Non-Identification of Subjects Sample Clauses

Non-Identification of Subjects. 1. The RECIPIENT and PI agree that they will not attempt to identify or contact the subjects or institutions that are included in the Data Set.
AutoNDA by SimpleDocs
Non-Identification of Subjects. Submitter agrees that all submitted data have been ‘de-identified’ so that the identities of subjects cannot be readily ascertained or otherwise associated with the data by the NIMH Data Archive staff or secondary data users (45 C.F.R. 46.102(f)). Xxxxxxxxx also agrees to verify that submitted data lack identifying information after submission. Submitter further agrees to not disclose the identities of research participants to the NIMH Data Archive staff in the future and to notify the NIH as soon as possible after submission if the Submitter discovers identifying information in the data that are submitted.
Non-Identification of Subjects. Submitted data can be a limited data set (a limited data set may include city; state; ZIP Code; elements of date; and other numbers, characteristics, or codes not listed as direct identifiers but no other PHI) or a de-identified data set, so long as it is in accordance with the submitting institution’s policies and IRB. Xxxxxxxxx agrees not to disclose the identities of research participants to the HHEAR Data Repository.
Non-Identification of Subjects. The principal investigator(s) and all collaborators of NVDRS RAD agree to the following confidentiality restrictions: • NVDRS data will be used solely for statistical analyses related to the approved project. No attempt will be made to identify specific individuals, households, or institutions. Data lists at the individual level will not be published or distributed. • In the event of inadvertent discovery of the identity of any person during the course of the proposed project, the principal investigator(s) will (1) send an email to the RAD Help Desk at xxxxx-xxx@xxx.xxx which will then be routed by CDC to notify the NCIPC Associate Director for Science; (2) safeguard or destroy the identifying information as directed by the CDC; and (3) make no use of knowledge of the discovery. The identifying information must not be disclosed to any other individual or party. • State VDRS data provided to CDC are protected under an Assurance of Confidentiality pursuant to Section 308(d) of the Public Health Service Act. An Assurance of Confidentiality is a formal confidentiality protection for data maintained by CDC authorized under Section 308(d) of the Public Health Service Act. • If the data use agreement is violated, the principal investigator will be restricted from using NVDRS data in the future. (xxxxx://xxx.xxx.xxx/rdc/Data/b4/section308.pdf) • The data files provided to the researcher must be stored on, and accessed from, the secure computer system of the researcher’s affiliated organization or institution. This means that the researcher should store files on a server that is behind a firewall, has data encryption, permits file access only to the approved researchers, and has encrypted network communications. The researcher would then access the files from a password-protected institutional desktop or laptop. If a secure computer system is not available, the researcher should store files on an encrypted, password-protected, stand-alone computer or laptop protected by anti-virus and anti-malware software. • The inadvertent disclosure of potentially identifying information is to be avoided by using the following guidelines for the release of statistics derived from the requested dataset. For any data release format:

Related to Non-Identification of Subjects

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • User Identification 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Product Identification Before removal from Sale Area, unless Contracting Officer determines that circumstances warrant a written waiver or adjustment, Purchaser shall:

  • Your Member Identification Card Your BCBSRI member ID card is your key to getting healthcare coverage. It shows your healthcare provider that you’re part of the nation’s most trusted health plan. All BCBSRI members receive ID cards, which provide important information about your coverage. This card is for identification only, and you must show it whenever you receive healthcare services. Please note you must be a current member to receive covered services. Tips for keeping your card safe: • Carry it with you at all times. • Keep it in a safe location, just as you would with a credit card or money. • Let BCBSRI know right away if it is lost or stolen.

  • Contractor’s Staff Identification Contractor shall provide, at Contractor’s expense, all staff providing services under this Contract with a photo identification badge.

  • Identification Badges Identification badges will be supplied by Advanced Behavioral Health (ABH) to all credentialed individuals who are providing services to children. Badges must be presented to the child/youth and any present adults at the time of service and must be worn for the duration of the service. Badges will be updated every two years during the re- credentialing process. Any individual or agency who fails to submit a photo ID to ABH within the designated timeframe will have their credentialing status terminated.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Personal Identification Number We will issue you a Personal Identification Number (PIN) for use with your Card at VISA NET automatic teller machines (ATM’s). These numbers are issued to you for your security purposes. These numbers are confidential and should not e disclosed to third parties. You are responsible for safekeeping your PIN. You agree not to disclose or otherwise make available your PIN to anyone not authorized to sign on your Accounts. To keep your Account secure, please do not write your PIN on your Card or keep it in the same place as your Card.

Time is Money Join Law Insider Premium to draft better contracts faster.