Identification of study subjects Sample Clauses

Identification of study subjects. To the extent the Recipient is in receipt of key-coded or otherwise anonymized data, the Recipient will not attempt to re-identify material from study subjects and will implement appropriate internal policies, procedures, or protocols to minimize the risk of any identification of material related to the study subjects. If the Recipient receives or obtains from the University, Personal Data that unintentionally reveal the identity of a study subject, the Recipient will promptly, within ten (10) days of discovery, notify the University. The Recipient will then cooperate with the University in order to remedy the unintentional disclosure and to minimize the risk of recurrence.
AutoNDA by SimpleDocs
Identification of study subjects. If Institution receives key-coded or otherwise de-identified or anonymized data relating to the Biological Samples, Institution will not attempt to identify the Pfizer Study Subjects to which the data relates and will implement appropriate internal policies, procedures, or protocols to minimize the risk of any such identification. If Institution receives or obtains from Pfizer any information that unintentionally reveals the identity of a Pfizer Study Subject, Institution will notify Pfizer within ten (10) days of discovery of the identification. Institution will then cooperate with Pfizer to remedy the unintentional disclosure and to minimize the risk of recurrence.

Related to Identification of study subjects

  • Evaluation of Students Acknowledging the District’s adopted grading system, the teacher shall maintain the right and responsibility to determine grades and other evaluation of a student. No grade or evaluation shall be changed except by the teacher with the approval of the building administrator.

  • Accreditation of Public Schools and Adoption and Implementation of School Plans The District will implement a system of accrediting all of its schools, as described in section 22-11- 307, C.R.S., which may include measures specifically for those schools that have been designated as Alternative Education Campuses, in accordance with the provisions of 1 CCR 301-57. The District will ensure that plans are implemented for each school in compliance with the requirements of the State Board pursuant to 1 CCR 301-1.

  • Transportation of Students Employees will not be required to transport students.

  • Admission and Enrollment of Students For a student to be accepted and enrolled into a dual credit program, the STUDENT shall:

  • Technical Feasibility of String While ICANN has encouraged and will continue to encourage universal acceptance of all top-­‐level domain strings across the Internet, certain top-­‐level domain strings may encounter difficulty in acceptance by ISPs and webhosters and/or validation by web applications. Registry Operator shall be responsible for ensuring to its satisfaction the technical feasibility of the TLD string prior to entering into this Agreement.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Distribution of UDP and TCP queries DNS probes will send UDP or TCP “DNS test” approximating the distribution of these queries.

  • COOPERATION IN IMPLEMENTATION On demand of the other Spouse and without undue delay or expense, each Spouse shall execute, acknowledge, or deliver any instrument, furnish any information, or perform any other acts reasonably necessary to carry out the provisions of this Agreement. If a Spouse fails to execute any document as required by this provision, the court may appoint the court clerk or his or her authorized designee to execute the document on that Xxxxxx’s behalf.

  • Rectification of Safety Hazard 60.12 Where, because of the existence of a safety hazard, a site has been stopped for a defined period of time and Employees sent off site by agreement between Site Managers and any combination of Union Official/s, Health and Safety Committee, those people who remain on site to do rectification work will be paid at the rate of double time for all such work.

Time is Money Join Law Insider Premium to draft better contracts faster.