Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
TIME OF CONTRACT This Contract shall commence on , and shall terminate on . Certificate(s) of Insurance must be current on day Contract commences and if scheduled to lapse prior to termination date, must be automatically updated before final payment may be made to Contractor. The final invoice must be submitted within 30 days of completion of the stated scope of services.