Information System Activity Review Sample Clauses

Information System Activity Review. Business Associate will regularly capture and review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Business Associate will employ Security Event and Incident Monitoring (XXXX) technology such as intrusion detection and prevention systems on IT systems that create, receive, transmit, transact, or store PHI and will review and analyze activity records for indications of inappropriate or unusual activities daily. Business Associate will retain the activity logs for a minimum of six (6) years. Business Associate shall make such logs available to Sutter, upon request, as Sutter reasonably determines is necessary to investigate a potential unauthorized Use or Disclosure.
AutoNDA by SimpleDocs
Information System Activity Review. Section 164.308(a)(1)(ii)(D) of the rule states: “Covered entities will implement procedures to regularly review records of the information systems activity, such as audit logs, access reports, and security incident tracking reports”. MCC has implemented the following procedures to address these requirements: The IS Director will ensure that information system activity logs are implemented and maintained for all applications that process ePHI on MCC computers. The IS Director will assign a person(s) to conduct quarterly reviews of the MCC information systems’ ac- tivity logs, this activity may entail the use of an outside entity if desired. Selected reviewer(s) must have the appropriate technical skills and authorized access to enable them to interpret the audit logs correct- ly. The designated reviewer(s) will prepare reports to summarize their reviews. The report will include the reviewer’s name, date and time of the review, application or process reviewed, and any significant find- ings, and describing any events that require additional action (incident reporting). Reviewers will look at system/application logs to identify events such as multiple failed login attempts, patient file accesses, and unauthorized access attempts. Based on the periodic reviews, the IS Director may implement new procedures or technologies to im- prove the security management process. As necessary, the Security Officer, in conjunction with the IS Director, will make modifications or addi- tions to the policies implemented to protect ePHI on MCC computer systems. SECURITY POLICIES AND PROCEDURES: WORKFORCE SECURITY Effective Date: January 1, 2005 Background: 45 CFR §164.308(a)(3) of the Security standards states “a covered entity must implement policies and proce- dures to ensure that all members of its workforce have appropriate access to electronic protected health infor- mation, as provided under paragraph (a)(4) of this section [Information Access Management], and to prevent those workforce members who do not have access under paragraph (a)(4) of this section from obtaining access to electronic protected health information.” Purpose: To establish the Medical Center Clinic’s (MCC) Workforce Security policies, including the required subordinate implementation specifications of authorization and/or supervision, workforce clearance procedures, and termina- tion procedures. Policy: MCC is committed to maintaining formal procedures to ensure that all workforce members whose jobs r...
Information System Activity Review. 1. ISU shall provide HHS with documentation of implementation of its policies and procedures regarding information system activity review across all of its covered health care component clinics. ISU shall provide the documentation to HHS within 60 days of the Effective Date for review and approval.
Information System Activity Review. GCHD will implement procedures to regularly review records of information system activity.

Related to Information System Activity Review

  • Information Systems The Official Agency in conjunction with the Authority will meet the relevant requirements of Articles 131 to 136 of Regulation (EU) 2017/625 and Implementing Regulation (EU) 2019/1715 as appropriate to the Official Agency. The Official Agency shall record appropriate data in the Official Agency Premises Inspection database (OAPI), which will be further developed over the life of the contract. Data should be entered into the database on an ongoing basis but shall be entered within one month of the activity taking place, unless otherwise agreed with the Authority.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment.

  • Management Information System The M&E Plan will describe the information system that will be used to collect data, store, process and deliver information to relevant stakeholders in such a way that the Program information collected and verified pursuant to the M&E Plan is at all times accessible and useful to those who wish to use it. The system development will take into consideration the requirement and data needs of the components of the Program, and will be aligned with existing MCC systems, other service providers, and ministries.

  • Management Information Systems A. The CONTRACTOR shall maintain a process that collects, analyzes, integrates, and reports data. (42 C.F.R. § 438.242(a); Cal. Code Regs., tit. 9, § 1810.376.) This process shall provide information on areas including, but not limited to, utilization, claims, grievances, and appeals. (42 C.F.R. § 438.242(a).)

  • Prevention Care Services and Early Detection Services See Prevention and Early Detection Services section for details. 0% Not Covered Private Duty Nursing Services* Must be performed by a certified home health care agency. 0% - After deductible Not Covered

  • Communication Systems The Parties agree to share the use of communication systems, radios and radio frequencies for the implementation of this Agreement. Sharing of frequencies must be approved only by authorized personnel for each Party and documented in the AOP.

  • Voice Information Service Traffic 5.1 For purposes of this Section 5, (a) Voice Information Service means a service that provides [i] recorded voice announcement information or [ii] a vocal discussion program open to the public, and (b) Voice Information Service Traffic means intraLATA switched voice traffic, delivered to a Voice Information Service. Voice Information Service Traffic does not include any form of Internet Traffic. Voice Information Service Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information Service Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment.

  • Health Information System i. As required by 42 CFR 438.242(a), the MCP shall maintain a health information system that collects, analyzes, integrates, and reports data. The system shall provide information on areas including, but not limited to, utilization, grievances and appeals, and MCP membership terminations for other than loss of Medicaid eligibility.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Information Services The Custodian may rely upon information received from issuers of Securities or agents of such issuers, information received from Subcustodians or depositories, information from data reporting services that provide detail on corporate actions and other securities information, and other commercially reasonable industry sources; and, provided the Custodian has acted in accordance with the standard of care set forth in Section 6 (a), the Custodian shall have no liability as a result of relying upon such information sources, including but not limited to errors in any such information.

Time is Money Join Law Insider Premium to draft better contracts faster.