Limited use and retention of the information Sample Clauses

Limited use and retention of the information. The ‘sensitive’ and ‘non sensitive’ information collected on the MASH Enquiry Form will only be used by the MASH for the purposes of establishing whether a child or young person is suffering or is at risk of suffering harm and whether any serious criminal offences have been committed. Personal data will only be shared outside the MASH, in accordance with this agreement and in compliance with the GDPR 2018. Personal data means data, which relate to a living individual who can be identified- a.) from those data, or
AutoNDA by SimpleDocs
Limited use and retention of the information. The personal information collected as part of this agreement will be used by the partners signed up to this agreement for the purposes of supporting Early Help provision and only shared with individuals or partners in accordance with this agreement and in compliance with the Data Protection Act 1998. The information received by partners as part of this information sharing will be held for no longer than is necessary for the duration of the provision of services as part of Early Help and until the end of the year in which the child or young person reaches the age of 25, unless a longer retention period can be justified. As part of the Government’s expanded national troubled families programme the Department for Communities and Local Government (DCLG) are conducting a National Impact Study which will evaluate the impact of the programme. Information will be shared with the Office of National Statistics which is undertaking this work on behalf of the Government for evaluation and research purposes. This information sharing with the DCLG is covered under a separate data sharing agreement concerned with the expanded troubled families programme (signed 23 June 2015). Where information is received by Devon County Council about an individual who, within his or her family group, does not meet the threshold to receive Early Help, this information will be deleted after 12 months. This is because information will be received from partner agencies at different times so any one piece of data will need to be held for 12 months so an annual cycle can be completed. Holding the information securely Devon County Council owns and maintains the systems used for the purposes of recording information regarding Early Help provision and uses these systems to: - Match personal information and identify families that might need support; - Record and store information about children, young people and their families; - Enable the sharing of relevant information with partners; - Evaluate outcomes for families that have received support; - Compare outcomes for families that have received support with those that have not. Devon County Council is classed as the ‘Data Controller’ under the Data Protection Act 1998 for the information held on these systems. Access to the information held on these systems will be restricted on a need-to-know basis to a number of Devon County Council and partner employees for the purpose of supporting Early Help provision. Staff working to support Early Help p...

Related to Limited use and retention of the information

  • Access and Retention of Records Contractor agrees to provide the department, Legislative Auditor, or their authorized agents, access to any records necessary to determine contract compliance. (Section 18-1-118, MCA). Contractor agrees to create and retain records supporting the services rendered or supplies delivered for a period of eight years after either the completion date of the contract or the conclusion of any claim, litigation, or exception relating to the contract taken by the State of Montana or third party.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • Tenant Information Copies of the Leases and any financial statements or other financial information of any tenants under the Leases (and the Lease guarantors, if any), written information relative to the tenants’ payment histories, and tenant correspondence, to the extent Seller has the same in its possession;

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Personal Data, Confidentiality, Recording of Telephone Calls and Records 22.1. The Company may collect client information directly from the Client (in his completed Account Opening Application Form or otherwise) or from other persons including, for example, the credit reference agencies, fraud prevention agencies, banks, other financial institutions, third authentication service providers and the providers of public registers.

  • Customer Information and Release Authorization Throughout this Agreement, you authorize Clearview Energy or its agents to obtain and review information from credit-reporting agencies regarding your credit history and information from the Utility relating to you and your account that includes, but is not limited to: account name and number; billing history; payment history; rate classification; historical and future electricity usage; meter readings; and characteristics of electricity service. Clearview Energy will not provide or sell such information to any other party without your consent unless required to do so by law, or it is necessary to enforce the terms of this Agreement. Clearview Energy reserves the right to reject your enrollment, or terminate this Agreement, in the event you rescind these authorizations.

Time is Money Join Law Insider Premium to draft better contracts faster.