Automated Audit Trail Sample Clauses

Automated Audit Trail. (Audit and Accountability (AU) Family, NIST SP 800-53 rev. 4) SSA requires EIEPs, and other STCs or agencies that provide audit trail services to other state agencies that receive information electronically from SSA, to implement and maintain a fully automated audit trail system (ATS). The system must be capable of creating, storing, protecting, and (efficiently) retrieving and collecting records identifying the individual user who initiates a request for information from SSA or accesses SSA-provided information. At a minimum, individual audit trail records must contain the data needed (including date and time stamps) to associate each query transaction or access to SSA-provided information with its initiator, their action, if any, and the relevant business purpose/process (e.g., SSN verification for Medicaid). Each entry in the audit file must be stored as a separate record, not overlaid by subsequent records. The ATS must create transaction files to capture all input from interactive internet applications that access or query SSA-provided information. SSA requires that the agency’s ATS create an audit record when users view screens that contain SSA-provided information. If an STC handles and audits the EIEP’s transactions with SSA, the EIEP is responsible for ensuring that the STC’s audit capabilities meet NIST’s guidelines for an automated audit trail system. The EIEP must also establish a process to obtain specific audit information from the STC regarding the EIEP’s SSA transactions. SSA requires that EIEPs have automated retrieval and collection of audit records. Such automated functions can be via online queries, automated reports, batch processing, or any other logical means of delivering audit records in an expeditious manner. Information in the audit file must be retrievable by an automated method and must allow the EIEP the capability to make them available to SSA upon request. Access to the audit file must be restricted to authorized users with a “need to know,” audit file data must be unalterable (read-only), and maintained for a minimum of three (3) (preferably seven (7)) years. Information in the audit file must be retrievable by an automated method and must allow the EIEP the capability to make them available to SSA upon request. The EIEP must backup audit trail records on a regular basis to ensure its availability. EIEPs must apply the same level of protection to backup audit files that apply to the original files to ensure the integrity of...
AutoNDA by SimpleDocs
Automated Audit Trail. SWA’s receiving SSA information through the ICON system must implement and maintain a fully automated audit trail system capable of data collection, data retrieval and data storage. At a minimum, data collected through the audit trail system must associate each query transaction to its initiator and relevant business purpose (i.e. the SWA client record for which SSA data was requested), and each transaction must be time and date stamped. Each query transaction must be stored in the audit file as a separate record, not overlaid by subsequent query transactions. Access to the audit file must be restricted to authorized users with a “need to know” and audit file data must be unalterable (read only) and maintained for a minimum of three (preferably seven) years. Retrieval of information from the automated audit trail may be accomplished online or through batch access. This requirement must be met before DOL will approve the SWA’s request for access to SSA information through the ICON system. If SSA-supplied information is retained in the SWA system, or if certain data elements within the SWA system will indicate to users that the information has been verified by SSA, the SWA system also must capture an audit trail record of any user who views SSA information stored within the SWA system. The audit trail requirements for these inquiry transactions are the same as those outlined above for SWA transactions requesting information directly from SSA.

Related to Automated Audit Trail

  • SAO AUDIT A. The state auditor may conduct an audit or investigation of any entity receiving funds from the state directly under the Contract or indirectly through a subcontract under the Contract. The acceptance of funds directly under the Contract or indirectly through a subcontract under the Contract acts as acceptance of the authority of the state auditor, under the direction of the legislative audit committee, to conduct an audit or investigation in connection with those funds. Under the direction of the legislative audit committee, an entity that is the subject of an audit or investigation by the state auditor must provide the state auditor with access to any information the state auditor considers relevant to the investigation or audit.

  • Billing and Payment Procedures and Final Accounting 6.1.1 The Connecting Transmission Owner shall xxxx the Interconnection Customer for the design, engineering, construction, and procurement costs of Interconnection Facilities and Upgrades contemplated by this Agreement on a monthly basis, or as otherwise agreed by those Parties. The Interconnection Customer shall pay all invoice amounts within 30 calendar days after receipt of the invoice.

