Best Practices. We suggest that you: • Do not attempt to override technical or management controls to access Data for which you have not been expressly authorized. • Do not use your trusted position and access right to exploit system controls or access Data for any reason other than in the performance of the proposed research. • Ensure that everyone directed to use the system has access to, and is aware of, NESARC-III information Security Best Practices and all existing policies and procedures relevant to the use of NESARC-III, including but not limited to 45 C.F.R. Part 46. • Follow the NESARC-III password policy which includes: o Choose passwords of at least seven characters including at least three of the following types of characters: capital letters, lower case letters, numeric characters and other special characters. o Change your passwords every six months.
Appears in 4 contracts
Samples: Data Use Agreement, Data Use Agreement, Data Use Agreement
Best Practices. We suggest that you: • · Do not attempt to override technical or management controls to access Data for which you have not been expressly authorized. • · Do not use your trusted position and access right to exploit system controls or access Data for any reason other than in the performance of the proposed research. • · Ensure that everyone directed to use the system has access to, and is aware of, NESARC-III information Security Best Practices and all existing policies and procedures relevant to the use of NESARC-III, including but not limited to 45 C.F.R. Part 46. • · Follow the NESARC-III password policy which includes: o Choose passwords of at least seven characters including at least three of the following types of characters: capital letters, lower case letters, numeric characters and other special characters. o Change your passwords every six months.
Appears in 1 contract
Samples: Data Use Agreement