Secure Information Exchange Sample Clauses

Secure Information Exchange. Electronic exchange can be the most secure and auditable means of exchanging information provided this is done using suitable secure technology. Personal information should only be exchanged electronically using a secure messaging system. Attendees at meetings where personal data is discussed must also ensure that controls applied to agenda and minute documents are as secure as those used for requesting and securing personal information, since these will often name the individuals being considered and contain elements of the information contributory to the decision making process. Records of meetings and personal information must be subject to the principles set out in the ISA, particularly in relation to purpose and retention. If a recipient organisation wishes to remove shared information from their premises, they must ensure that the information is kept secure at all times, must not be made available to individuals who are not authorised to see it, and must only be used for the purposes specified within the ‘Information Sharing Agreement’.
AutoNDA by SimpleDocs
Secure Information Exchange. Electronic exchange can be the most secure and auditable means of exchanging information provided this is done using suitable secure technology. Standard e-mail, even with encryption, is not generally sufficiently secure to protect personal information. Personal information should only be exchanged electronically using a secure messaging system. Attendees at meetings where personal data is discussed must also ensure that controls applied to agenda and minute documents as are as secure as those used for requesting and securing personal information, since these will often name the individuals being considered and contain elements of the information contributory to the decision making process. Records of meetings and personal information must be subject to the principles set out in the ISA, particularly in relation to purpose and retention. If a recipient organisation wishes to remove shared information from their premises, they must ensure that the information is kept secure at all times, must not be made available to individuals who are not authorised to see it, and must only be used for the purposes specified within the ‘Information Sharing Agreement
Secure Information Exchange. Electronic exchange can be the most secure and auditable means of exchanging information provided this is done using suitable secure technology. Standard e-mail, even with encryption, is not generally sufficiently secure to protect personal information. Personal information should only be exchanged electronically using a secure messaging system. Personal or sensitive information must not be transferred by e-mail unless the recipient’s e-mail address contains; cjsm; cjx; gcsx; gsi; gsx; mod; xxx.xxx; pnn. Where this is the case, only information that is sensitive up to the level of ‘RESTRICTED’ may be e-mailed Attendees at meetings where personal data is discussed must also ensure that controls applied to agenda and minute documents as are as secure as those used for requesting and securing personal information, since these will often name the individuals being considered and contain elements of the information contributory to the decision making process. Records of meetings and personal information must be subject to the principles set out in the ISA, particularly in relation to purpose and retention. If a recipient organisation wishes to remove shared information from their premises, they must ensure that the information is kept secure at all times, must not be made available to individuals who are not authorised to see it, and must only be used for the purposes specified within the ‘Information Sharing Agreement
Secure Information Exchange. The Parties will establish a common secure information exchange platform compliant with BMS Information Security practices for the purpose of electronically sharing information accessible to each Party for the receipt, review, investigation, recordation, communication, and exchange (as between the Parties) of data, information, correspondence and other materials required to be exchanged by the Parties hereunder (the “Secure Information Exchange”). The JSC shall establish guidelines and procedures for utilizing the Secure Information Exchange which shall be in accordance with, and enable the Parties and their Affiliates to fulfill their reporting obligations under, applicable Law. Without limiting the foregoing, unless otherwise agreed to by the Parties, any non-anonymized (i.e., unblinded) data or information provided to the Internal BMS Gatekeeper, the Firewalled Scientist or the JSC hereunder pursuant to the applicable provisions of ARTICLE II shall be stored on a Secure Information Exchange hosted and controlled by Repare (and not BMS) and made accessible to the Internal BMS Gatekeeper, the Firewalled Scientist or the JSC solely through the Secure Information Exchange.
Secure Information Exchange. Electronic exchange can be the most secure and auditable means of exchanging information provided this is done using suitable secure technology. Personal information should only be exchanged electronically using a secure messaging system. Attendees at meetings where personal data is discussed must also ensure that controls applied to agenda and minute documents as are as secure as those used for requesting and securing personal information, since these will often name the individuals being considered and contain elements of the information contributory to the decision making process. Records of meetings and personal information must be subject to the principles set out in the ISA, particularly in relation to purpose and retention. If a recipient organisation wishes to remove shared information from their premises, they must ensure that the information is kept secure at all times, must not be made available to individuals who are not authorised to see it, and must only be used for the purposes specified within the ‘Information Sharing Agreement’ 7.8 Sharing information securely It is important that information is shared securely. Those who receive personal data should take appropriate measures to protect the data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, and against all other unlawful forms of processing. This includes when data is being shared and stored both electronically and manually (e.g. paper). All designated Officers who have access to personal data should have been assessed for reliability in line with the employer’s requirements for the role, for example Disclosure and Barring Scheme (DBS) checks. A greater degree of staff vetting and/or training is needed where there is a greater importance that relevant data be secure. The information Commissioner has issued the following guidelines concerning obligations for agencies: Does the data controller have a security policy setting out management commitment to information security within the organisation? Is the responsibility for the organisations security policy clearly placed on a particular person or department? Are sufficient resources and facilities made availability to enable that responsibility to be fulfilled? Shared information should be stored securely, and if no statutory guidance dictates otherwise the recipient organisation should destroy the information when it is no longer needed for the purpose for which it was provided...

