Protection of Education Records Sample Clauses

Protection of Education Records. NC State has determined that Contractor is a school official with a legitimate educational interest under the Family Educational Rights and Privacy Act (“FERPA”). If NC State provides Contractor with “personally identifiable information” from a student’s education record as defined by FERPA, 34 CFR §99.3, Contractor hereby certifies that collection of this information from NC State is necessary for the performance of the Services under this Agreement. Contractor further certifies that it shall maintain the confidential status of education records in its custody, and that it shall not re-disclose personally identifiable information as directed by FERPA. Failure to abide by legally applicable security measures and disclosure restrictions may result in the interruption, suspension and/or termination of NC State’s relationship with Contractor for a period of at least five (5) years from date of violation. If Contractor experiences a security breach relating to this information or if Contractor re-discloses the information, Contractor shall immediately notify NC State. Contractor shall indemnify NC State for any breach of confidentiality or failure of its responsibilities to protect the personally identifiable information. Specifically, these costs may include, but are not limited to, the cost of notification of affected persons as a result of its unauthorized release.
AutoNDA by SimpleDocs
Protection of Education Records. Contractor agrees to ensure the security, safety, and privacy of the Education Records. Contractor agrees to implement technical and other security measures to do so, including but not limited to the following: a. Encryption of all data while either stored or in transit; b. For all Contractor-owned or controlled accounts with access to the Education Records: i. Multi-factor authentication; ii. Separate, individual user accounts; iii. Logging of all access; iv. Implemented policies and procedures granting access to the Education Records only when absolutely required; v. Criminal background checks to ensure the users of such accounts have no felony convictions, other convictions that may indicate a lack of honesty, or are registered sex offenders; c. Industry-standard physical security and physical access controls, including but not limited to continuous video surveillance of premises owned or leased by Contractor where the Education Records are stored; d. Firewalls for all external data connections; e. Backups of the Education Records to at least one site geographically separated from the primary site by at least two hundred and fifty (250) miles; and f. Implementation of a procedure for regular and timely installation of all necessary software patches and updates on systems storing or with access to the Education Records. Contractor shall ensure its vendors and subvendors with access to the Education Records are contractually required to implement security measures including but not limited to those listed herein.
Protection of Education Records. NC State has determined that Dance Instructor is a school official with a legitimate educational interest under the Family Educational Rights and Privacy Act (“FERPA”). If NC State provides Dance Instructor with “personally identifiable information” from a student’s education record as defined by FERPA, 34 CFR §99.3, Dance Instructor hereby certifies that collection of this information from NC State is necessary for the performance of the Services under this Agreement. Dance Instructor further certifies that it shall maintain the confidential status of education records in its custody, and that it shall not re-disclose personally identifiable information as directed by FERPA. Failure to abide by legally applicable security measures and disclosure restrictions may result in the interruption, suspension and/or termination of NC State’s relationship with Dance Instructor for a period of at least five (5) years from date of violation. If Dance Instructor experiences a security breach relating to this information or if Dance Instructor re- discloses the information, Dance Instructor shall immediately notify NC State. Dance Instructor shall indemnify NC State for any breach of confidentiality or failure of its responsibilities to protect the personally identifiable information. Specifically, these costs may include, but are not limited to, the cost of notification of affected persons as a result of its unauthorized release.

Related to Protection of Education Records

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto. 8.2 The Receiving Party warrants that it and its Agents have the appropriate technical and organisational measures in place against unauthorised or unlawful processing of data relating to the Bid and against accidental loss or destruction of, or damage to such data held or processed by them.

  • Confidential Information Protections 4.1 At all times during and after the Employee’s employment, the Employee will hold in confidence and will not disclose, use, lecture upon, or publish any of Company’s Confidential Information (defined below), except as may be required in connection with the Employee’s work for Company, or as expressly authorized by the Board. The Employee will obtain the written approval of the Board before publishing or submitting for publication any material (written, oral, or otherwise) that relates to the Employee’s work at Company and/or incorporates any Confidential Information. The Employee hereby assigns to Company any rights the Employee may have or acquire in any and all Confidential Information and recognize that all Confidential Information shall be the sole and exclusive property of Company and its assigns.

