Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 96 contracts
Samples: Agreement, 1 Agreement, Agreement
Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.
Appears in 51 contracts
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.
Appears in 21 contracts
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 20 contracts
Samples: Iconnect Consulting, The Urban Institute, Regional Cooperative Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 14 contracts
Samples: Agreement for Provision, Anne Sippi Clinic Treatment, Referenced Contract
Technical Security Controls. 35 28 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 29 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 30 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 31 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 32 COUNTY.
Appears in 14 contracts
Samples: 1 Agreement, 1 Agreement, cams.ocgov.com
Technical Security Controls. 35 2 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 3 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 4 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 5 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 6 disk unless approved by the 2 COUNTY.
Appears in 14 contracts
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.
Appears in 13 contracts
Samples: 1 Agreement, 1 Agreement, 1 Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 2 disk unless approved by the 2 COUNTY.
Appears in 9 contracts
Samples: To Agreement, cams.ocgov.com, local.anaheim.net
Technical Security Controls. 35 30 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 31 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 32 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 33 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 34 COUNTY.
Appears in 8 contracts
Samples: 1 Agreement, 1 Agreement, 1 Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.which
Appears in 7 contracts
Samples: cams.ocgov.com, cams.ocgov.com, Agreement
Technical Security Controls. 35 4 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 5 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 6 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 7 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 8 COUNTY.
Appears in 6 contracts
Samples: Agreement, 1 Agreement, Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 6 contracts
Technical Security Controls. 35 30 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 31 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 32 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 33 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 34 the 2 COUNTY.
Appears in 4 contracts
Samples: 1 Agreement, 1 Agreement, 1 Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT B 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 4 contracts
Samples: Agreement, 1 Agreement, 1 Agreement
Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.
Appears in 4 contracts
Samples: cams.ocgov.com, cams.ocgov.com, cams.ocgov.com
Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.
Appears in 3 contracts
Samples: cams.ocgov.com, cams.ocgov.com, cams.ocgov.com
Technical Security Controls. 35 34 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 35 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 36 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 37 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.the
Appears in 3 contracts
Samples: cams.ocgov.com, cams.ocgov.com, Agreement
Technical Security Controls. 35 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 36 COUNTY.
Appears in 3 contracts
Samples: cams.ocgov.com, cams.ocgov.com, 1 Agreement
Technical Security Controls. 35 22 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 23 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 24 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 25 COUNTY.
Appears in 2 contracts
Samples: Agreement, cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 4 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 5 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 6 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 7 disk unless approved by the 2 COUNTY.
Appears in 2 contracts
Samples: cams.ocgov.com, cams.ocgov.com
Technical Security Controls. 35 31 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 32 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 33 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 34 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 35 COUNTY.
Appears in 2 contracts
Samples: 1 Agreement, cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT B 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 2 disk unless approved by the 2 COUNTY.
Appears in 2 contracts
Samples: cams.ocgov.com, cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.
Appears in 2 contracts
Samples: Agreement, cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-140- 2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 2 contracts
Samples: Irvine Pathology Services, Management System
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 2 contracts
Samples: Consent Agreement, To Agreement
Technical Security Controls. 35 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 36 COUNTY.. 37 //
Appears in 2 contracts
Samples: cams.ocgov.com, Agreement
Technical Security Controls. 35 36 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 37 7 of 14 EXHIBIT B 1 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 2 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 3 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 4 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 21 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 22 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 23 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 25 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 26 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 27 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 1 disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 27 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: College Community Services
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 22 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 23 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 17 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 18 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 10 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 11 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 12 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 13 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 7 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 8 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 9 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 10 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 17 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 18 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 19 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 20 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 2 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 3 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 4 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 5 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 6 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 7 of 1415 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 // COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 OF 14 EXHIBIT C 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 2 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 3 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 4 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 5 which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must 6 be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 12 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 13 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 14 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 15 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 16 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 1 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 2 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 3 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 4 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 5 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 5 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 6 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 7 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which the 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140 -2 certified algorithm which 1 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full f ull disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 10 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 11 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.the
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT C 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 29 a. Workstation/Laptop encryptionEncryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 32 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 23 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 24 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 25 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 26 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 27 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 AES. 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must 15 be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 16 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 17 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 18 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 19 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 20 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 27 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 28 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 29 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 30 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 31 COUNTY.
Appears in 1 contract
Samples: ochealthinfo.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 14 EXHIBIT D 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 37 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 1 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 2 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 3 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 4 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 33 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 34 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 35 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 36 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 37 COUNTY.
Appears in 1 contract
Samples: Contract
Technical Security Controls. 35 12 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 13 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 32 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 33 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 22 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 23 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 24 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 25 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 26 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 7 of 14 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 a. 32 1. Workstation/Laptop encryption. : All workstations and laptops that store COUNTY PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY 33 PI either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 34 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 35 disk unless approved by the 2 COUNTY.’s Information Security Office. 36 // 37 //
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 140–2 certified algorithm 7 of 14 EXHIBIT B 1 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the 2 COUNTY.
Appears in 1 contract
Samples: 1 Agreement
Technical Security Controls. 35 28 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 29 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 30 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 31 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 32 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 7 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 8 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 9 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 10 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 11 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 14 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 15 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 36 COUNTY.. 37 //
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 14 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 15 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 16 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 // 7 of 1514 EXHIBIT B 1 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 2 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 3 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 a. 32 1. Workstation/Laptop encryption. : All workstations and laptops that store COUNTY PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY 33 PI either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 34 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 35 disk unless approved by the 2 COUNTY.’s Information Security Office. 36 // 37 // 14 of 517 EXHIBIT AB
Appears in 1 contract
Samples: cams.ocgov.com
Technical Security Controls. 35 11 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 12 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 13 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 14 COUNTY.
Appears in 1 contract
Samples: Master Agreement
Technical Security Controls. 35 29 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 30 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 31 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm 32 which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 33 the 2 COUNTY.
Appears in 1 contract
Samples: Agreement
Technical Security Controls. 35 18 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 19 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 20 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 21 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 22 disk unless approved by the 2 COUNTY.
Appears in 1 contract
Samples: cams.ocgov.com