Information Ownership and Data Control Sample Clauses

Information Ownership and Data Control. The Lead Force shall procure that the MSPTU will disseminate strategic intelligence about recurring themes, linked investigations, offender methodology. This intelligence will be held within and disseminated through the Lead Force’s intelligence systems to relevant FIBs/national systems. The Lead Force’s policies for information ownership, handling, review and data control will take primacy over the information assets established through this team. The Chief Officer of the Lead Force is identified as the Data Controller for the Programme. The Lead Force shall procure that the MSPTU SMT will work together to identify the most appropriate continuation strategy for this team, ensuring the information collected is not lost to the police service.
AutoNDA by SimpleDocs
Information Ownership and Data Control. Local ROCU policies for information ownership, handling, review and data control will take primacy over the information assets held regionally by the Regional Transformation Teams. The Lead Force’s policies for information ownership, handling, review and data control will take primacy over the information assets established at a national level through this team. The Chief Officer of the Lead Force is identified as the Data Controller for the Programme. The Lead Force shall procure that the MSPTU SMT and ROCU SMT will work together to identify the most appropriate Exit Strategy for this team, ensuring the information collected is not lost to the police service. During operational debriefing activity, the Regional Transformation Teams will flag to the lead Force/agency/ROCU of the operation being debriefed any tactical and strategic intelligence which is valuable and has been overlooked. Responsibility for submitting this intelligence remains with the lead Force/agency/ROCU. The Lead Force shall procure that the National Delivery Coordinator and regional analyst manager will record, and where appropriate submit and disseminate briefing material about recurring themes, linked investigations, developments in understanding victimology, offender methodology.
Information Ownership and Data Control. Local West Yorkshire OPCC policies for information ownership, handling, review and data control will take primacy over the information assets held by the NATMSN Coordinator. The West Yorkshire PCC is identified as the Data Controller for the network. The Lead Force shall procure that the MSPTU SMT and West Yorkshire Programme Lead will work together to identify the most appropriate exit strategy for this role, ensuring the information collected is not lost to the police service.
Information Ownership and Data Control. Local ROCU/MPS policies for information ownership, handling, review and data control will take primacy over the information assets held regionally by the Regional Strategic Analysts. The Lead Force’s policies for information ownership, handling, review and data control will take primacy over the information assets established at a national level through this team. The Chief Officer of the Lead Force is identified as the Data Controller for the programme. The Programme Director, ROCU Modern Slavery Project Lead and the MSPTU SMT will work together to identify the most appropriate continuation strategy for this team, ensuring the information collected and knowledge gained is not lost to the police service. Responsibility for submitting operational intelligence remains with the Lead Force/Agency/ROCU.
Information Ownership and Data Control. Local ROCU policies for information ownership, handling, review and data control will take primacy over the information assets held regionally by the Regional Co-ordinators. The Lead Force’s policies for information ownership, handling, review and data control will take primacy over the information assets established at a national level through this team. The Chief Officer of the Lead Force is identified as the Data Controller for the programme. The Lead Force shall procure that the Programme Director ROCU Modern Slavery Project Lead and the MSPTU SMT will work together to identify the most appropriate exit strategy for this team, ensuring the information collected is not lost to the police service. During operational debriefing activity, the Regional Co-ordinator will flag to the lead Force/Agency/ROCU of the operation being debriefed any tactical and strategic intelligence which is valuable and has been overlooked. Responsibility for submitting this intelligence remains with the lead Force/Agency/ROCU. The Lead Force shall procure that the National Delivery Coordinator will record, and where appropriate submit and disseminate strategic intelligence about recurring themes, linked investigations, offender methodology. This intelligence will be held within and disseminated through Devon & Cornwall intelligence systems to relevant FIBs/National Systems.
Information Ownership and Data Control. The Lead Force shall procure that the National Insight Team will disseminate strategic intelligence about recurring themes, linked investigations, offender methodology. This intelligence will be held within and disseminated through the Lead Force’s intelligence systems to relevant FIBs/National Systems. The Lead Force’s policies for information ownership, handling, review and data control will take primacy over the information assets established through this team. The Chief Officer of the Lead Force is identified as the Data Controller for the Programme. The Lead Force shall procure that the Programme Director and the MSPTU SMT will work together to identify the most appropriate continuation strategy for this team, ensuring the information collected is not lost to the police service. Responsibility for submitting this intelligence remains with the Lead Force/Agency/ROCU.

