Technical Security Controls. A. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Appears in 2 contracts
Samples: Whole Person Care Agreement, Whole Person Care Agreement
Technical Security Controls. A. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS Covered Entity PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security OfficeCovered Entity.
Appears in 1 contract
Samples: Administrative Services Agreement
Technical Security Controls. A. 1. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS CCHCS PHI or PI Pl must be encrypted using a FIPS 140-2 Annex A certified algorithm which is 128bit 256 bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS CCHCS Information Security Office.
Appears in 1 contract
Samples: Contract