Log Reviews. All systems processing and/or storing CDPH PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 6 contracts
Samples: Services Agreement, Agreement, Standard Agreement
Log Reviews. All systems processing and/or storing CDPH Merced PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Samples: web2.co.merced.ca.us