Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.
Appears in 6 contracts
Sources: Research and Data Security Agreement, Research and Data Security Agreement, Research and Data Security Agreement
Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files files, and other storage media are kept in secure locations.
Appears in 4 contracts
Sources: Data Use & Security Agreement, Data Use & Security Agreement, Data Privacy & Security
Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization either party have access to it. This means that computer data bases databases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.
Appears in 3 contracts
Sources: Participation Agreement, Local Education Agency Participation Agreement, Local Education Agency Participation Agreement
Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.
Appears in 1 contract