Log Reviews. All systems processing and/or storing CDPH PCI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 9 contracts
Samples: And Disclosure Agreement, And Disclosure Agreement, Grant Agreement
Log Reviews. All systems processing and/or storing CDPH PCI must have a routine procedure in place to review system logs for unauthorized access.
Appears in 9 contracts
Samples: And Disclosure Agreement, And Disclosure Agreement, Grant Agreement