:
34 a. Record of who did what to which object, when and on which system.
35 b. Successful/unsuccessful log-in and log-out of users.
36 c. Add, modify and delete actions on data/files/objects.
37 d. Read/view actions on data classified as restricted/confidential.
1 e. Changes to user accounts or privileges (creation, modification, deletion).
2 f. Switching to another users access or privileges after logging in (if applicable).
Audit Capabilities. 8 Protection from Malicious Code....................................................................................................................... 9 Remote Support Functionality .........................................................................................................................
Audit Capabilities. Auditing and logging capabilities will permit HCA to identify, and possibly reverse, unauthorized or unintended changes to application. Application must support the identification of the nature of each access and/or modification through the use of logging. Application must employ audit capabilities to sufficiently track details that can establish accountability for each step or task taken in a clinical or operational process. All audit logs must be protected from human alteration. Access to logs must be limited to authorized users. The application must employ basic query tools and reports to easily search logs. OCHCA record retention policies must be followed. Currently OCHCA requires that this period be at least six years from the time the record was initiated. Logging and auditing functionality must include the following: Record of who did what to which material object, when and on which system. Successful/unsuccessful log-in and log-out of users. Add, modify and delete actions on material data/files/objects. Read/view actions on data classified as restricted/confidential. Changes to user accounts or privileges (creation, modification, deletion). Switching to another users access or privileges after logging in (if applicable).
Audit Capabilities. Auditing and logging capabilities will permit HCA to identify, and possibly reverse, unauthorized or unintended changes to application. Auditing and Logging functionality will include the following: 8 Protection from Malicious Code • For cloud hosted solutions, vendors must utilize antivirus/antispyware software on servers and monitor to prevent malicious code which may lead to a compromise of OCHCA’s data. • For local hosted solutions, vendors must ensure that the application appropriately supports the use of antivirus/antispyware software.