Common use of Information Security Procedures Clause in Contracts

Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.

Appears in 6 contracts

Sources: Research and Data Security Agreement, Research and Data Security Agreement, Research and Data Security Agreement

Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files files, and other storage media are kept in secure locations.

Appears in 4 contracts

Sources: Data Use & Security Agreement, Data Use & Security Agreement, Data Privacy & Security

Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization either party have access to it. This means that computer data bases databases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.

Appears in 3 contracts

Sources: Participation Agreement, Local Education Agency Participation Agreement, Local Education Agency Participation Agreement

Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.

Appears in 1 contract

Sources: Fafsa Data Portal Completion Agreement