Server Security. Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.
Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Server Security. Servers containing unencrypted County PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Server Security. Servers containing unencrypted PII must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review. It is recommended to follow the guidelines documented in the latest revision of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, Security and Privacy Controls for Federal Information Systems and Organizations.
Server Security. Servers containing unencrypted PHI COUNTY discloses to 7 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 8 must have sufficient administrative, physical, and technical controls in place to protect that data, based 9 upon a risk assessment/system security review.
Server Security. Servers containing unencrypted PHI COUNTY discloses to 33 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 34 must have sufficient administrative, physical, and technical controls in place to protect that data, based 35 upon a risk assessment/system security review.
Server Security. Servers containing unencrypted CDPH PCI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Server Security. Servers containing unencrypted PHI COUNTY discloses to
Server Security. Access to any of Computershare’s computer servers used to perform development Services for Customer shall be limited to only Computershare Personnel performing Services. Computershare will back-up the server files daily
Server Security. Servers containing unencrypted DBH PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.