Common use of Information Security Procedures Clause in Contracts

Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.

Appears in 6 contracts

Samples: Research and Data Security Agreement, Research and Data Security Agreement, Research and Data Security Agreement

AutoNDA by SimpleDocs

Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files files, and other storage media are kept in secure locations.

Appears in 4 contracts

Samples: Data Use, Data Use, Data Use

Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization either party have access to it. This means that computer data bases databases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.

Appears in 3 contracts

Samples: Local Education Agency Participation Agreement, Local Education Agency Participation Agreement, Local Education Agency Participation Agreement

AutoNDA by SimpleDocs

Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.

Appears in 1 contract

Samples: okhighered.org

Time is Money Join Law Insider Premium to draft better contracts faster.