ANONYMIZATION AND PSEUDONYMIZATION Sample Clauses

ANONYMIZATION AND PSEUDONYMIZATION. Under these rules, all the collected personal data must be processed in accordance with certain principles and conditions that aim to limit the negative impact on the persons concerned and ensure fairness, transparency and accountability of the data processing, data quality and confidentiality. As described in Deliverable 10.1, CarE-Service does not intend to collect, store and/or process sensitive data (health, genetic or biometric data). CarE-Service may collect, store and monitor both “anonymous” and “non-anonymous” non-sensitive personal data. This implies the following main obligations for all the participants: • Data processing should be subject to appropriate safeguards. • Data should, wherever possible, be processed in anonymized or pseudonymized form (D10.1, Chapter 2). • Data processing is subject to free and fully informed consent of the persons concerned (unless already covered by another legal basis, e.g. legitimate or public interest). • Data processing must NOT be performed in secret and research participants must be made aware that they take part in a research project and be informed of their rights and the potential risks that the data processing may bring. • Data may be processed ONLY if it is really adequate, relevant and limited to what is necessary for the research (‘data minimization principle’). Collection of personal data (e.g. on religion, sexual orientation, race, ethnicity, etc.) is not essential and relevant with the scope of the research and the project, therefore the collection of sensitive personal data is not permitted. It is recommended all participants or partners use anonymized or pseudonymized data for project purposes.
AutoNDA by SimpleDocs

Related to ANONYMIZATION AND PSEUDONYMIZATION

  • Diagnostic procedures to aid the Provider in determining required dental treatment.

  • Clinical 1.1. Provides comprehensive evidence based nursing care to patients including assessment, intervention and evaluation.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • EVALUATION AND MONITORING The ORGANIZATION agrees to maintain books, records and other documents and evidence, and to use accounting procedures and practices that sufficiently and properly support the complete performance of and the full compliance with this Agreement. The ORGANIZATION will retain these supporting books, records, documents and other materials for at least three (3) calendar years following the year in which the Agreement expires. The COUNTY and/or the State Auditor and any of their representatives shall have full and complete access to these books, records and other documents and evidence retained by the ORGANIZATION respecting all matters covered in and under this Agreement, and shall have the right to examine such during normal business hours as often as the COUNTY and/or the State Auditor may deem necessary. Such representatives shall be permitted to audit, examine and make excerpts or transcripts from such records, and to make audits of all contracts, invoices, materials, and records of matters covered by this Agreement. These access and examination rights shall last for three calendar years following the year in which the Agreement expires. The COUNTY intends without guarantee for its agents to use reasonable security procedures and protections to assure that related records and documents provided by the ORGANIZATION are not erroneously disclosed to third parties. The COUNTY will, however, disclose or make this material available to those authorized by/in the above paragraph or permitted under the provisions of Chapter 42.56 RCW without notice to the ORGANIZATION. The ORGANIZATION shall cooperate with and freely participate in any other monitoring or evaluation activities pertinent to this Agreement that the COUNTY finds needing to be conducted.

  • Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.

Time is Money Join Law Insider Premium to draft better contracts faster.