DATA STANDARDS AND DATA SHARING Sample Clauses

DATA STANDARDS AND DATA SHARING. Data sharing and access is an important consideration for grant recipients. Data collected under grants should be available to secondary users and for future comparative analyses. It is a requirement that grant recipients submit monitoring data to Ecology’s Environmental Information Management (EIM) database at xxxx://xxx.xxx.xx.xxx/eim/ to store and access their data on the Internet. Data is submitted to EIM using online data submittal tools available at: xxxx://xxx.xxx.xx.xxx/eim/. Additionally, grant recipients may choose to develop their own databases, and these tools also provide a good model for data standards. Having many stand-alone databases can make data sharing difficult, but steps are being taken at the national level to improve data sharing. Since 1998 the U.S. Environmental Protection Agency (EPA) and the States have been working in partnership to improve access to environmental data. This has lead to the concept of the “Network Node,” a place in cyberspace where environmental data can be uploaded and shared using common data exchange templates. Washington State has, along with Oregon, Idaho, and Alaska, successfully developed a prototype Website where environmental data from all four states can be searched and downloaded. It is known as the Pacific Northwest Water Quality Data Exchange and is available at: xxxx://xxx00.xxx.xxxxx.xx.xx/pnwwqx/
AutoNDA by SimpleDocs

Related to DATA STANDARDS AND DATA SHARING

  • Data Sharing Stripe may share information about your Stripe Account, including User Information, with Payment Method Providers and Payment Method Acquirers as Stripe believes necessary to verify your eligibility to use the Stripe Payments Services, establish any necessary accounts or credit with Payment Method Providers and Payment Method Acquirers, monitor Transactions and other activity, and conduct risk management and compliance reviews. Stripe may also share data, including Protected Data, with Payment Method Providers and Payment Method Acquirers, and they may use and share this data, for the purpose of assessing your compliance with Financial Services Terms and facilitating Stripe’s, the Payment Method Providers’, and the Payment Method Acquirers’ compliance with Law, Payment Method Rules and Payment Method Terms. You waive your right to bring any claim against Stripe arising from Stripe sharing information about User Group with Payment Method Providers and Payment Method Acquirers, including any inclusion on a Terminated Merchant List that results from this sharing. Stripe may periodically review your Stripe Account information to verify that you are eligible to use the Stripe Payments Services.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • CONTRACT WORK HOURS AND SAFETY STANDARDS As per the Contract Work Hours and Safety Standards Act (40 U.S.C. 3701-3708), where applicable, all Customer Purchase Orders in excess of ,000 that involve the employment of mechanics or laborers must include a provision for compliance with 40 U.S.C. 3702 and 3704, as supplemented by Department of Labor regulations (29 CFR Part 5). Under 40 U.S.C. 3702 of the Act, each contractor must be required to compute the wages of every mechanic and laborer on the basis of a standard work week of 40 hours. Work in excess of the standard work week is permissible provided that the worker is compensated at a rate of not less than one and a half times the basic rate of pay for all hours worked in excess of 40 hours in the work week. The requirements of 40 U.S.C. 3704 are applicable to construction work and provide that no laborer or mechanic must be required to work in surroundings or under working conditions which are unsanitary, hazardous or dangerous. These requirements do not apply to the purchases of supplies or materials or articles ordinarily available on the open market, or contracts for transportation or transmission of intelligence.

  • Contract Work Hours and Safety Standards Act The following clauses apply to any Federal-aid construction contract in an amount in excess of $100,000 and subject to the overtime provisions of the Contract Work Hours and Safety Standards Act. These clauses shall be inserted in addition to the clauses required by 29 CFR 5.5(a) or 29 CFR 4.6. As used in this paragraph, the terms laborers and mechanics include watchmen and guards.

  • Personnel Requirements and Documentation Grantee will;

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!