Data Management Roles Sample Clauses

Data Management Roles. De-Identifiable data Personal information is de-identified if the information is no longer about an identifiable individual or an individual who is reasonably identifiable. De-identification is a process that renders personal information into a form that is not identifiable. As a consequence, it is lawful for it to be shared or disseminated, or put to uses, which may otherwise not be permitted. De-identification involves two steps. The first is the removal of direct identifiers. The second is taking one or both of the following additional steps: • the removal or alteration of other information that could potentially be used to re- identify an individual, and/or • the use of controls and safeguards in the data access environment to prevent re- identification. If you are not clear whether data has been de-identified, set up processes for the research project that comply with the Identifiable or Re-Identifiable data pathways (pathways 2 and 3).
AutoNDA by SimpleDocs
Data Management Roles. Data Sharing Application

Related to Data Management Roles

  • Data Management Contractor will not use State data, including production data, for testing or development purposes unless authorized in writing by the State Chief Information Security Officer or delegate. Contractor will implement and maintain procedures to physically and logically segregate State data, unless otherwise explicitly authorized by the State Chief Information Security Officer or delegate.

  • Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:

Time is Money Join Law Insider Premium to draft better contracts faster.