We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Management of Data Sample Clauses

Management of DataBoth parties acknowledge the unique nature of their relationship and operations at the Jointly Operated Facilities and commit to the cooperative and proper joint management of data and personal information obtained through the operations contemplated by this Agreement. The parties acknowledge and agree that all data and other personal information collected in the course of their operations at or from the Jointly Operated Facilities or otherwise administered using IT Assets will be managed in compliance with all Applicable Laws and will only be used for the original intent for which it was collected.
Management of Data i. Management of Data generated within a single VDC will be determined by the terms of the agreements that govern that VDC. ii. The ownership of Data is outside the scope of these Guiding Principles and should be addressed by the CAVD Members under a separate contractual arrangement. iii. No CSF shall assert against any CAVD Member any database rights, copyrights, moral rights or other rights in the Data incorporated into any database by a CSF in support of the CAVD. The CAVD Member that submitted Data (or Materials used to generate the Data) to the CSF shall not assert against any CAVD Members any database rights, copyrights, or moral rights to such Data incorporated into a database by a CSF in support of the CAVD.
Management of DataThe Parties agree that during the transition period qualitative and quantitative data and information on any issues relevant to the roll-out of the NDIS, taken together with the outcomes from other jurisdictions, will be shared with all governments to facilitate national data collection and consolidation that will contribute to the analysis of costs, liabilities, service interventions, service delivery models and implementation strategies.
Management of DataData subjects
Management of Data. The EDCP shall manage the wind data set following the existing guidelines of the EDCP.
Management of Data. 5.9.1. The Supplier shall provide a copy of all Contracting Authority data to the Authority at a frequency to be determined by the Authority but at least monthly. 5.9.2. The Supplier shall provide account, consumption, metering and billing information in a format and frequency prescribed by the Contracting Authority at Call Off stage. 5.9.3. The Supplier shall make provision for consumption and billing data to be extracted in XLS, CSV and PDF formats and where required work with a Contracting Authority on bespoke File Transfer Protocol (FTP) to enable them to extract data in a format to load into their own systems. 5.9.4. The provision of data may include but is not limited to the following service provisions:  online portal;  acceptance of meter reading entries;  meter reading records;  historical consumption data;  viewable and downloadable invoice data;  consolidated billing viewing;  multiple user access;  variable viewing options;  Contracting Authority account details including sub sets of sites where the Contracting Authority has responsibility for a number of sites within a portfolio; and  Site list with information comprising but not limited to full address, meter details including meter supply point number, meter type and meter serial number. 5.9.5. The Supplier shall ensure that Contracting Authorities information and data (electronic and physical) shall be collected, held and maintained in a secure and confidential manner and in accordance with the Terms of the Framework Agreement and any Call Off Contract. 5.9.6. If a Contracting Authority has a report on water related data in response to a change in legislation the Supplier will provide the information requested by the Contracting Authority.
Management of Data. 7.1 CSIRO does not give any guarantee that it will keep back-up copies of Data or at all and you agree that CSIRO will not be responsible for any loss of Data. 7.2 Where the Data includes Personal Information you must ensure that any Client has given all necessary consents to allow such Data to be stored on the Portal, accessed by your Authorised Users and by CSIRO Personnel for the Purpose. 7.3 In dealing with any Data, CSIRO will: (a) where such Data is Personal Information, comply with the requirements of the Privacy Xxx 0000 (Cth); and (b) put in place appropriate security measures to ensure there is no unlawful or unauthorised access to the Data.
Management of Data i. The ownership of Data is outside the scope of these Guiding Principles and may be addressed by the Third Party and CAVD Member(s) concerned under a separate contractual arrangement or in an attached Material Transfer Record Form. ii. A Third Party that submitted Materials used to generate CAVD Data shall not assert against any CAVD Members any database rights, copyrights, or moral rights to CAVD Data incorporated into a database in support of the CAVD.
Management of Data 

Related to Management of Data

  • Management Services Agreement The term "Management Services ----------------------------- Agreement" shall mean this Management Services Agreement by and between Practice and Business Manager and any amendments hereto.

  • Management Reporting (a) Provide periodic reports, in accordance with agreed upon frequency and content parameters, to the Funds. As reasonably requested by the Funds, the Transfer Agent shall furnish ad hoc reports to the Funds.

  • Information Management Information and Records

  • Management Reports Promptly upon receipt thereof, copies of all detailed financial and management reports submitted to the Company by independent auditors in connection with each annual or interim audit made by such auditors of the books of the Company.

  • Management and Control Systems Grantee will: 1. maintain an appropriate contract administration system to ensure that all terms, conditions, and specifications are met during the term of the contract through the completion of the closeout procedures. 2. develop, implement, and maintain financial management and control systems that meet or exceed the requirements of Uniform Statewide Accounting System (UGMS). Those requirements and procedures include, at a minimum, the following: i. Financial planning, including the development of budgets that adequately reflect all functions and resources necessary to carry out authorized activities and the adequate determination of costs; ii. Financial management systems that include accurate accounting records that are accessible and identify the source and application of funds provided under each Contract of this Contract, and original source documentation substantiating that costs are specifically and solely allocable to a Contract and its Contract and are traceable from the transaction to the general ledger; iii. Effective internal and budgetary controls; iv. Comparison of actual costs to budget; determination of reasonableness, allowableness, and allocability of costs; v. Timely and appropriate audits and resolution of any findings; vi. Billing and collection policies; and vii. Mechanism capable of billing and making reasonable efforts to collect from clients and third parties.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Property Management Agreement The Property Management Agreement is in full force and effect and, to Borrower's Knowledge, there are no defaults thereunder by any party thereto and no event has occurred that, with the passage of time and/or the giving of notice would constitute a default thereunder.

  • Management Information To be Supplied to CCS no later than the 7th of each month without fail. Report are to be submitted via MISO CCS Review 100% Failure to submit will fall in line with FA KPI FROM THE FOLLOWING, PLEASE SELECT AND OUTLINE YOUR CHARGING MECHANISM FOR THIS SOW. WHERE A CHARGING MECHANISM IS NOT REQUIRED, PLEASE REMOVE TEXT AND REPLACE WITH “UNUSED”. 5.1 CAPPED TIME AND MATERIAL CHARGES 5.2 PRICE PER STORY POINT CHARGES 5.3 TIME AND MATERIALS CHARGES

  • Retention of Data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.