
CORD-19:f20c8063e9b843c787707e5fc938200b3fd14ebf / 207231-207466
Annnotations
CORD-19_Custom_license_subset
{"project":"CORD-19_Custom_license_subset","denotations":[{"id":"T46","span":{"begin":0,"end":235},"obj":"Sentence"}],"text":"• Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? •"}
CORD-19-Sentences
{"project":"CORD-19-Sentences","denotations":[{"id":"T76540","span":{"begin":0,"end":235},"obj":"Sentence"}],"namespaces":[{"prefix":"_base","uri":"http://pubannotation.org/ontology/tao.owl#"}],"text":"• Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? •"}
Epistemic_Statements
{"project":"Epistemic_Statements","denotations":[{"id":"T798","span":{"begin":0,"end":233},"obj":"Epistemic_statement"}],"text":"• Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? •"}