Related to Information Ownership and Data Control

  • Data Ownership and Use All data obtained from the MLS System is federally copyrighted and remains the property of MLSSAZ. MLSSAZ data is provided solely for publication on the Internet as a tool for consumers to search and view properties available for sale, which have been listed with MLSSAZ members. Utilizing the listing data for any purpose not outlined in this Agreement is not permitted and violates the copyright held by MLSSAZ.

  • Ownership and Control All components of the Placer County Technology Platform, including voicemail, email messages sent and received, files and records created or placed on any County file server, and all data placed onto or accessed by the County’s computer network including internet access, are and remain either the property of or under the control of Placer County and not the User.

  • Data Ownership BA acknowledges that BA has no ownership rights with respect to the Protected Information.

  • Ownership and Reuse of Documents All documents, data, reports, research, graphic presentation materials, etc., developed by Contractor as a part of its work under this Agreement, shall become the property of County upon completion of this Agreement, or in the event of termination or cancellation thereof, at the time of payment under Section 3 for work performed. Contractor shall promptly furnish all such data and material to County on request.

  • OWNERSHIP AND USE OF WORK PRODUCT All reports, studies, information, data, statistics, forms, designs, plans, procedures, systems and any other materials or properties produced in whole or in part under this Agreement in connection with the performance of the Required Services (collectively “Work Product”) shall be the sole and exclusive property of City. No such Work Product shall be subject to private use, copyrights or patent rights by Consultant in the United States or in any other country without the express, prior written consent of City. City shall have unrestricted authority to publish, disclose, distribute, and otherwise use, copyright or patent, in whole or in part, any such Work Product, without requiring any permission of Consultant, except as may be limited by the provisions of the Public Records Act or expressly prohibited by other applicable laws. With respect to computer files containing data generated as Work Product, Consultant shall make available to City, upon reasonable written request by City, the necessary functional computer software and hardware for purposes of accessing, compiling, transferring and printing computer files.

  • Ownership and Use (A) Unless CITY states otherwise in writing, each document— including, but not limited to, each report, draft, record, drawing, or specification (collectively, “work product”)— that CONSULTANT prepares, reproduces, or causes its preparation or reproduction for this Agreement is CITY’s exclusive property.

  • OWNERSHIP AND USE OF DOCUMENTS 1.3.1 All drawings, specifications, estimates, and all other documents, including shop drawings and calculations, prepared at any time in connection with the Project, shall, upon payment for services in connection therewith, become the sole property of the State.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • OWNERSHIP AND USE OF ELIGIBLE CONSUMER DATA Competitive Supplier acknowledges that the Town shall have exclusive ownership of all right, title, and interest in and to all Eligible Consumer data (including addresses, telephone numbers or other identifying information) made available to Competitive Supplier as a result of execution of this ESA. Competitive Supplier shall use Eligible Consumer data solely to provide All- Requirements Power Supply to Participating Consumers and to render other services expressly required or permitted under this ESA. Any other use of Eligible Consumer data without the prior written consent of the Town is strictly prohibited. Pursuant to such authorized use, Competitive Supplier may share such Eligible Consumer data with affiliates and third-party vendors as reasonably necessary to accommodate Competitive Supplier’s provision of All-Requirements Power Supply or other performance pursuant to this ESA (including, without limitation, collection of receivables), provided that Competitive Supplier will take reasonable measures to inform any such vendor of the confidential nature of such data and the restrictions set forth in this Article 2.5 and elsewhere in this ESA. Except as expressly provided in this ESA, Competitive Supplier shall not disclose any Eligible Consumer data to any third-party that has not executed a non-disclosure certificate or agreement in a form mutually acceptable to the Parties, and Competitive Supplier shall take Commercially Reasonable measures to protect Eligible Consumer data from access by, or beneficial use for, any third-party. Notwithstanding the foregoing, the Parties agree that contract employees and entities with which Competitive Supplier contracts to provide contract employees shall not be deemed third parties for purposes of this Section 2.5. To the extent that the provision of All-Requirements Power Supply or other services under this ESA requires that Competitive Supplier have access to or make use of any Eligible Consumer data, Competitive Supplier shall treat such Eligible Consumer data as confidential information. Competitive Supplier may use Eligible Consumer data to engage in direct marketing only during the term of this ESA and subject to the terms set forth in Article

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

Time is Money Join Law Insider Premium to draft better contracts faster.