Common use of Technical Security Controls Clause in Contracts

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 100 contracts

Samples: Housing Navigator Services Agreement, Contract for Provision of Services, Contract for Provision of Services

AutoNDA by SimpleDocs

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 55 contracts

Samples: Contract for Provision of Services, Agreement for Provision of Behavioral Health Outpatient Services, Agreement for Provision of Behavioral Health Outpatient Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 23 contracts

Samples: Agreement No. Ma 042 18010156 for Children’s Crisis Residential Services, Agreement for Provision of Services, Agreement for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 21 contracts

Samples: Digital Health Solution Services Agreement, Subordinate Contract for Unarmed Security Guard Services, Contract for Behavioral Health System Transformation

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 18 contracts

Samples: Agreement for Provision of Recovery Residence Services, Agreement for Provision of Recovery Residence Services, Agreement for Provision of Recovery Residence Services

Technical Security Controls. 35 28 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 29 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 30 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 31 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 32 COUNTY.

Appears in 15 contracts

Samples: Contract for Provision of Behavioral Health Services, Contract for Provision of Behavioral Health Services, Contract for Provision of Services

Technical Security Controls. 35 2 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 3 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 4 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 5 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 6 disk unless approved by the 2 COUNTY.

Appears in 15 contracts

Samples: Hospital Services Agreement, Contract for Provision of Services, Contract for Provision of Hiv Housing Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 15 contracts

Samples: Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services Agreement, Contract for Provision of Services, Agreement for Provision of Perinatal Drug Medi Cal Substance Use Disorder Treatment Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 2 disk unless approved by the 2 COUNTY.

Appears in 12 contracts

Samples: Master Contract for Provision of Services, Contract for Provision of Services, Contract for Provision of Services

Technical Security Controls. 35 30 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 31 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 32 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 33 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 34 COUNTY.

Appears in 8 contracts

Samples: Contract for Provision of Services, Contract for Provision of Medi Cal Mental Health Managed Care Psychiatric Inpatient Hospital Services, Agreement for Provision of Recovery Residence Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 6 contracts

Samples: Agreement for Provision of Adult Residential Drug Medi Cal Withdrawal Management Services, Agreement for Provision of Adult Residential Drug Medi Cal Withdrawal Management Services, Agreement for Provision of Services

Technical Security Controls. 35 4 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 5 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 6 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 7 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 8 COUNTY.

Appears in 6 contracts

Samples: Agreement for Provision of Inpatient Mental Health Services for Youth, Agreement for Provision of Behavioral Health Services, Agreement for Provision of Inpatient Mental Health Services for Youth

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT B 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 6 contracts

Samples: Agreement for Provision of Adult Supported Employment Services, Agreement for Provision of Supplemental Security Income Outreach Services, Crisis Prevention Hotline Services Agreement

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 4 contracts

Samples: Contract for Provision of Services, Contract for Transitional Age Youth Crisis Residential Services, Contract for Provision of Services

Technical Security Controls. 35 30 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 31 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 32 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 33 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 34 the 2 COUNTY.

Appears in 4 contracts

Samples: Agreement for Provision of Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services, Agreement for Provision of Drug Medi Cal Substance Use Disorder Outpatient Services, Agreement for Provision of Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services

Technical Security Controls. 35 34 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 35 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 36 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 37 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.the

Appears in 4 contracts

Samples: Agreement for Provision of Short Term Housing Services, Contract for Parent Education Services, Outreach and Engagement Services

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 3 contracts

Samples: Contract for Wraparound Behavioral Health Outpatient Services, Contract for Wraparound Behavioral Health Outpatient Services, Contract for Wraparound Behavioral Health Outpatient Services

Technical Security Controls. 35 31 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 32 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 33 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 34 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 35 COUNTY.

Appears in 2 contracts

Samples: Medi Cal Mental Health Managed Care Psychiatric Inpatient Hospital Services Agreement, Agreement for Provision of Medi Cal Mental Health Managed Care Psychiatric Inpatient Hospital Services

Technical Security Controls. 35 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 36 COUNTY.. 37 //

Appears in 2 contracts

Samples: Contract for Provision of Drug Medi Cal Narcotic Replacement Therapy Treatment Services, Agreement for Provision of Mental Health Outpatient Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Samples: Contract for Provision of Recovery Education Institute Services, Agreement for Provision of Drug Medi Cal Narcotic Replacement Therapy Treatment Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-140- 2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Samples: Phlebotomy and Laboratory Testing Services Contract, Contract for Electronic Nurse Case Management System

Technical Security Controls. 35 22 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 23 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 24 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 25 COUNTY.

