Common use of Warning Banners Clause in Contracts

Warning Banners. All systems providing access to DHCS PHI or PI must display a warning banner stating that data is confidential, systems are logged, and system use is for business purposes only by authorized users. User must be directed to log off the system if they do not agree with these requirements.

Appears in 34 contracts

Samples: Memorandum of Understanding, Participation Agreement, Participation Agreement

AutoNDA by SimpleDocs

Warning Banners. All systems providing access to containing DHCS PHI or PI must display a warning banner stating that data is confidential, systems are logged, and system use is for business purposes only by authorized usersonly. User must be directed to log off the system if they do not agree with these requirements.

Appears in 6 contracts

Samples: Business Associate Agreement, Business Associate Agreement, Business Associate Agreement

Warning Banners. All systems providing access to containing DHCS PHI or PI must display a warning banner stating that data is confidential, systems are logged, and system use is for business purposes only by authorized usersonly. User Users must be directed to log off the system if they do not agree with these requirements.

Appears in 1 contract

Samples: Memorandum of Understanding

Warning Banners. All systems providing access to DHCS PHI or PI Pl must display a warning banner stating that data is confidential, systems are logged, and system use is for business purposes only by authorized users. User must be directed to log off the system if they do not agree with these requirements.

Appears in 1 contract

Samples: Provider Participation Agreement

AutoNDA by SimpleDocs

Warning Banners. All systems providing access to containing DHCS PHI or PI must display a warning banner stating that data is confidential, systems are logged, and system use is for business purposes only by authorized usersonly. User must be directed to log off the system if they do not agree with these requirements. System The system must log success and failures of user authentication at all layers. The system must log all system access and changes if the system is processing and/or storing PHI. The system must log all user transactions at the database layer if processing and/or storing DHCS PHI.

Appears in 1 contract

Samples: State Revenue Agreement for Local Educational Agency Medical Administrative Activities Claiming

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!