Technical Security Controls. 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 36 COUNTY. 1 b. Server Security. Servers containing unencrypted PHI COUNTY discloses to 2 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 3 must have sufficient administrative, physical, and technical controls in place to protect that data, based 4 upon a risk assessment/system security review. 5 c. Minimum Necessary. Only the minimum necessary amount of PHI COUNTY discloses 6 to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 7 required to perform necessary business functions may be copied, downloaded, or exported. 8 d. Removable media devices. All electronic files that contain PHI COUNTY discloses to 9 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY
Appears in 2 contracts
Samples: Contract for Provision of Substance Use Disorder Peer Mentoring Services, Contract for Provision of Services
Technical Security Controls. 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 36 COUNTY.. 37 //
1 b. Server Security. Servers containing unencrypted PHI COUNTY discloses to 2 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 3 must have sufficient administrative, physical, and technical controls in place to protect that data, based 4 upon a risk assessment/system security review.
5 c. Minimum Necessary. Only the minimum necessary amount of PHI COUNTY discloses 6 to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 7 required to perform necessary business functions may be copied, downloaded, or exported.
8 d. Removable media devices. All electronic files that contain PHI COUNTY discloses to 9 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY
Appears in 1 contract
Samples: Contract for Provision of Services
Technical Security Controls. 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 36 COUNTY.
1 b. Server Security. Servers containing unencrypted PHI COUNTY discloses to 2 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 3 must have sufficient administrative, physical, and technical controls in place to protect that data, based 4 upon a risk assessment/system security review.
5 c. Minimum Necessary. Only the minimum necessary amount of PHI COUNTY 6 discloses 6 to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 7 COUNTY 7 required to perform necessary business functions may be copied, downloaded, or exported.
8 d. Removable media devices. All electronic files that contain PHI COUNTY discloses to 9 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY
Appears in 1 contract
Samples: Agreement for Provision of Services