Breach of Personally Identifiable Information. Awardees that use or operate a Federal information system or create, collect, use, process, store, maintain, disseminate, disclose, or dispose of Personally Identifiable Information (PII) within the scope of an NSF award, must have procedures in place to respond to a breach of PII. These procedures should promote cooperation and the free exchange of information with NSF, as needed to properly escalate, refer and respond to a breach. Awardees will notify NSF upon learning that a breach of PII within the scope of an NSF award has occurred.
Appears in 6 contracts
Samples: Cooperative Agreement, Cooperative Agreement, Cooperative Agreement
Breach of Personally Identifiable Information. Awardees An awardee that use uses or operate operates a Federal information system or createcreates, collectcollects, useuses, processprocesses, storestores, maintainmaintains, disseminatedisseminates, disclosediscloses, or dispose disposes of Personally Identifiable Information (PII) within the scope of an NSF award, must have procedures in place to respond to a breach of PII. These procedures should promote cooperation and the free exchange of information with NSF, as needed to properly escalate, refer and respond to a breach. Awardees will The awardee must notify NSF upon learning that a breach of PII within the scope of an NSF award has occurred.
Appears in 5 contracts
Samples: Cooperative Agreement, Cooperative Agreement, Cooperative Agreement
Breach of Personally Identifiable Information. Awardees An awardee that use uses or operate operates a Federal information system or createcreates, collectcollects, useuses, processprocesses, storestores, maintainmaintains, disseminatedisseminates, disclosediscloses, or dispose disposes of Personally Identifiable Information (PII) within the scope of an NSF award, must have procedures in place to respond to a breach of PII. These procedures should promote cooperation and the free exchange of information with NSF, as needed to properly escalate, refer and respond to a breach. Awardees will The awardee must notify NSF upon learning that a breach of PII within the scope of an NSF award has occurred.
Appears in 5 contracts
Samples: Cooperative Agreement, Cooperative Agreement, Small Business Innovation Research (Sbir)/Small Business Technology Transfer (Sttr) Phase Ii Cooperative Agreement
Breach of Personally Identifiable Information. Awardees An awardee that use uses or operate operates a Federal information system or createcreates, collectcollects, useuses, processprocesses, storestores, maintainmaintains, disseminatedisseminates, disclosediscloses, or dispose disposes of Personally Identifiable Information (PII) within the scope of an NSF award, must have procedures in place to respond to a breach of PII. These procedures should promote cooperation and the free exchange of information with NSF, as needed to properly escalate, refer and respond to a breach. Awardees will The awardee must notify the cognizant NSF Grants and Agreements Officer upon learning that a breach of PII within the scope of an NSF award has occurred.
Appears in 2 contracts
Samples: Cooperative Agreement, Cooperative Agreement
Breach of Personally Identifiable Information. Awardees that use or operate a Federal information system or create, collect, use, process, store, maintain, disseminate, disclose, or dispose of Personally Identifiable Information (PII) within the scope of an NSF award, must have procedures in place to respond to a breach of PII. These procedures should promote cooperation and the free exchange of information with NSF, as needed to properly escalate, refer and respond to a breach. Awardees will notify NSF upon learning that a breach of PII within the scope of an NSF award has occurred.
Appears in 1 contract
Samples: Cooperative Agreement
Breach of Personally Identifiable Information. Awardees An awardee that use uses or operate operates a Federal information system or createcreates, collectcollects, useuses, processprocesses, storestores, maintainmaintains, disseminatedisseminates, disclosediscloses, or dispose disposes of Personally Identifiable Information (PII) within the scope of an NSF award, must have procedures in place to respond to a breach of PII. These procedures should promote cooperation and the free exchange of information with NSF, as needed to properly escalate, refer and respond to a breach. Awardees will The awardee must notify the cognizant NSF Grants and Agreements Officer upon learning that a breach of PII within the scope of an NSF award has occurred.
Appears in 1 contract
Samples: Cooperative Agreement
Breach of Personally Identifiable Information. Awardees that use or operate a Federal information system or create, collect, use, process, store, maintain, disseminate, disclose, or dispose of Personally Identifiable Information (PII) within the scope of an NSF award, must have procedures in place to respond to a breach of PII. These procedures should promote cooperation and the free exchange of information with NSF, as needed to properly escalate, refer and respond to a breach. Awardees will notify NSF upon learning that a breach of PII within the scope of an NSF award has occurred.occurred.
Appears in 1 contract
Samples: Cooperative Agreement
Breach of Personally Identifiable Information. Awardees An awardee that use uses or operate operates a Federal information system or createcreates, collectcollects, useuses, processprocesses, storestores, maintainmaintains, disseminatedisseminates, disclosediscloses, or dispose disposes of Personally Identifiable Information (PII) within the scope of an NSF award, must have procedures in place to respond to a breach of PII. These procedures should promote cooperation and the free exchange of information with NSF, as needed to properly escalate, refer and respond to a breach. Awardees will The awardee must notify NSF upon learning that a breach of PII within the scope of an NSF award has occurred.occurred.
Appears in 1 contract
Samples: Cooperative Agreement