Common use of Technology Risk Clause in Contracts

Technology Risk. 1. Does the proposed change apply new or additional information technologies that have substantial potential for privacy intrusion? … No. The core new technologies have been tried and proven over several years and access to the technology is controlled by strict role based access controls and security and audit measures. This method is more secure and safer than previous methods such as printed records, fax, letter and multiple systems. Identity Risk

Appears in 5 contracts

Samples: www.regisa.uk, regisa.uk, regisa.uk

AutoNDA by SimpleDocs

Technology Risk. 1. Does the proposed change apply new or additional information technologies that have substantial potential for privacy intrusion? … No. The core new technologies have been technology and processes are tried and proven over several many years and access to have been in use in the technology is controlled by strict role based access controls and security and audit measures. This method is more secure and safer than previous methods such as printed records, fax, letter and multiple systemsspecific context of Connected Care since 2016. Identity Risk

Appears in 5 contracts

Samples: regisa.uk, www.regisa.uk, regisa.uk

Technology Risk. 1. Does the proposed change apply new or additional information technologies that have substantial potential for privacy intrusion? … NoYes. The However, the core new technologies have been tried and proven over several years and access to the technology is controlled by strict role based access controls and security and audit measures. This method is more secure and safer than previous methods such as printed records, fax, letter and multiple systems. Identity Risk

Appears in 2 contracts

Samples: www.regisa.uk, regisa.uk

AutoNDA by SimpleDocs

Technology Risk. 1. Does the proposed change apply new or additional information technologies that have substantial potential for privacy intrusion? … No. The core new technologies have been technology and processes are tried and proven over several many years and access to have been in use in the technology is controlled by strict role based access controls specific context of Connected Care since 2016 and security and audit measures. This method is more secure and safer than previous methods such for over a decade with the Hampshire CHIE (formerly known as printed records, fax, letter and multiple systemsthe Hampshire Health Record). Identity Risk

Appears in 1 contract

Samples: www.regisa.uk

Time is Money Join Law Insider Premium to draft better contracts faster.