Data Innovation Sample Clauses

Data Innovation. 1. The Parties recognise that cross-border data flows and data sharing enable data-driven innovation. The Parties further recognise that innovation may be enhanced within the context of regulatory data sandboxes where data, including personal information,13 is shared amongst businesses in accordance with the Parties’ respective laws and regulations. 2. The Parties also recognise that data sharing mechanisms, such as trusted data sharing frameworks and open licensing agreements, facilitate data sharing and promote its use in the digital environment to: (a) promote innovation and creativity; (b) facilitate the diffusion of information, knowledge, technology, culture and the arts; and 13 For greater certainty, this is without prejudice to Article 4.2 (Personal Information Protection). (c) xxxxxx competition and open and efficient markets. 3. The Parties shall endeavour to collaborate on data-sharing projects and mechanisms, and proof of concepts for new uses of data, including data sandboxes, to promote data-driven innovation.
AutoNDA by SimpleDocs
Data Innovation. 1. The Parties recognise that digitalisation and the use of data in the digital economy promote economic growth. To support the cross-border transfer of information by electronic means and promote data-driven innovation in the digital economy, the Parties further recognise the need to create an environment that enables and supports, and is conducive to, experimentation and innovation, including through the use of regulatory sandboxes where applicable. 2. The Parties shall endeavour to support data innovation through: (a) collaborating on data-sharing projects, including projects involving researchers, academics and industry, using regulatory sandboxes as required to demonstrate the benefits of the cross-border transfer of information by electronic means; (b) cooperating on the development of policies and standards for data portability; and (c) sharing research and industry practices related to data innovation.
Data Innovation. 1. The Parties recognise that cross-border data flows and data sharing enable data-driven innovation. The Parties further recognise that innovation may be enhanced within the context of regulatory data sandboxes where data, including personal information16, is shared amongst businesses in accordance with the applicable domestic laws. 2. The Parties also recognise that data sharing mechanisms, such as trusted data sharing frameworks, and open licensing agreements, facilitate data sharing and promote its use in the digital environment to: (a) Promote innovation and creativity; (b) Facilitate the diffusion of information, knowledge, technology, culture and the arts; and (c) Xxxxxx competition and open and efficient markets. 3. The Parties shall endeavour to collaborate on data-sharing projects and mechanisms, and proof of concepts for new uses of data, including data sandboxes, to promote data-driven innovation.
Data Innovation. The Parties recognise that an Internet access service supplier that offers its subscribers certain content on an exclusive basis would not be acting contrary to this principle.

Related to Data Innovation

  • Innovation In order to make it easier for the municipality to implement innovations that can accelerate the pace of climate transition, Viable Cities will provide a competence network and process support, including by engaging other strategic innovation programmes in the ongoing development of Climate City Contract 2030, particu- larly in the areas of mobility, energy, built environment, the circular economy, health and digitalization. Based on the collaboration agreement on climate-smart mobility signed with the strategic innovation programme Drive Sweden, this area of collabo- ration will be further developed with both cities and government agencies, not least the Swedish Transport Administration.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Data Integrity Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data or Professional Services Data and protect it from disclosure, improper alteration, or destruction.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!