  • E9 Audit E9.1 The Contractor shall keep and maintain until six (6) years after the end of the Contract Period, or as long a period as may be agreed between the Parties, full and accurate records of the Contract including the Services supplied under it, all expenditure reimbursed by the Authority, and all payments made by the Authority. The Contractor shall on request afford the Authority or the Authority’s representatives such access to those records and processes as may be requested by the Authority in connection with the Contract.

  • Contact Tracing While the employees are on the job site, Producers may require that employees participate in systems that enable contact tracing, such as use of a “punch card” system to record the employee’s location throughout the day or by means of electronic devices (e.g., phone “apps” or wearable electronic devices that track the movement or location of a person or which detect when a person wearing the device comes into close contact with another person wearing the device). Producers may require employees to sign documentation consenting to the use of such electronic devices in contact tracing. In the event that a Producer uses electronic devices for contact tracing, it may access information collected from those devices only for purposes of tracing individuals that the employee has been in contact with during working hours when there has been a COVID- 19-related event, or for purposes of managing and enforcing social distancing protocols.

  • Utilization Scale STATE shall scale logs or portions of logs that are broken, wasted, or not removed by PURCHASER due to: (1) improper felling or bucking of the logs; (2) failure to remove the logs prior to deterioration; and (3) logs remaining on the timber sale area after completion of logging, provided the logs were merchantable prior to breakage or wastage. Material used to meet down material requirements in the section titled, "Reserved Timber," shall not be considered for utilization scale. PURCHASER shall pay for the logs at the contract price designated in Section 44. STATE shall notify PURCHASER of the volume of logs so scaled. Payment shall be considered due on such volume as if the logs were removed on the date of said notification. In the event PURCHASER disagrees with the findings made by STATE under this section, PURCHASER may furnish scaling by a third-party scaling organization acceptable to STATE. Costs and expenses of such third party shall be paid for by PURCHASER, and the findings of the third party shall be final.

  • Response to Evaluation The teacher shall have the right to make a written response to the evaluation and to have it attached to the evaluation report to be placed in the teacher's personnel file. A copy, signed by both parties, shall be provided to the teacher.

  • PRICING/AUDIT The Contractor shall establish and maintain a reasonable accounting system, which enables ready identification of Contractor’s cost of goods and use of funds. Such accounting system shall also include adequate records and documents to justify all prices for all items invoiced as well as all charges, expenses and costs incurred in providing the goods for at least five (5) years after completion of this contract. The County or its designee shall have access to such books, records, subcontract(s), financial operations, and documents of the Contractor or its subcontractors, as required to comply with this section for the purpose of inspection or audit anytime during normal business hours at the Contractor's place of business. This right to audit shall include the Contractor’s subcontractors used to procure goods under the contract with the County. Contractor shall ensure the County has these same rights with subcontractors and suppliers.

  • Originating Line Number Screening (OLNS Upon request, Verizon will update its database used to provide originating line number screening (the database of information which indicates to an operator the acceptable billing methods for calls originating from the calling number (e.g., penal institutions, COCOTS).

  • DNS name server availability Refers to the ability of a public-­‐DNS registered “IP address” of a particular name server listed as authoritative for a domain name, to answer DNS queries from an Internet user. All the public DNS-­‐registered “IP address” of all name servers of the domain name being monitored shall be tested individually. If 51% or more of the DNS testing probes get undefined/unanswered results from “DNS tests” to a name server “IP address” during a given time, the name server “IP address” will be considered unavailable.

  • Desk Audits The Department or its designee may monitor compliance of financial records by desk audits. Audits may be supplemented by phone interviews with financial staff in the juvenile probation department, county auditor’s office, and county treasurer’s’ office. Findings will result in a performance rating profile report or a Non - Compliance Citation Report (NCCR). Grantee shall ensure its agents comply with all requests for information during the course of the audit.

Time is Money Join Law Insider Premium to draft better contracts faster.