answersLogoWhite

0

Actually, under #7 in AMA Opinion 5.07 it states "Access to the computerized data base should be controlled through security measures such as passwords, encryption (encoding) of information, and scannable badges or other user identification. "

User Avatar

Wiki User

16y ago

What else can I help you with?