PRIVACY PROTECTION ISSUES IN PILOT USE Sample Clauses

PRIVACY PROTECTION ISSUES IN PILOT USE. CASE SCENARIOS The WP7 activities that have been taken into consideration for the analysis of potential personal data protection aspects are divided into the following pilot use cases: a: Cybersecurity Testing of 5G-ready applications and network services (Task 7.2) • PUC1.b: Cybersecurity of Next Generation Mobile Core SBA (Task 7.3) • PUC2.a: 5G Security Training for Experts (Task 7.4) • PUC2.b: 5G Security Training for Non-Experts (Task 7.4) • PUC3: Cybersecurity Investment Decision Support (Task 7.5) In the context of the Deliverable D9.8 (“POPD-Requirement No. 8), all five pilot testing activities have been taken into consideration for the analysis of potential ethics concerns relative to the collection and processing of personal data. A preliminary analysis of the privacy protection issues in the SPIDER pilot use case scenarios, as conducted by the pilot partners at the time of writing this deliverable, is presented in Table 1. The provided ethics summary also contains information from the ethics perspective of humans’ participation in the SPIDER pilot use cases. PUC1a ● NO human participants will be involved. ● NO personal data will be collected. ● NO real end telecommunication systems operating end-user’s communications will be involved. ● NO real user traffic will be collected. Only simulated/synthetic traffic will be used or, for the traffic generated by the trainees during their participation, it will not be possible to link to the participants. PUC1b ● NO human participants will be involved. ● NO personal data will be collected. ● NO real user traffic will be collected. Only simulated/synthetic traffic will be used or, for the traffic generated by the trainees during their participation, it will not be possible to link to the participants. PUC2a ● There will be human participants, but ● NO personal data will be collected. PUC3 ● NO human participants will be involved. ● NO personal data will be collected. It is evident from Table 1 that in all five pilot use case scenarios of the SPIDER project: (a) no personal data will be collected; (b) no real user traffic will be collected (only simulated/synthetic traffic will be used). Since no personal data will be collected, this fact minimises the risks associated with the collection, storage and processing of data without decreasing the accuracy of the studies. As a result of the detailed analysis provided in the Deliverable D9.8 (“POPD-Requirement No. 8) regarding the various use cases for demonstrat...
AutoNDA by SimpleDocs

Related to PRIVACY PROTECTION ISSUES IN PILOT USE

  • Privacy Protection The Grantee shall comply with all applicable federal and state privacy laws, including Section 631 of the Cable Act and regulations adopted pursuant thereto.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and its respective Subsidiaries may presently have and, after the Effective Time, may gain access to or possession of confidential or proprietary Information of, or personal Information relating to, Third Parties: (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or the other Party’s Subsidiaries, on the other hand, prior to the Effective Time or (ii) that, as between the two parties, was originally collected by the other Party or the other Party’s Subsidiaries and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause its Subsidiaries and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary Information of, or personal Information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or the other Party’s Subsidiaries, on the one hand, and such Third Parties, on the other hand.

  • Applicability of Data Privacy Protections In the event that Personal Information will be Processed by Supplier in connection with the performance under this Agreement (including any SOW), then and only then shall the provisions of this Section ‘Data Protection and Privacy’ be applicable. For the avoidance of doubt, the data security requirements contained in section ‘Information Security’ shall apply regardless of whether Personal Information is Processed under this Agreement or any SOW. All Personal Information obtained from or on behalf of DXC or in connection with performance pursuant to this Agreement shall be Processed and protected pursuant to this Section ‘Data Protection and Privacy’, the Section ‘Information Security’ and any other Sections of this Agreement that address Personal Information.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • ACCESS TO PROTECTED HEALTH INFORMATION 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524. 7.2 If any Individual requests access to Protected Health Information directly from Business Associate or its agents or Subcontractors, Business Associate shall notify Covered Entity in writing within two (2) days of the receipt of the request. Whether access shall be provided or denied shall be determined by Covered Entity. 7.3 To the extent that Business Associate maintains Protected Health Information that is subject to access as set forth above in one or more Designated Record Sets electronically and if the Individual requests an electronic copy of such information, Business Associate shall provide the Individual with access to the Protected Health Information in the electronic form and format requested by the Individual, if it is readily producible in such form and format; or, if not, in a readable electronic form and format as agreed to by Covered Entity and the Individual.

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "Accenture Personal Data" means personal data owned, licensed, or otherwise controlled or processed by Accenture including personal data processed by Accenture on behalf of its clients. “Accenture Data” means all information, data and intellectual property of Accenture or its clients or other suppliers, collected, stored, hosted, processed, received and/or generated by Supplier in connection with providing the Deliverables to Accenture, including Accenture Personal Data.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • TEACHER PROTECTION A. The teachers shall have the right to review those things in his/her personnel file to which he/she is entitled by Law. At the option of the teacher, a representative of the Association may be present for such review. Each file shall contain a record indicating reviewer and date of review, excluding school personnel official access for record maintenance. B. The teacher may submit a written notation regarding any material and the same will be attached to the file copy of the material in question. If the teacher is asked to sign material placed in his/her file, such signature will be understood to indicate his/her awareness of the material but in no instance shall said signature be interpreted to mean agreement with the content of the material. X. Any serious complaint made against a teacher by any parent, student, and other person will be promptly called to the attention of the teacher. D. If a teacher is to be disciplined or reprimanded by the Board or its designee, he/she shall be entitled to have a representative of the Association present. That representative shall be the teacher's choice between the building representative or another Association officer. E. Each teacher has the responsibility for maintaining proper student control and discipline throughout the school day as well as at school-sponsored activities where he/she is serving as a sponsor or chaperone. The teacher, however, has the primary responsibility for maintaining control and discipline in his/her classroom. The Board will give reasonable support and assistance to teachers with respect to maintenance of control and discipline. Whenever is appears that a particular pupil requires special attention, reasonable steps shall be taken to provide such attention. The teachers recognize that all disciplinary actions and methods invoked by them shall be in accordance with established Board policy. F. Any case of assault upon a teacher which is related to a school-centered problem shall be promptly reported to the Board or its designated representative. If the assault was by a pupil or pupils, the Administration shall promptly investigate the matter and determine suitable discipline for the assaulting pupil. This decision shall be communicated to the teacher concerned. If the assault is by an adult, who is not a pupil, the Board its designee representative shall promptly report the incident to the proper law enforcement authorities. G. A teacher may suspend a pupil from one (1) period, when the grossness of the offense, the persistence of the misbehavior, or the disruptive effect of the violation makes the continued presence of the student in that classroom intolerable. In such cases, the teacher will promptly (by the end of the school day) furnish the administrator or counselor full particulars of the incident. The teacher and the administration will cooperatively endeavor to achieve correction of student behavior through whatever avenues are reasonably available. H. School administrators and teachers will endeavor to achieve correction of the students' misbehavior through counseling and interviews with the child and his/her parents when warranted.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!