Access, Storage and Disposition of Data Sample Clauses

Access, Storage and Disposition of Data. The Agencies agree to provide adequate security arrangements for access to, storage, and disposition of all input files, linked files, extracts, and printed listings/outputs, to prevent unauthorized use or disclosure of these data. In case of any conflicting data security or safeguard updates and until written notification concerning data security and safeguards of data can be mutually agreed upon by the Agencies, each agency will adhere to the requirements of the Federal Information Security Management Act, as amended, and Office of Management and Budget guidelines to fully protect the confidentiality of each agency's data.
AutoNDA by SimpleDocs

Related to Access, Storage and Disposition of Data

  • Access To, Return, and Disposition of Data Upon written request of LEA, Operator shall dispose of or delete all Data obtained under the Service Agreement when it is no longer needed for the purpose for which it was obtained, and transfer said data to LEA or LEA’s designee within sixty (60) days of the date of termination and according to a schedule and procedure as the Parties may reasonably agree. Operator acknowledges LEA’s obligations regarding retention of governmental data, and shall not destroy Data except as permitted by LEA. Nothing in the Service Agreement shall authorize Operator to maintain Data obtained under the Service Agreement beyond the time period reasonably needed to complete the disposition. Disposition shall include (1) the shredding of any hard copies of any Data; (2) Data Destruction; or (3) Otherwise modifying the personal information in those records to make it unreadable or indecipherable. Operator shall provide written notification to LEA when the Data has been disposed of. The duty to dispose of Data shall not extend to data that has been de-identified or placed in a separate Student account, pursuant to the other terms of the DPA. The LEA may employ a “Request for Return or Deletion of Data” FORM, a sample of this form is attached on Exhibit “D”). Upon receipt of a request from the LEA, the Operator will immediately provide the LEA with any specified portion of the Data within five (5) business days of receipt of said request.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

  • Retention and disposal 9.5.1. Information shared under this Agreement will be securely stored and disposed by secure means when no longer required for the purpose for which it is provided as per each parties’ Information Security Policy, unless otherwise agreed in a specific case, and legally permitted. Each party will determine and maintain their own retention schedule.

  • Permitted Uses and Disclosures of PHI 2.1 Unless otherwise limited herein, Business Associate may:

  • Permitted Use and Disclosure Each party hereto is permitted to disclose this AGREEMENT and use or disclose the CONFIDENTIAL INFORMATION disclosed to it by the other party:

  • Permitted Uses and Disclosures i. Business Associate shall use and disclose PHI only to accomplish Business Associate’s obligations under the Contract.

  • Disposition of Documents All documents prepared by the Engineer and all documents furnished to the Engineer by the State shall be delivered to the State upon request by the State. The Engineer, at its own expense, may retain copies of such documents or any other data which it has furnished the State under this contract, but further use of the data is subject to permission by the State.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • PERMITTED USES AND DISCLOSURES BY CONTRACTOR Except as otherwise limited in this Schedule, Contractor may use or disclose Protected Health Information to perform functions, activities, or services for, or on behalf of, County as specified in the Agreement; provided that such use or disclosure would not violate the Privacy Rule if done by County.

  • Data Disposition When the contracted work has been completed or when the Data is no longer needed, except as noted above in Section 5.b, Data shall be returned to DSHS or destroyed. Media on which Data may be stored and associated acceptable methods of destruction are as follows: Data stored on: Will be destroyed by: Server or workstation hard disks, or Removable media (e.g. floppies, USB flash drives, portable hard disks) excluding optical discs Using a “wipe” utility which will overwrite the Data at least three (3) times using either random or single character data, or Degaussing sufficiently to ensure that the Data cannot be reconstructed, or Physically destroying the disk Paper documents with sensitive or Confidential Information Recycling through a contracted firm, provided the contract with the recycler assures that the confidentiality of Data will be protected. Paper documents containing Confidential Information requiring special handling (e.g. protected health information) On-site shredding, pulping, or incineration Optical discs (e.g. CDs or DVDs) Incineration, shredding, or completely defacing the readable surface with a coarse abrasive Magnetic tape Degaussing, incinerating or crosscut shredding

Time is Money Join Law Insider Premium to draft better contracts faster.