Security Continued. Individually identifiable information from the records will be maintained on a computer system to which users, other than those listed in Clause 2, have access. Yes No If yes, access to the information will be restricted through the use of passwords and by other computer security measures that prevent unauthorized access, and can trace such unauthorized access, including the following methods:
Appears in 3 contracts
Sources: Access to Personal Information for Research or Statistical Purposes, Access to Personal Information for Research or Statistical Purposes, Access to Personal Information for Research or Statistical Purposes
Security Continued. Individually identifiable information from the records will be maintained on a computer system to which users, other than those listed in Clause 2, have access. Yes No If yes, access to the information will be restricted through the use of passwords and by other computer security measures that prevent unauthorized access, and can trace such unauthorized access, including the following methods::
Appears in 1 contract
Sources: Agreement for Access to Personal Information for Research or Statistical Purposes