Appears in 2 contracts

Samples: Contract for Provision of Administrative Services, Agreement for Provision of Adult Mental Health Inpatient Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT B 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 2 disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Samples: Contract for Provision of Services, Agreement for Provision of Recuperative Care Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.which

Appears in 2 contracts

Samples: Contract for Provision of Services, Agreement for Provision of Perinatal Residential Substance Use Disorder Treatment Services

Technical Security Controls. 35 1 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 2 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 3 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 4 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 5 COUNTY.

Appears in 2 contracts

Samples: Contract for Inpatient Mental Health Services for Youth, Agreement for Provision of Early Intervention Services for Older Adults

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 2 contracts

Samples: Contract for Provision of Services, Contract for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which the 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Hiv Residential Substance Use Disorder Treatment Services Agreement

Technical Security Controls. 35 10 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 11 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 12 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 13 COUNTY.

Appears in 1 contract

Samples: Contract for Physician Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 10 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 11 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Narcotic Replacement Therapy Treatment Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Mental Health Residential Rehabilitation and Enhanced Residential Rehabilitation Services

Technical Security Controls. 35 36 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 37 7 of 14 EXHIBIT B 1 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 2 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 3 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 4 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Medi Cal Mental Health Managed Care Psychiatric Inpatient Hospital Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT C 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Services

Technical Security Controls. 35 29 a. Workstation/Laptop encryptionEncryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Collaborative Court Full Service Partnership Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 OF 14 EXHIBIT C 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Mental Health Inpatient Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 7 of 14 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Services

Technical Security Controls. 35 17 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 18 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 19 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 20 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Services

Technical Security Controls. 35 28 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 29 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 30 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 31 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 32 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Services

Technical Security Controls. 35 7 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 8 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 9 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 10 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 11 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Behavioral Health Calworks Services

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must 15 be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Services

Technical Security Controls. 35 23 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 24 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 25 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 26 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 27 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Administrative Services

AutoNDA by SimpleDocs

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 14 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 15 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 16 COUNTY.

Appears in 1 contract

Samples: Outreach and Engagement Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 7 of 1514 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Narcotic Replacement Therapy Treatment Services

Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 32 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 33 the 2 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Mental Health Community Educational Events Services

Technical Security Controls. 35 16 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 17 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 18 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 19 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 20 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Services

Technical Security Controls. 35 27 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 28 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 29 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 30 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 31 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Medical Staffing Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 22 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 23 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Crisis Stabilization Services Agreement

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Contract for Amendment

Technical Security Controls. 35 12 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 13 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.

Appears in 1 contract

Samples: Outreach and Engagement Services

Technical Security Controls. 35 12 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 13 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 14 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 15 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 16 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Recovery Education Institute Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 7 of 1415 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Sober Living Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.which

Appears in 1 contract

Samples: Contract for Provision of Services

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Psychiatric and Basic Medical Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.the

Appears in 1 contract

Samples: Agreement for Provision of Services

Technical Security Controls. 35 21 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 22 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 23 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Supplemental Security Income Outreach Services

Technical Security Controls. 35 25 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 26 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 27 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 1 disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Rental Assistance Program Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 OF 14 EXHIBIT B 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Mental Health Peer Support and Wellness Center Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT D 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Mental Health Services Agreement

Technical Security Controls. 35 33 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 34 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 35 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 36 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 37 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 17 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 18 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Adult Mental Health Representative Payee Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 147 of 1414 EXHIBIT B 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Agreement for Provision of Recovery Education Institute Services

Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 14 COUNTY.

Appears in 1 contract

Samples: Master Agreement for Provision of Adult Mental Health Inpatient Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 7 of 14 EXHIBIT B 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.

Appears in 1 contract

Samples: Adult Residential Drug Medi Cal Substance Use Disorder Treatment Services Agreement

Technical Security Controls. 35 5 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 6 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 7 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Contract for Transitional Age Youth and Young Adult Mental Health Community Networking Services

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Telehealth and Digital Mental Health Support Services

Technical Security Controls. 35 6 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 7 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 8 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 9 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 10 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Behavioral Health Calworks Services

Technical Security Controls. 35 18 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 19 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 20 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 21 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 22 disk unless approved by the 2 COUNTY.

Appears in 1 contract

Samples: Contract for Provision of Hiv Housing Services

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!