Data Access and Security Sample Clauses
Data Access and Security. The following diagram identifies how these data access and security controls are applied to protect data within the Software, as well as within PHI when Shared Data is provided by the Software to the PHN and stored within the PHN’s secure Lockbox within PHI: Schedule 3 – End User License Agreement (▇▇▇▇)
Data Access and Security. All Agency data is accessible to its own users based upon Agency policies and subject to the requirements of Section V. “Security.” The entire Valcour database is mirrored in real-time between the Cloud Sites as described in Appendix B.
Data Access and Security. We will transmit or otherwise make available data under our control as needed to provide the Service and act on permissible instructions received from the User. We will exercise reasonable care to preserve the confidentiality of User access credentials and prevent the use of the Service by unauthorized persons. You are responsible for all transfers initiated by you or persons to whom you make available the credentials you use to access the Service.
Data Access and Security. The following diagram identifies how these data access and security controls are applied to protect data within the Software, as well as within PHI when Shared Data is provided by the Software to WAPHA and stored within WAPHA’s secure Lockbox within PHI: Schedule 3 – End User License Agreement (▇▇▇▇)
Data Access and Security
