Secondary Use of Data Sample Clauses

Secondary Use of Data. If the Researcher wishes to use the Data for a new research purpose, or make any modifications to the Study that affect the scope of access to the Health Systems, the Researcher shall submit an amended Protocol to the REB for approval and notify AHS of any such change. If required by AHS, the parties will cooperate with respect to the implementation of any required amendments to this Agreement.
AutoNDA by SimpleDocs
Secondary Use of Data. CRISP will not, and will contractually require Exchange Technology Providers and Licensed Technology Providers or any other agent or contractor of CRISP with access on other than an incidental basis to Data, not to, use or disclose Data provided to the HIE by HIE Participants or available from the HIE about HIE Participant Users except as may be required by Applicable Law or deidentify Data in order to engage for a Secondary Use (as defined below) or provide the Data or information derived from the Data to any otherperson or entity, including a related entity or a third party, for the recipient’s Secondary Use, even if, in all cases, the Secondary Use is otherwise permitted by Applicable Law, unless as to a Secondary Use permitted by Applicable law, the permitted Secondary Use has been approved by the Advisory Board through the process and under the standards set forth in Section 11. A Secondary Use is the use of the Data or the extraction of information from the Data for analytic, predictive or other business purposes,including but not limited to monitoring or analysis of practice or utilization patterns of Participant or Participant Users.
Secondary Use of Data. CRISP will not, and will contractually require Core Technology Providers or any other agent or contractor of CRISP with access on other than an incidental basis to Data, not to, use or disclose Data provided to the HIE by HIE Participants or available from the HIE about HIE Participant Users except as may be required by Applicable Law or deidentify Data in order to engage for a Secondary Use (as defined below) or provide the Data or information derived from the Data to any other person or entity, including a related entity or a third party, for the recipient’s Secondary Use, even if, in all cases, the Secondary Use is otherwise permitted by Applicable Law, unless as to a Secondary Use permitted by Applicable law, the permitted Secondary Use has been approved by the Advisory Board through the process and under the standards set forth in Section 10.02 b. A Secondary Use is the use of the Data or the extraction of information from the Data for analytic, predictive or other business purposes, including but not limited to monitoring or analysis of practice or utilization patterns of Participant or Participant Users.
Secondary Use of Data. Sample text: Under no circumstances will the data be used for a secondary purpose. If the research team or the First Nation/community (as co-owners) so wish, they must obtain the free and informed consent of the participants.
Secondary Use of Data. CRISP will not, and will contractually require Core Technology Providers or any other agent or contractor of CRISP with access on other than an incidental basis to Data not to, use or disclose Data provided to the HIE by HIE Participants or available from the HIE about HIE Participant Users except as may be required by this Agreement or Applicable Law and not to de-identify such Data in order to engage for a Secondary Use (as defined below) or to provide the Data or information derived from the Data to any other person or entity, including a related entity or a third party, for the recipient’s Secondary Use, even if, in all cases, the Secondary Use is otherwise permitted by Applicable Law unless as to a Secondary Use permitted by Applicable Law, he Secondary Use has been approved by the Advisory Board through the process and under the standards set forth in Section
Secondary Use of Data. CRISP will not, and will contractually require Core Technology Providers Exchange Technology Providers and Licensed Technology Providers or any other agent or contractor of CRISP with access on other than an incidental basis to Data, not to, use or disclose Data provided to the HIE by HIE Participants or available from the HIE about HIE Participant Users except as may be required by Applicable Law or deidentify Data in order to engage fora Secondary Use (as defined below) or provide the Data or information derived from the Data to any otherperson or entity, including a related entity or a third party, for the recipient’s Secondary Use, even if, in all cases, the Secondary Use is otherwise permitted by Applicable Law, unless as to a Secondary Use permitted by Applicable law, the permitted Secondary Use has been approved by the Advisory Board through the process and under the standards set forth in Section 110.02 b. A Secondary Use is the use of the Data or the extraction of information from the Data for analytic, predictive or other business purposes,including but not limited to monitoring or analysis of practice or utilization patterns of Participant or Participant Users.

Related to Secondary Use of Data

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Consent to Use of Data You agree that the Licensor may collect and use technical data and related information, including but not limited to technical information about your device, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services (if any) related to the Software. The Licensor may use this information, as long as it is in a form that does not personally identify you, to improve its products or to provide services or technologies.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Publicity; Use of Names and Logos Vendor may use Citizens’ name and logo in its marketing materials, website and social media to indicate that it is a participating or contracted vendor for Citizens. However, Vendor may not in any way state, imply or infer that it holds a “preferred,” “approved,” “awarded,” “selected” or otherwise special status with Citizens in any such materials. This prohibition includes, but is not limited to, the use of endorsements or quotes from Citizens officials, Citizens vendor scores, or any other Citizens-related materials that may directly or indirectly imply that Vendor enjoys a special or preferred status with Citizens. Citizens reserves the right to determine that its name and/or logo have been misused and to request that Vendor cease using its name and/or logo in any way it deems inappropriate. Failure to comply will result in corrective action, up to and including contract termination. Vendor may only use the approved Citizens logo, which may be obtained by sending a request via email to: xxxxxxxx@xxxxxxxxxxx.xxx.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

Time is Money Join Law Insider Premium to draft better contracts faster.