Common use of System Security Review Clause in Contracts

System Security Review. 1. The County Department/Agency shall ensure audit control mechanisms are in place. 2. All systems processing and/or storing PII shall have at least an annual system risk assessment/security review that ensures administrative, physical, and technical controls are functioning effectively and provide an adequate level of protection. 3. Reviews should include vulnerability scanning tools.

Appears in 4 contracts

Samples: Privacy and Security Agreement, Data Privacy & Security, Privacy and Security Agreement

AutoNDA by SimpleDocs

System Security Review. 1. The County Department/Agency shall Department must ensure audit control mechanisms are in place. 2. All systems processing and/or storing Medi-Cal PII shall must have at least an annual system risk assessment/security review that ensures administrative, physical, and technical controls are functioning effectively and provide an adequate level of protection. 3. Reviews should include vulnerability scanning tools.

Appears in 3 contracts

Samples: Medi Cal Privacy and Security Agreement, Medi Cal Privacy and Security Agreement, Medi Cal Privacy and Security Agreement

System Security Review. 1. The County Department/Agency shall Department must ensure audit control mechanisms are in place. 2. All systems processing and/or storing PII shall must have at least an annual system risk assessment/security review that ensures administrative, physical, and technical controls are functioning effectively and provide an adequate level of protection. 3. Reviews should include vulnerability scanning tools.

Appears in 2 contracts

Samples: Data Privacy & Security, Privacy and Security Agreement

AutoNDA by SimpleDocs

System Security Review. 1. The County Department/Agency shall ensure audit au dit control mechanisms are in place. 2. All systems processing and/or storing PII shall have at least an annual system risk assessment/security review that ensures administrative, physical, and technical controls are functioning effectively and provide an adequate level of protection. 3. Reviews should include vulnerability scanning tools.

Appears in 2 contracts

Samples: Privacy and Security Agreement, Privacy and Security Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!