Common use of Data Access and Security Clause in Contracts

Data Access and Security. The following diagram identifies how these data access and security controls are applied to protect data within the Software, as well as within PHI when Shared Data is provided by the Software to the PHN and stored within the PHN’s secure Lockbox within PHI: Schedule 3 – End User License Agreement (▇▇▇▇)

Appears in 1 contract

Sources: Data Sharing and Software License Agreement

Data Access and Security. The following diagram identifies how these data access and security controls are applied to protect data within the Software, as well as within PHI when Shared Data is provided by the Software to the PHN and stored within the PHN’s secure PHN Lockbox within PHI: Schedule 3 – End User License Agreement (▇▇▇▇):

Appears in 1 contract

Sources: Data Sharing and Software Licence Agreement