Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Indenture Controls If and to the extent that any provision of the Notes limits, qualifies or conflicts with a provision of this Indenture, such provision of this Indenture shall control.
Administrative Controls The Contractor must have the following controls in place:
Access Controls The system providing access to PHI COUNTY discloses to 29 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 30 must use role based access controls for all user authentications, enforcing the principle of least privilege.