Data Access and Security. The following diagram identifies how these data access and security controls are applied to protect data within the Software, as well as within PHI when Shared Data is provided by the Software to the PHN and stored within the PHN’s secure Lockbox within PHI: Schedule 3 – End User License Agreement (▇▇▇▇)
Appears in 1 contract
Data Access and Security. The following diagram identifies how these data access and security controls are applied to protect data within the Software, as well as within PHI when Shared Data is provided by the Software to the PHN and stored within the PHN’s secure PHN Lockbox within PHI: Schedule 3 – End User License Agreement (▇▇▇▇):
Appears in 1 contract