Log Reviews. All systems processing and/or storing CDPH PCI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 12 contracts
Samples: Grant Agreement, Grant Agreement, Grant Agreement
Log Reviews. All systems processing and/or storing CDPH DSH PCI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 5 contracts
Samples: Service Agreement, Scope of Work Agreement, Emergency Agreement