Log Reviews. All systems processing and/or storing CDPH PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 6 contracts
Samples: Service Agreement, Contract Agreement, Standard Agreement Amendment
Log Reviews. All systems processing and/or storing CDPH Merced PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Samples: Memorandum of Understanding
Log Reviews. All systems processing and/or storing CDPH the Consortium PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Samples: Service Agreement