Resource holders must establish data access agreements that define the appropriate use of and access to the data covered, as well as procedures for obtaining authorization to waive restrictions. Clearly identify the data holder (by name and/or role) and identify the data you want to access. Collect or indicate the user`s name and location and responsibility (based on login) that requires access to the record. I will obtain permission from the data holder before providing the [system name] data to a person who has not accepted the terms of the data access contract. Data protection in this system is governed by the following laws, policies and regulations:— Below you will find a template for an independent access agreement. The presentation and sample text are provided as a guide and should be tailored to the specifics of each system/dataset. I agree with the terms of this data access agreement. and does not enter such or other Level 2 data into the system [system name]. Secondary memories/systems may not be created from the [system name] data without the prior authorisation of the data holder and the recording and authorisation of the secondary memory/system with the IOC office. Notification to users of MSSEI security requirements for individual devices: links to other relevant documents, for example. B Minimum Security Standard for Electronic Information (MSSEI) Minimum Security Standard for Connected Devices (MSSND) Berkeley Data Classification Standard Protection Profiles Data Protection Profiles Intentioned and Authorized to Use Data.

.