Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.
Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.
Integrity 2.1 Transmission control ☒ VPN connections ☒ The use of private storage media is prohibited ☒ Special protection when physically transporting data media
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.
Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.
Messages If you need to contact your therapist outside of your scheduled appointment, you may contact him / her by calling the direct dial phone number, or you may contact the front desk at 000-000-0000 between 8:30am and 4:30pm, Monday through Friday. After hours, you may contact the front desk and select option 4 for the staff directory. Messages are reviewed by the following business day. If you experience a mental health crisis, please review the section on emergencies below. Please discuss with your therapist any questions about how he / she handles messages.
Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.
Internet Warnings If the Settling Entity offers for sale any of the Products to California consumers through websites such as xxxxxx.xxx that are not reformulated as set forth in subsection 2.2 above, it shall ensure that the required warning (with the language set forth in subsection 2.3 above) is prominently displayed to the purchaser prior to completion of the transaction without requiring the potential buyer to use considerable effort to be made aware of the health hazard advisory. The warning (or a clearly marked hyperlink to the warning using the word “WARNING”) given in conjunction with the online sale of the Products may appear either: (a) prominently placed on a webpage in which the Product’s photograph, price, or “add to cart” section are displayed; (b) on the same webpage as the order form for the Product; or (c) on any webpage displayed to the purchaser during the checkout process and prior to its completion for any purchaser with a California shipping address. The symbol “” may be placed adjacent to the signal word. The internet warning may use the Short-Form Warning content described in subsection 2.3(b). The URL "xxx.X00Xxxxxxxx.xx.xxx" in the Warning may be substituted with an equivalent reference to the official "Proposition 65 Warnings Website."
Data Integrity Control Personal Data will remain intact, complete and current during processing activities.