Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.
Appears in 6 contracts
Samples: Research and Data Security Agreement, Research and Data Security Agreement, Research and Data Security Agreement
Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files files, and other storage media are kept in secure locations.
Appears in 4 contracts
Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization either party have access to it. This means that computer data bases databases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.
Appears in 3 contracts
Samples: Local Education Agency Participation Agreement, Local Education Agency Participation Agreement, Local Education Agency Participation Agreement
Information Security Procedures. It is critical that Highly Confidential Information be kept secure and protected from unauthorized disclosure. Therefore, all the Highly Confidential Information shared pursuant to this Agreement must be stored securely so that only authorized users within the organization have access to it. This means that computer data bases should be password protected; that precautions are taken to ensure that access through modems, networks, and the Internet is carefully monitored and limited to authorized users; and that data tapes, disks, paper files and other storage media are kept in secure locations.
Appears in 1 contract
Samples: okhighered.org