CORD-19:f20c8063e9b843c787707e5fc938200b3fd14ebf / 207231-207466 JSONTXT

Annnotations TAB JSON ListView MergeView

    CORD-19_Custom_license_subset

    {"project":"CORD-19_Custom_license_subset","denotations":[{"id":"T46","span":{"begin":0,"end":235},"obj":"Sentence"}],"text":"• Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? •"}

    CORD-19-Sentences

    {"project":"CORD-19-Sentences","denotations":[{"id":"T76540","span":{"begin":0,"end":235},"obj":"Sentence"}],"namespaces":[{"prefix":"_base","uri":"http://pubannotation.org/ontology/tao.owl#"}],"text":"• Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? •"}

    Epistemic_Statements

    {"project":"Epistemic_Statements","denotations":[{"id":"T798","span":{"begin":0,"end":233},"obj":"Epistemic_statement"}],"text":"• Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? •"}