Log Reviews. All systems processing and/or storing County PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 49 contracts
Samples: Special Services Agreement, Contract No. 2021001, Special Services Agreement
Log Reviews. All systems processing and/or storing County Department PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 11 contracts
Samples: Privacy and Information Security Provisions, Standard Agreement, Privacy and Information Security Provisions
Log Reviews. All systems processing and/or storing County COUNTY PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 3 contracts
Samples: Contract No. 2018169, Contract No. 2014197, Special Services Agreement
Log Reviews. All systems processing and/or storing County PHI or PI must have a routine procedure in place to review system logs for unauthorized access.. M.
Appears in 1 contract
Samples: Special Services Agreement
Log Reviews. All systems processing and/or storing County COUNTY PHI or PI must have a routine procedure in place to review system logs for unauthorized access.. M.
Appears in 1 contract
Samples: Special Services Agreement
Log Reviews. All systems processing and/or storing County PHI or PI PHI, PI, and/or PII must have a routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Samples: Professional Services
Log Reviews. All systems processing and/or storing County PHI or COUNTY PHI, PI and/or PII must have a routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Samples: Memorandum of Understanding