Log Reviews. All systems processing and/or storing PII must have a process or automated procedure in place to review system logs for unauthorized access.
Appears in 17 contracts
Samples: Subrecipient Agreement, Subrecipient Agreement, Service Agreement
Log Reviews. All systems processing and/or storing PII must shall have a process or automated procedure in place to review system logs for unauthorized access.
Appears in 6 contracts
Samples: Privacy and Security Agreement, Data Privacy & Security, Privacy and Security Agreement
Log Reviews. All systems processing and/or storing Covered Entity PHI or PII must have a process or automated routine procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Samples: Business Associate Agreement
Log Reviews. All systems processing and/or storing PII must mustshall have a process or automated procedure in place to review system logs for unauthorized access.
Appears in 1 contract
Samples: Privacy and Security Agreement
Log Reviews. All systems processing and/or storing PII must have a process or automated procedure in place to review system logs for unauthorized access.. WGM0719-A3 Page 7 of 14 July 9, 2024
Appears in 1 contract
Samples: Agreement for the Provision of Refugee Social Services