  • PROTECTION OF TEACHERS A. The Board recognizes its responsibility to give reasonable support and assistance to Teachers for the maintenance of control and discipline in the classroom. Each Teacher, however, bears the primary responsibility for maintaining proper control and discipline in the classroom. B. As permitted by Section 1309 of the Revised School Code, a Teacher may temporarily exclude a student from one (1) class when the nature of the offense, the persistence of the misbehavior, or the disruptive effect of the violation makes the continued presence of the student in the classroom intolerable. In such cases, the Teacher will furnish the Principal with written particulars of the incident as promptly as teaching obligations allow. Upon request of the Principal, the Teacher shall notify the student’s parent of the nature of the offense. If the Principal determines the need for a meeting with the student’s parent, the Teacher shall attend that meeting. C. The Teachers recognize that all disciplinary actions and methods invoked by them shall be reasonable and just. D. Any assault or threatened assault upon a Teacher, resulting from his/her position as a Teacher, shall be promptly reported to the Building Principal by the Teacher or representative. The Board shall provide legal counsel, if requested in writing by the Teacher, to advise the Teacher of the Teacher’s rights and obligations as to such assault. The Board will provide reasonable assistance to the Teacher in working with law enforcement and judicial authorities, unless such counsel and assistance are provided through the Association. E. If a Teacher is complained against or sued as a result of any reasonable action as defined by a court of law and taken by the Teacher while in the scope of his/her employment with the District, the Board shall provide legal counsel and render all reasonable assistance, as appropriate, to the Teacher in his/her defense when requested in writing by the Teacher. This section shall only require the provision of legal counsel and shall not be interpreted to interfere with the Board’s right to exercise supervision and control, including discharge of the Teacher. If a final decision issued by a court or administrative agency indicates the Teacher’s liability for this action, all costs of assistance rendered by the District to the Teacher pursuant to this paragraph and not covered by the District’s insurance carrier, shall be reimbursed by the Teacher. F. Except for disciplinary suspension or discharge, or for incarceration, any work time lost by a Teacher in connection with an incident identified in Article 9.D, not compensable under Workers’ Compensation, shall not be charged against the Teacher, unless the Teacher is adjudged liable by an agency or court of competent jurisdiction. When Workers’ Compensation is paid, the Board shall pay the difference between that sum and the Teacher’s regular salary, but not to exceed the current year’s contract. No deduction of leave shall be made under these circumstances. G. In case of an assault by a student(s) on a Teacher acting in the line of duty, or other action taken by or against a Teacher in the line of duty, causing damage to the Teacher’s personal property, including clothing, the Board shall make an equitable financial settlement for such loss with the Teacher involved. H. Any complaint directed toward a Teacher shall be promptly called to the Teacher’s attention unless otherwise prohibited by law. This requirement shall not prevent the Supervisor from screening out xxxxx gripes. I. Teachers shall be expected to exercise reasonable care as to the safety of students and property.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • GOVERNMENT DATA PRACTICES Supplier and Sourcewell must comply with the Minnesota Government Data Practices Act, Minnesota Statutes Chapter 13, as it applies to all data provided by or provided to Sourcewell under this Contract and as it applies to all data created, collected, received, maintained, or disseminated by the Supplier under this Contract.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Preservation of Records The Assuming Bank agrees that it will preserve and maintain for the joint benefit of the Receiver, the Corporation and the Assuming Bank, all Records of which it has custody for such period as either the Receiver or the Corporation in its discretion may require, until directed otherwise, in writing, by the Receiver or Corporation. The Assuming Bank shall have the primary responsibility to respond to subpoenas, discovery requests, and other similar official inquiries with respect to the Records of which it has custody.

  • Treatment of Confidential Information (A) Each party agrees that at all times during and after the terms of this Agreement, it shall use, handle, collect, maintain, and safeguard Confidential Information in accordance with (1) the confidentiality and non-disclosure requirements of this Agreement; (2) the GLB Act, as applicable and as it may be amended; and (3) such other Applicable Law, whether in effect now or in the future. (B) Without limiting the foregoing, the Receiving Party shall apply to any Confidential Information at least the same degree of reasonable care used for its own confidential and proprietary information to avoid unauthorized disclosure or use of Confidential Information under this Agreement. (C) Each party further agrees that: (1) The Receiving Party will hold all Confidential Information it obtains in strictest confidence and will use and permit use of Confidential Information solely for the purposes of this Agreement or as otherwise provided for in this Agreement, and consistent therewith, may disclose or provide access to its responsible employees or agents who have a need to know and are under adequate confidentiality agreements or arrangements and make copies of Confidential Information to the extent reasonably necessary to carry out its obligations under this Agreement; (2) Notwithstanding the foregoing, the Receiving Party may release Confidential Information as permitted or required by law or approved in writing by the Disclosing party, which approval shall not be unreasonably withheld and may not be withheld where the Receiving Party may be exposed to civil or criminal liability or proceedings for failure to release such information; (3) Additionally, Ultimus may provide Confidential Information typically supplied in the investment company industry to companies that track or report price, performance or other information regarding investment companies; and (4) The Receiving Party will immediately notify the Disclosing Party of any unauthorized disclosure or use, and will cooperate with the Disclosing Party to protect all proprietary rights in any Confidential Information.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!