Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 39 contracts
Samples: Participation Agreement, Participation Agreement, Standard Services Agreement
Server Security. Servers containing unencrypted DHCS Department PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 11 contracts
Samples: Privacy and Information Security Provisions, Standard Agreement, Privacy and Information Security Provisions
Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 3 contracts
Samples: Business Associate Agreement, Non Emergency Transportation and Non Medical Transportation Services Agreement, Administrative Services Agreement
Server Security. Servers containing unencrypted DHCS PHI or PI Pl must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 1 contract
Samples: Provider Participation Agreement
Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that the data, based upon a risk assessment/system security review.
Appears in 1 contract
Samples: Memorandum of Understanding
Server Security. Servers containing unencrypted DHCS PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.. DHCS ICSR 2/15
Appears in 1 contract
Samples: Standard Agreement
Server Security. Servers containing unencrypted DHCS the Consortium PHI or PI must have sufficient administrative, physical, and technical controls in place to protect that data, based upon a risk assessment/system security review.
Appears in 1 contract
Samples: Service Agreement