Evaluation of data Sample Clauses

Evaluation of data. An evaluation of the test results shall be made. The evaluation shall include the relation- ship between the doses of the test sub- stance and the presence or absence, in- cidence, and severity of any neurotoxic effect. The evaluation shall include ap- propriate statistical analyses. The choice of analyses shall consider tests appropriate to the experimental design and needed adjustments for multiple comparisons.
AutoNDA by SimpleDocs
Evaluation of data. A n ev a l u a t io n of t h e t es t r es u l t s s h a ll be m a de. T h e ev a l u a t io n s h a ll i n cl u de t h e r el a t io n- s h ip be t wee n t h e doses of t h e t es t s u b- s t a n ce a n d t h e p r ese n ce o r a bse n ce, i n- cide n ce, a n d seve r i t y of a ny n e ur o t oxic effec t . T h e ev a l u a t io n s h a ll i n cl u de a p- p r op r i a t e s t a t i s t ic a l a n a l y ses. T h e c h oice of a n a l y ses s h a ll co n s ide r t es t s a pp r op r i a t e t o t h e expe r i m e n t a l desig n a n d n eeded a dj u s t m e n t s fo r m u l t iple co m p a r i so n s.
Evaluation of data. An evaluation of the test results shall be made. The evaluation shall include the relation- ship between the doses of the test sub- stance and the presence or absence, in- cidence, and severity of any neurotoxic effect. The evaluation shall include ap- propriate statistical analyses. The choice of analyses shall consider tests appropriate to the experimental design and needed adjustments for multiple comparisons. (e) References. For additional back- ground information on this test guide- line, the following references should be consulted: (1) Xxxxx, X., Xxxxxx-Xxx, X., Xxx- xxx, C.A., Xxxxxx, X.X., Xxxxxx, X.X., Xxxxxxx, X.X., Xxxxxx, X.X., and Xxxxxx, X.X. ‘‘Collaborative behavioral tera- tology study: Protocol design and test- ing procedure.’’ Neurobehavioral Toxi- cology and Teratology. 7: 579–586. (1985).
Evaluation of data. ‌ D.1.a. Calculations or data treatments to be used for this project include the following: Provide information about calculations or data treatments if not specified in the agreement or work plan.
Evaluation of data. In addition to the routine compilation of the monitoring data collected, data evaluations include: 1. Compare results to water quality standards established for the Upper South Platte River Basin; 2. Perform time-trend and spatial analyses for selected annual monitoring programs; 3. Evaluate historical data; and 4. Verify and validate data, and conduct statistical evaluation for outliers.

Related to Evaluation of data

  • Retention of Data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Return of Data In the event of the termination of Executive’s employment with Company for any reason whatsoever, Executive agrees to deliver promptly to Company all formulas, correspondence, reports, computer programs and similar items, customer lists, marketing and sales data and all other materials pertaining to Confidential Information, and all copies thereof, obtained by Executive during the period of Executive’s employment with Company which are in Executive’s possession or under his control. Executive further agrees that Executive will not make or retain any copies of any of the foregoing and will so represent to Company upon termination of his employment.

  • Destruction of Data Provider shall destroy or delete all Personally Identifiable Data contained in Student Data and obtained under the DPA when it is no longer needed for the purpose for which it was obtained or transfer said data to LEA or LEA’s designee, according to a schedule and procedure as the parties may reasonable agree. Nothing in the DPA authorizes Provider to maintain personally identifiable data beyond the time period reasonably needed to complete the disposition.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

  • Duration of processing and erasure or return of data Processing by the data importer shall only take place for the duration specified in Annex I.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA. (b) If applicable, once the transfer of PII has been accomplished in accordance with the EA’s written election to do so, Contractor agrees to return or destroy all PII when the purpose that necessitated its receipt by Contractor has been completed. Thereafter, with regard to all PII (including without limitation, all hard copies, archived copies, electronic versions, electronic imaging of hard copies) as well as any and all PII maintained on behalf of Contractor in a secure data center and/or cloud-based facilities that remain in the possession of Contractor or its Subcontractors, Contractor shall ensure that PII is securely deleted and/or destroyed in a manner that does not allow it to be retrieved or retrievable, read or reconstructed. Hard copy media must be shredded or destroyed such that PII cannot be read or otherwise reconstructed, and electronic media must be cleared, purged, or destroyed such that the PII cannot be retrieved. Only the destruction of paper PII, and not redaction, will satisfy the requirements for data destruction. Redaction is specifically excluded as a means of data destruction. (c) Contractor shall provide the EA with a written certification of the secure deletion and/or destruction of PII held by the Contractor or Subcontractors. (d) To the extent that Contractor and/or its subcontractors continue to be in possession of any de-identified data (i.e., data that has had all direct and indirect identifiers removed), they agree not to attempt to re-identify de-identified data and not to transfer de-identified data to any party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!