Food intake data Sample Clauses

Food intake data. Of all the datasets needed for estimating exposure to food chemical intake, the most abundant by far are food consumption databases. Many of the EU states have programmes for the periodic collection of food consumption data and even where no national programme exists, inevitably, there are small regional surveys available or data from economic studies such as household budget surveys. The methodologies used to collect the data differ from country to country and getting countries to abandon one method for another is difficult given the need to monitor trends and given that methodologies may influence distribution about the mean. However, even if methods were harmonised, another major variability in databases is the way the raw data is retained both in the level of detail and in the system of categorisation. The simple example is data on intakes of “sea food”, to “shell fish” and “fish” and from “fish” to “fatty fish” or “white fish” and from “fatty fish” to “grilled” or “poached” salmon. This variation in detail can occur at the point of data collection or at the point of data entry into established database architecture. Any attempt to create a “harmonised database” as set out in the call, can only happen if the task has very specific questions to the national database managers and that is the case in the present project. When target chemicals are identified, target food categories will be established and it is these target food categories which will form the harmonised food intake database. Such a database will have to exist at several tiers representing different levels of definitions of food categories from highly aggregated to highly disaggregated. The latter databases will be used to establish a set of rules on the use of data such as means and standard deviations to establish predicted high end consumers and also a set of rules will be established for the separate use of data on data from “consumers only” versus the total population which would include non-consumers of the target foods. The present project will extend the state of the art in extending knowledge of food intake data by Agreeing a new tiered and harmonised food intake database structure (WP 5) Populating that database with targeted food intake data from all member states (WP 5) Setting out a series of rules on the use of datasets to project to high end consumers and to ensure that all vulnerable groups are included (WP 5 & 7.1)
AutoNDA by SimpleDocs

Related to Food intake data

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Authoritative Root Database To the extent that ICANN is authorized to set policy with regard to an authoritative root server system (the “Authoritative Root Server System”), ICANN shall use commercially reasonable efforts to (a) ensure that the authoritative root will point to the top-­‐level domain nameservers designated by Registry Operator for the TLD, (b) maintain a stable, secure, and authoritative publicly available database of relevant information about the TLD, in accordance with ICANN publicly available policies and procedures, and (c) coordinate the Authoritative Root Server System so that it is operated and maintained in a stable and secure manner; provided, that ICANN shall not be in breach of this Agreement and ICANN shall have no liability in the event that any third party (including any governmental entity or internet service provider) blocks or restricts access to the TLD in any jurisdiction.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Emergency Alert System The Franchisee shall comply with the applicable requirements of the FCC with respect to the operation of an Emergency Alert System (“EAS”) requirements of the FCC and applicable state and local EAS plans in order that emergency messages may be distributed over the Cable System.

  • Electrical appliance safety The Hirer shall ensure that any electrical appliances brought by them to the premises and used there shall be safe, in good working order, and used in a safe manner in accordance with the Electricity at Work Regulations 1989. Where a residual circuit breaker is provided the hirer must make use of it in the interests of public safety.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

Time is Money Join Law Insider Premium to draft better contracts faster.