Log Review. All systems processing and/or storing DBH PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 5 contracts
Samples: sanbernardino.legistar.com, sanbernardino.legistar.com, Business Associate Agreement