Creation of Test Data Sample Clauses

Creation of Test Data. Certain Participants agreed to anonymize PHI to create Test Data to be used by other Participants for Testing. Any Test Data that has been created, or will be created in the future, shall not contain PHI and has been, or will be, created in accordance with the Validation Plan.
AutoNDA by SimpleDocs
Creation of Test Data. Any Test Data that has been created, or will be created shall not contain any personal or individually identifiable information, including without limitation, PHI and has been, or will be, created in accordance with the Onboarding process. Submitter shall submit Test Data that closely approximates the production HIE Data intended to be submitted to NC HIEA.
Creation of Test Data. Participant shall submit test data that closely approximates the production Pharmacy Data intended to be submitted to NC HIEA. Any Test data that has been created, or will be created in the future, shall not contain any personal or individually identifiable information, including without limitation, PHI.
Creation of Test Data. Certain Participants agreed to anonymize PHI to create Test Data to be used by other Participants for Testing. Any Test Data that has been created, or will be created in the future, shall not contain PHI and has been, or will be, created in accordance with the Validation Plan. Accuracy of Message Content. When acting as a Submitter, each Participant, in accordance with Section 17.02, hereby represents that at the time of transmission, the Message Content it provides is (a) an accurate representation of the data contained in, or available through, its System, (b) sent from a System that employs security controls that meet industry standards so that the information and Message Content being transmitted are intended to be free from malicious software in accordance with Section 7.02, and (c) provided in a timely manner and in accordance with the Performance and Service Specifications and Operating Policies and Procedures. Other than those representations in Sections 15.08, 15.09, and 15.10, the Submitter makes no other representation, express or implied, about the Message Content.
Creation of Test Data. TDSO agrees to anonymize PHI or to create fictitious data to be used by NJII and/or other parties for testing purposes. TDSO represents and warrants that its test data shall not contain human-readable PHI and further represents and warrants that it has and/or will only create test data in accordance with the NJHIN’s test principles and policies. Despitethis agreement, any test data of TDSO that contains PHI shall be subject to the terms and conditions of the applicable Business Associate Agreement among the respective Parties as set forth in Exhibit B.
Creation of Test Data. Participants agree that when testing exchange capabilities with other Participants, Participants shall use only fictitious data to create any test data to be used for testing. Using de-identified PHI for this purpose is not allowed.

Related to Creation of Test Data

  • Circumvention of TIPS Sales When a public entity initiates a purchase with Vendor, if the Member inquires verbally or in writing whether Vendor holds a TIPS Contract, it is the duty of the Vendor to verify whether the Member is seeking a TIPS purchase. Any request for quote, customer communication, or customer purchase initiated through or referencing a TIPS Contract shall be completed through TIPS pursuant to this Agreement. Any encouragement or participation by Vendor in circumventing a TIPS sale being completed may result in immediate termination of Vendor’s TIPS Contract(s) for cause as well as preclusion from future TIPS opportunities at TIPS sole discretion.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Contractor Designation of Trade Secrets or Otherwise Confidential Information If the Contractor considers any portion of materials to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to Contract-related materials it has designated trade secret or otherwise confidential.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Distribution of UDP and TCP queries DNS probes will send UDP or TCP “DNS test” approximating the distribution of these queries.

  • Limitation on Use of Information The Fund agrees neither to use the information received from the Intermediary for any purpose other than to comply with SEC Rule 22c-2 and other applicable laws, rules and regulations, nor to share the information with anyone other than its employees who legitimately need access to it. Neither the Fund nor any of its affiliates or subsidiaries may use any information provided pursuant to this Agreement for marketing or solicitation purposes. The Fund will take such steps as are reasonably necessary to ensure compliance with this obligation. The Fund shall indemnify and hold the Intermediaries, individually and collectively, (and any of their respective directors, officers, employees, or agents) harmless from any damages, loss, cost, or liability (including reasonable legal fees and the cost of enforcing this indemnity) arising out of or resulting from any unauthorized use of or disclosure by the Fund of the information received from the Intermediaries pursuant to this Agreement. In addition, because an award of money damages (whether pursuant to the foregoing sentence or otherwise) may be inadequate for any breach of this provision and any such breach may cause the Intermediaries irreparable harm, the Fund also agrees that, in the event of any breach or threatened breach of this provision, the Intermediaries will also be entitled, without the requirement of posting a bond or other security, to seek equitable relief, including injunctive relief and specific performance. Such remedies will not be the exclusive remedies for any breach of this provision but will be in addition to all other remedies available at law or in equity to the Intermediaries. In the event that the Fund is required by legal process, law, or regulation to disclose any information received from the Intermediaries pursuant to this Agreement, the Fund shall provide Intermediaries with prompt written notice of such requirement as far in advance of the proposed disclosure as possible so that the Intermediaries (at their expense) may either seek a protective order or other appropriate remedy which is necessary to protect their interests or waive compliance with this provision to the extent necessary.

  • Distribution of Materials You will keep an accurate record of the names and addresses of all persons to whom you give copies of the Registration Statement, the Prospectus, any Preliminary Prospectus (or any amendment or supplement thereto) or any Offering Circular or any Preliminary Offering Circular and, when furnished with any subsequent amendment to the Registration Statement, any subsequent Prospectus, any subsequent Offering Circular or any memorandum outlining changes in the Registration Statement or any Prospectus or Offering Circular, you will, upon request of the Manager, promptly forward copies thereof to such persons.

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Limitation of Users Access by ALPS’ personnel to the web servers is restricted within ALPS to a limited number of users based upon ALPS’ system administration requirements, as determined by appropriate ALPS’ systems managers from time to time.

  • Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back-Up Policy available at XxxxxXXX.xxx or such other website address as may be notified to the Customer as such document may be amended by the Supplier in its sole discretion from time to time the current version of which is set out at Schedule 3 of this Agreement. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (b) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (c) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (d) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage. 5.5 The Supplier and the Customer shall comply with their respective obligations as set out in Schedule 4 of this Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!