Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.
Cost Responsibility for Interconnection Facilities and Distribution Upgrades 4.1 Interconnection Facilities 4.2 Distribution Upgrades
Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements
Engineer Responsibilities No subcontract relieves the Engineer of any responsibilities under this contract.
Owner Responsibilities The project owner or the engineer or architect of record acting as the owner’s agent shall fund special inspection services.
The Publisher’s Responsibilities Subject always to the other provisions of this Clause below, the Publisher will undertake the production, publication and distribution of the Contribution and the Work in print and/or electronic form at its own expense and risk within a reasonable time after acceptance of the Work unless the Publisher is prevented from or delayed in doing so due to any circumstances beyond its reasonable control. The Publisher shall have the entire control of such production, publication and distribution determined in its sole discretion in relation to any and all editions and versions of the Contribution and the Work, including in respect of all the following matters: (a) distribution channels, including determination of markets; (b) determination of the range and functions of electronic formats and/or the number of print copies produced; (c) publication and distribution of the Contribution, the Work, or parts thereof as individual content elements, in accordance with market demand or other factors; (d) determination of layout and style as well as the standards for production; (e) setting or altering the list price, and allowing for deviations from the list price (if permitted under applicable jurisdiction); (f) promotion and marketing as the Publisher considers most appropriate. All rights, title and interest, including all intellectual property or related rights in the typography, design and/or look-and-feel of the Contribution shall remain the exclusive property of and are reserved to the Publisher. All illustrations and any other material or tangible or intangible property prepared at the expense of the Publisher including any marketing materials remain, as between the Parties, the exclusive property of the Publisher. The provisions of this subclause shall continue to apply notwithstanding any termination of, and/or any reversion of rights in the Contribution to the Author, under this Agreement. Without prejudice to the Publisher's termination and other rights hereunder including under the Clause "The Author's Responsibilities", it is agreed and acknowledged by the Parties that nothing in this Agreement shall constitute an undertaking on the part of the Publisher to publish the Contribution unless and until: (i) any and all issues in relation to the Work (including all necessary revisions, consents and permissions) raised by the Publisher have been resolved to the Publisher’s satisfaction, and (ii) the Publisher has given written notice of acceptance in writing of the final manuscript of the entire Work to the Editor. If following (i) and (ii) above the Publisher has not published the Contribution in any form within a reasonable period and the Author has given written notice to the Publisher requiring it to publish within a further reasonable period and the Publisher has failed to publish in any form, then the Author may terminate this Agreement by one month's written notice to the Publisher and all rights granted by the Author to the Publisher under this Agreement shall revert to the Author (subject to the provisions regarding any third party rights under any subsisting licence or sub-licence in accordance with the Clause "Termination"). The Author may also give such written notice requiring publication on the same terms as above if the Publisher has published the Contribution but subsequently ceases publishing the Contribution in all forms so that it is no longer available. This shall be the Author's sole right and remedy in relation to such non-publication and is subject always to the Author's continuing obligations hereunder including the Clause "Warranty".
Customer’s Responsibilities 9.1 If and to the extent applicable or under the control of the Customer, Customer shall provide complete and accurate information regarding requirements for the Project and the Site(s), including, without limitation, constraints, space requirements, underground or hidden facilities and structures, and all applicable drawings and specifications. 9.2 Customer shall prepare, file for, and use commercially reasonable efforts to obtain all Required Approvals necessary to perform its obligations under this Agreement. 9.3 Customer shall reasonably cooperate with Company as required to facilitate Company’s performance of the Work.
Customer Responsibilities Notwithstanding the above, Customer agrees that except as provided by this DPA, Customer is responsible for its secure use of the Services, including securing its account authentication credentials, protecting the security of Customer Data when in transit to and from the Services and taking any appropriate steps to securely encrypt or backup any Customer Data uploaded to the Services.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Money Market Fund Compliance Testing and Reporting Services Subject to the authorization and direction of the Trust and, in each case where appropriate, the review and comment by the Trust’s independent accountants and legal counsel, and in accordance with procedures that may be established from time to time between the Trust and the Administrator, the Administrator will: