Common use of Server Security Clause in Contracts

Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 39 contracts

Samples: Participation Agreement, Participation Agreement, California Mental Health Services

AutoNDA by SimpleDocs

Server Security. Servers containing unencrypted DHCS Department PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 11 contracts

Samples: Standard Agreement Agreement, legistarweb-production.s3.amazonaws.com, Standard Agreement

Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 3 contracts

Samples: Business Associate Agreement, Transportation Services Agreement, Administrative Services Agreement

Server Security. Servers containing unencrypted DHCS the Consortium PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 1 contract

Samples: Agreement

Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that the data, based upon a risk assessment/system security review.

Appears in 1 contract

Samples: Business Associate Agreement

AutoNDA by SimpleDocs

Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.. DHCS ICSR 2/15

Appears in 1 contract

Samples: Standard Agreement

Server Security. Servers containing unencrypted DHCS PHI or PI Pl must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.

Appears in 1 contract

Samples: Participation Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!