Common use of Technical Security Controls Clause in Contracts

Technical Security Controls. A. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Appears in 2 contracts

Samples: Whole Person Care Agreement, Whole Person Care Agreement

AutoNDA by SimpleDocs

Technical Security Controls. A. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS Covered Entity PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security OfficeCovered Entity.

Appears in 1 contract

Samples: Administrative Services Agreement

AutoNDA by SimpleDocs

Technical Security Controls. A. 1. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS CCHCS PHI or PI Pl must be encrypted using a FIPS 140-2 Annex A certified algorithm which is 128bit 256 bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS CCHCS Information Security Office.

Appears in 1 contract

Samples: Contract

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!