Common use of Technical Security Controls Clause in Contracts

Technical Security Controls. A. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Appears in 2 contracts

Samples: Whole Person Care Agreement, www.co.monterey.ca.us

AutoNDA by SimpleDocs

Technical Security Controls. A. 1. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS CCHCS PHI or PI Pl must be encrypted using a FIPS 140-2 Annex A certified algorithm which is 128bit 256 bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS CCHCS Information Security Office.

Appears in 1 contract

Samples: www.bidnet.com

AutoNDA by SimpleDocs

Technical Security Controls. A. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS Covered Entity PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security OfficeCovered Entity.

Appears in 1 contract

Samples: Administrative Services Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.