Common use of Technical Security Controls Clause in Contracts

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 96 contracts

Samples: Agreement, 1 Agreement, Agreement

AutoNDA by SimpleDocs

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 51 contracts

Samples: Agreement, Agreement, Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 21 contracts

Samples: Agreement, Agreement, Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 20 contracts

Samples: Iconnect Consulting, The Urban Institute, Regional Cooperative Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 14 contracts

Samples: Agreement for Provision, Anne Sippi Clinic Treatment, Referenced Contract

Technical Security Controls. 35 28 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 29 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 30 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 31 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 32 COUNTY.

Appears in 14 contracts

Samples: 1 Agreement, 1 Agreement, cams.ocgov.com

Technical Security Controls. 35 2 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 3 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 4 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 5 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 6 disk unless approved by the 2 COUNTY.

Appears in 14 contracts

Samples: Agreement, Agreement, Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 13 contracts

Samples: 1 Agreement, 1 Agreement, 1 Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 2 disk unless approved by the 2 COUNTY.

Appears in 9 contracts

Samples: To Agreement, cams.ocgov.com, local.anaheim.net

Technical Security Controls. 35 30 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 31 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 32 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 33 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 34 COUNTY.

Appears in 8 contracts

Samples: 1 Agreement, 1 Agreement, 1 Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.which

Appears in 7 contracts

Samples: cams.ocgov.com, cams.ocgov.com, Agreement

Technical Security Controls. 35 4 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 5 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 6 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 7 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 8 COUNTY.

Appears in 6 contracts

Samples: Agreement, 1 Agreement, Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 6 contracts

Samples: Agreement, Agreement, Agreement

Technical Security Controls. 35 30 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 31 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 32 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 33 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 34 the 2 COUNTY.

Appears in 4 contracts

Samples: 1 Agreement, 1 Agreement, 1 Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT B 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 4 contracts

Samples: Agreement, 1 Agreement, 1 Agreement

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 4 contracts

Samples: cams.ocgov.com, cams.ocgov.com, cams.ocgov.com

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 3 contracts

Samples: cams.ocgov.com, cams.ocgov.com, cams.ocgov.com

Technical Security Controls. 35 34 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 35 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 36 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 37 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.the

Appears in 3 contracts

Samples: cams.ocgov.com, cams.ocgov.com, Agreement

Technical Security Controls. 35 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 36 COUNTY.

Appears in 3 contracts

Samples: cams.ocgov.com, cams.ocgov.com, 1 Agreement

Technical Security Controls. 35 22 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 23 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 24 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 25 COUNTY.

Appears in 2 contracts

Samples: Agreement, cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 4 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 5 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 6 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 7 disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Samples: cams.ocgov.com, cams.ocgov.com

Technical Security Controls. 35 31 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 32 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 33 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 34 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 35 COUNTY.

Appears in 2 contracts

Samples: 1 Agreement, cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT B 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 2 disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Samples: cams.ocgov.com, cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 2 contracts

Samples: Agreement, cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-140- 2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Samples: Irvine Pathology Services, Management System

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Samples: Consent Agreement, To Agreement

Technical Security Controls. 35 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 36 COUNTY.. 37 //

Appears in 2 contracts

Samples: cams.ocgov.com, Agreement

Technical Security Controls. 35 36 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 37 7 of 14 EXHIBIT B 1 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 2 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 3 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 4 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 21 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 22 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 23 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 25 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 26 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 27 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 1 disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 27 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: College Community Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 22 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 23 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 17 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 18 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 10 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 11 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 12 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 13 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 7 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 8 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 9 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 10 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 17 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 18 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 19 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 20 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 2 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 3 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 4 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 5 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 6 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 7 of 1415 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 // COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 OF 14 EXHIBIT C 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 2 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 3 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 4 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 5 which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must 6 be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 12 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 13 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 14 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 15 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 16 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 1 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 2 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 3 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 4 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 5 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 5 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 6 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 7 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

AutoNDA by SimpleDocs

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which the 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full f ull disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 10 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 11 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.the

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT C 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 29 a. Workstation/Laptop encryptionEncryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 23 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 24 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 25 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 26 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 27 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 AES. 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must 15 be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 16 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 17 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 18 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 19 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 20 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 27 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 28 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 29 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 30 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 31 COUNTY.

Appears in 1 contract

Samples: ochealthinfo.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT D 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 37 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 1 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 2 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 3 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 4 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 33 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 34 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 35 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 36 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 37 COUNTY.

Appears in 1 contract

Samples: Contract

Technical Security Controls. 35 12 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 13 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 32 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 22 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 23 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 24 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 25 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 26 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 7 of 14 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 a. 32 1. Workstation/Laptop encryption. : All workstations and laptops that store COUNTY PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY 33 PI either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 34 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 35 disk unless approved by the 2 COUNTY.’s Information Security Office. 36 // 37 //

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 7 of 14 EXHIBIT B 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 1 contract

Samples: 1 Agreement

Technical Security Controls. 35 28 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 29 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 30 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 31 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 32 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 7 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 8 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 9 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 10 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 11 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 36 COUNTY.. 37 //

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 14 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 15 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 16 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 7 of 1514 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 a. 32 1. Workstation/Laptop encryption. : All workstations and laptops that store COUNTY PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY 33 PI either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 34 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 35 disk unless approved by the 2 COUNTY.’s Information Security Office. 36 // 37 // 14 of 517 EXHIBIT AB

Appears in 1 contract

Samples: cams.ocgov.com

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 14 COUNTY.

Appears in 1 contract

Samples: Master Agreement

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 32 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 33 the 2 COUNTY.

Appears in 1 contract

Samples: Agreement

Technical Security Controls. 35 18 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 19 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 20 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 21 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 22 disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: cams.ocgov.com

Time is Money Join Law Insider Premium to draft better contracts faster.