Analytic Queries Sample Clauses

Analytic Queries. From time to time, the Coordinating Center shall issue queries of Network Participant Data seeking return of certain Data in order to prepare for research (each, a “Pre-Research Query”) or for research purposes (each, a “PCORnet Query” and, together with “Pre-Research Query”, the “Analytic Queries”). Each Analytic Query will specify the Data requested, a summary of the objective of the Query and the proposed schedule for return of the Data to the CC. Only the Minimum Necessary amount of Data will be requested by an Analytic Query. When applicable, the CC shall confirm necessary approvals (including approved IRB waivers of the individual authorization requirement and data use agreements, as applicable) are in place prior to transfer of Data received by the CC from Network Participant to Requestor. Network Participant, the CC and/or the Requestor may rely on the receipt of another’s IRB approval, but is not required to do so. IRB approval for the transfer of Data may be obtained by the Parties and/or the Requestor separately. Relevant Data shall flow as outlined in the “Data Flow Description Documentation” attached hereto as Exhibit A. Pursuant to Section III.a.i (Participation in a Query), participation in Analytic Queries is at the discretion of Network Participant.
AutoNDA by SimpleDocs

Related to Analytic Queries

  • Query a search query initiated from the Search Box or a Hyperlink, or a request for Matched Ads initiated by the Ad Code on an Ad Page. Results: Paid Search Results, Hyperlink Results, Domain Match Results, Web Search Results and/or Matched Ads, to the extent included in this Agreement and as appropriate to the context. Search Box: a graphical area in which a user can enter a Query. SO: the Service Order.

  • Analytics 1.1. IFS may track and analyze the usage of the IFS Offering for purposes of determining usage made of the IFS Offering, for the purposes of security, to assist customers, and for improving the Software and Services and the user experience in using such Software and Services. For example, IFS may use this information to help customers derive more value from the Software and Services, to understand and analyze trends, or to track which features are used most often in order to improve the Software and Services. IFS may share anonymous usage data with its service providers for the purpose of helping in such tracking, analysis and improvements. Additionally, IFS may share such anonymous usage data on an aggregate basis in the normal course of operating their business; for example, IFS may share information publicly to show trends about the general use of its software and services. TERMS - SERVICES

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Diagnostic procedures to aid the Provider in determining required dental treatment.

  • WHOIS query RTT Refers to the RTT of the sequence of packets from the start of the TCP connection to its end, including the reception of the WHOIS response. If the RTT is 5-­‐times or more the corresponding SLR, the RTT will be considered undefined.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Metadata Where the Contractor has or generates metadata as a result of services provided to the Province, where that metadata is personal information, the Contractor will: not use it or disclose it to any other party except where the Agreement otherwise specifies; and remove or destroy individual identifiers, if practicable.

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!