We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Data archiving Sample Clauses

Data archiving. 7.1 Subject to the pre-existing obligations above, storage of data is the responsibility of the User/Institution to whom it belongs. Unless the Instruct-XXXX Centre explicitly offers a data archive service, Users are responsible for copying and making arrangements for the long term storage of the Experimental data. In this latter case the facility will collect and maintain an accountable proof of the transfer of the data to the user, for verification purposes. 7.2 Subject to future developments in the context of the European Open Science Cloud (EOSC) and of the approval of the appropriate Instruct-XXXX internal protocols of actions, and if in the future the EOSC initiative will provide the opportunity to store all, or a subset, of the experimental data acquired at Instruct-XXXX Centres in the course of Instruct-XXXX Access projects, then Instruct-XXXX will implement the necessary actions to take full advantage of such an opportunity. These data will be appropriately labelled using, for instance, Digital Object Identifiers (DOI).
Data archiving. The Collaboration Board shall elaborate in due time a data archiving strategy and long term data access, evaluate its cost and will propose to the Financial Board its implementation.
Data archiving. Hubspan reserves the right to archive certain data beginning 60 days after transaction date. Hubspan Service Level Agreement This Service Level Agreement provides definitions used throughout the document, defines Priority Levels relative to Technical Support, and includes details relative to Technical Support Services. In addition, this document defines exclusions to Hubspan’s Service.
Data archiving. All SIEM data compressed and a SHA1 hash of each archive is stored in the platform database for data integrity purposes.
Data archiving. As noted above, hydroacoustic surveys typically produce several hundred megabytes of data and so a substantial and robust data archiving system is essential. The safe storage of such data is essential not only in order to allow analyses to be repeated with contemporary software using variations in analytical parameters, but also to allow them to be revisited with future developments in analytical software which may allow their analysis in new ways. In addition, unless read into dedicated playback or analysis software which can be cumbersome when large volumes of files are being managed, raw data files are largely uninformative other than perhaps the date and time of their collection being incorporated into the file name. Consequently, archived raw data files should be accompanied by metadata files. The latter can be as simple as spreadsheets, or as complex as a relational database or geographic information system.
Data archiving. The use case is about implementing data archiving for raw data from experiments to an external facility and the restore of the data. STFC38 has worked in this use case, both as a provider of storage to be used for archiving (ECHO Storage at STFC) and for investigating solutions to perform efficient backup. Initially the Rucio39 and FTS40 services have been evaluated in order to move data from ILL as a facility selected as pilot. Both services are available in the EOSC portal41, 42and offered by STFC as a provider. In order to use Rucio and FTS, there has been the need to install a gridftp server on the ILL facility as the data transfer is implemented only between storage endpoints. After the initial tests, the archive solution via Rucio has been discarded due to the need to ingest datasets inside the Rucio database which is a requirement to perform the data archiving operations. The usage of rclone43 has then been piloted, given that the storage at STFC offers also an S3 interface which is easily accessible via that tool. The pilot via rclone has given successful results in terms of usability and performance, and the amount of data archived at STFC storage has reached 200 TB.
Data archiving. It is advised that original data will be archived on a hard disk (on a laptop/desktop PC) at the partner’s institution. The lead researcher in charge will make additional backup copies of the data at least once a week on a remote hard disk. This remote hard disk then will be kept in a secure area (possibly outside the laboratory – for data redundancy reasons). Processed data is also to be uploaded to the FTP site (see section 6.5.1), which will act as an additional back-up and system to share information between the partners.

Related to Data archiving

  • Archiving You may make one copy of the Software solely for archival purposes. If the Software is an upgrade, you may use the Software only in conjunction with upgraded product. If you receive your first copy of the Software electronically, and a second copy on media afterward, the second copy can be used for archival purposes only. For all Neevia Tech products, you agree that you will only use our software on a server and all applications that will access the server will reside on the server and you will not permit remote access to the software except through your application residing on the server. You agree to surrender your license(s) if you violate this agreement. If you violate this agreement, you will not receive a refund upon termination of this license. You agree not to utilize our software to violate the copyright of any third parties. If you do violate the copyright of a third party utilizing our software, you agree to hold Neevia Tech harmless and will indemnify Neevia Tech for any such activity even if the violation is unintentional. The Software is owned by Neevia Tech and/or its suppliers, and is protected by the copyright and trademark laws of the United States and related applicable laws. You may not copy the Software except as set forth in the "License" section. Any copies that you are permitted to make pursuant to this Agreement must contain the same copyright and other proprietary notices that appear on or in the Software. You may not rent, lease, sub-license, transfer, or sell the Software. You may not modify, translate, reverse engineer, decompile, disassemble, or create derivative works based on the Software, except to the extent applicable law expressly prohibits such foregoing restriction. You may use the trademarks to identify the Software owner's name, or to identify printed output produced by the Software. Such use of any trademark does not give you any rights of ownership in that trademark. The Software is provided AS IS. NEEVIA TECH AND ITS SUPPLIERS MAKE NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE MERCHANTABILITY, QUALITY, NONINFRINGEMENT OF THIRD PARTY RIGHTS, FITNESS FOR A PARTICULAR PURPOSE, AND THOSE ARISING BY STATUTE OR OTHERWISE IN LAW OR FROM A COURSE OF DEALING OR USAGE OF TRADE. THE ENTIRE RISK AS TO THE QUALITY, RESULTS BY USING THE SOFTWARE, AND PERFORMANCE OF THE SOFTWARE IS WITH THE END USER. Some states or jurisdictions do not allow the exclusion or limitation of incidental, consequential or special damages, or the exclusion of implied warranties or limitations on how long an implied warranty may last, so the above limitations may not apply to you or your company.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.