CORD-19:f20c8063e9b843c787707e5fc938200b3fd14ebf / 207231-207466
Annnotations
CORD-19_Custom_license_subset
Id | Subject | Object | Predicate | Lexical cue |
---|---|---|---|---|
T46 | 0-235 | Sentence | denotes | • Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? • |
CORD-19-Sentences
Id | Subject | Object | Predicate | Lexical cue |
---|---|---|---|---|
T76540 | 0-235 | Sentence | denotes | • Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? • |
Epistemic_Statements
Id | Subject | Object | Predicate | Lexical cue |
---|---|---|---|---|
T798 | 0-233 | Epistemic_statement | denotes | • Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? |