Common use of Security Continued Clause in Contracts

Security Continued. Individually identifiable information from the records will be maintained on a computer system to which users, other than those listed in Clause 2, have access. Yes No If yes, access to the information will be restricted through the use of passwords and by other computer security measures that prevent unauthorized access, and can trace such unauthorized access, including the following methods:

Appears in 3 contracts

Sources: Access to Personal Information for Research or Statistical Purposes, Access to Personal Information for Research or Statistical Purposes, Access to Personal Information for Research or Statistical Purposes

Security Continued. Individually identifiable information from the records will be maintained on a computer system to which users, other than those listed in Clause 2, have access. Yes No If yes, access to the information will be restricted through the use of passwords and by other computer security measures that prevent unauthorized access, and can trace such unauthorized access, including the following methods::  

Appears in 1 contract

Sources: Agreement for Access to Personal Information for Research or Statistical Purposes