Examples of Information access in a sentence
Clearances may require Special Background Investigations, Sensitive Compartmented Information access or Special Access Programs, or agency-specific access.
Only those contractors that meet the required security clearance levels on individual delivery orders are eligible to compete for such delivery orders.Clearances may require Special Background Investigations, Sensitive Compartmented Information access or Special Access Programs, or agency-specific access.
When drafting an RFP or Contract that contemplates Contractor goods or services that will involve using, accessing, storing, processing and/or generating Confidential Information, Agencies will have the following additional considerations, such as: how the data will be used by the Contractor; security of the data; protection for Confidential Information; access to the data; ownership of the data; and return or destruction of data.
Clearances may require Special Background Investigations, Sensitive Compartmented Information access orSpecial Access Programs, or agency-specific access.
Information access legislation gives access to all other information (non-personal data) and as such has a broader remit than data protection legislation.
Information access by the Comptroller General of the United States.
Information access legislation supplements and complements the Data Protection Act (DPA) 2018 and the General Data Protection Regulation, hereafter referred to as data protection legislation, which gives individuals access to their personal information held by organisations.
Covered Parties means any or all of your employees, agents, representatives, subcontractors, Processors, providers of your point of sale equipment or systems or payment processing solutions, and any other party to whom you may provide Cardmember Information access in accordance with this Agreement.
Information access and re-use legislation also specifies a number of exemptions or exceptions (see Appendix 2) which can be claimed by public authorities when denying a request.
Information access and capabilities is based on the "need to know" of each user role.