Requesting Party Responsibility in Safeguarding PII Sample Clauses

Requesting Party Responsibility in Safeguarding PII. The Requesting Party shall establish, maintain, and follow its own policy and procedures to protect PII, including policies and procedures for reporting lost or compromised, or potentially lost or compromised, PII. The Requesting Party shall inform its Authorized Users which handle PII of their individual responsibility to safeguard such information. In addition, the Requesting Party shall, within reason, take appropriate and necessary
AutoNDA by SimpleDocs

Related to Requesting Party Responsibility in Safeguarding PII

  • CONTRACTOR RESPONSIBILITY PROVISIONS For the purpose of these provisions, the term contractor is defined as any person, including, but not limited to, a bidder, offeror, loan recipient, grantee or lessor, who has furnished or performed or seeks to furnish or perform, goods, supplies, services, leased space, construction or other activity, under a contract, grant, lease, purchase order or reimbursement agreement with the Commonwealth of Pennsylvania (Commonwealth). The term contractor includes a permittee, licensee, or any agency, political subdivision, instrumentality, public authority, or other public entity in the Commonwealth.

  • Certification Regarding Responsibility Matters This provision applies to solicitations where the contract value is expected to exceed the simplified acquisition threshold.

  • Contractor Responsibility (a) The Contractor shall be responsible for the entire Performance under the Contract regardless of whether the Contractor itself performs. The Contractor shall be the sole point of contact concerning the management of the Contract, including Performance and payment issues. The Contractor is solely and completely responsible for adherence by the Contractor Parties to all applicable provisions of the Contract.

  • PRIME CONTRACTOR RESPONSIBILITY The contractor will be required to assume prime contractor responsibility for the contract and will be the sole point of contact with regard to all commodities, services and support. The prime contractor may delegate facilitation of contract orders to their “Authorized/Certified Dealers” only. This delegation will in no way relieve the contractor of any contractual obligations set forth in this Contract Award.

  • Contractor Responsibility and Debarment 14.1 A responsible contractor is a contractor who has demonstrated the attribute of trustworthiness, as well as quality, fitness, capacity and experience to satisfactorily perform the contract. It is the COUNTY’s policy to conduct business only with responsible contractors.

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Health and Safety Representative Meetings 13.1 A health and safety representative will be allowed reasonable paid time during working hours to attend occupational health and safety matters, including meetings affecting employees they represent, providing that the Representative informs their manager.

  • Rectification of Safety Hazard 60.12 Where, because of the existence of a safety hazard, a site has been stopped for a defined period of time and Employees sent off site by agreement between Site Managers and any combination of Union Official/s, Health and Safety Committee, those people who remain on site to do rectification work will be paid at the rate of double time for all such work.

  • Academic Responsibility Academic freedom is accompanied by the corresponding responsibility:

  • User Responsibility You agree that you are responsible for all use(s) related to your account. You understand this means that you accept full liability and responsibility for your actions or the actions of anyone who uses the Service via your account with or without your permission. You acknowledge that XXXXXXX XXXXXXXX will be sending you information, including your Password, via e-mail over the Internet. You agree that the Internet is not a secure network and that third parties may be able to intercept, access, use or corrupt the information and telephone calls you transmit over the Internet. In order to maintain the security of your Service, you should safeguard your User IDs and Passwords, as well as the media access control (MAC) address of the Adapter. The MAC address is one of the pieces of information used by XXXXXXX XXXXXXXX to authenticate customer calls and should not be shared.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!