Related to Secure Information Exchange

  • Information Exchange As soon as reasonably practicable after the Effective Date, the Parties shall exchange information regarding the design and compatibility of the Interconnection Customer’s Interconnection Facilities and Participating TO’s Interconnection Facilities and compatibility of the Interconnection Facilities with the Participating TO’s Transmission System, and shall work diligently and in good faith to make any necessary design changes.

  • Disclosure Information The disclosure of information as to the names and addresses of the Holders of Trust Securities in accordance with Section 312 of the Trust Indenture Act, regardless of the source from which such information was derived, shall not be deemed to be a violation of any existing law or any law hereafter enacted which does not specifically refer to Section 312 of the Trust Indenture Act, nor shall the Property Trustee be held accountable by reason of mailing any material pursuant to a request made under Section 312(b) of the Trust Indenture Act.

  • How Do I Get More Information? This Notice summarizes the Action, the terms of the Settlements, and your rights and options in connection with the Settlements. More details are in the Settlement Agreements, which are available for your review at xxx.XxxxxxxxxXxxXxxxxxxxxXxxxxxxxxx.xxx. The Settlement Website also has the Second Amended Complaint and other documents relating to the Settlements. You may also call toll-free 0-000-000-0000 or write the Claims Administrator at: Financial Aid Antitrust Settlements, c/o Claims Administrator, 0000 Xxxx Xxxxxx, Xxxxx 0000, Xxxxxxxxxxxx, XX 00000. To: Settlement Class Member Email Address From: Claims Administrator Subject: Notice of Proposed Class Action Settlement – Xxxxx, et al. x. Xxxxx University, et al. Please visit xxx.XxxxxxxxxXxxXxxxxxxxxXxxxxxxxxx.xxx for more information. • The Court has preliminarily approved proposed settlements (“Settlements”) with the following ten schools: Brown University, the University of Chicago, the Trustees of Columbia University in the City of New York, Trustees of Dartmouth College, Duke University, Emory University, Northwestern University, Xxxxxxx Xxxxx Xxxx University, Vanderbilt University, and Yale University (collectively the “Settling Universities”). • The Court has also preliminarily approved a class of students who attended one or more of the Settling Universities during certain time periods. This is referred to as the “Settlement Class,” which is defined in more detail below.

  • Secure Information Handling and Transfers 7.1 Physical and electronic handling, processing and transferring of DWP Data, including secure access to systems and the use of encryption where appropriate.

  • More Information For more specific information about the terms and conditions of the ICA or DCA program, please see the ICA Disclosure Booklet or DCA Disclosure Booklet (as applicable) available from IAR or on xxx.xxxxxxxxxxxx.xxx.xxx/xxxxxxxxxxx.

  • For More Information To obtain more information concerning the rules governing this Agreement, contact the Prototype Sponsor or Custodian listed on the Adoption Agreement.

  • GETTING MORE INFORMATION Are there more details about the Settlement?

  • Securities Law Information The Participant acknowledges that he or she is permitted to sell the Shares acquired under the Plan through the designated broker appointed by the Company, provided the sale of the Shares takes place outside of Canada through facilities of a stock exchange on which the Shares are listed (i.e., the NYSE).

  • PLACEMENT AGENT’S INFORMATION The parties hereto acknowledge and agree that, for all purposes of this Agreement, the Placement Agent’s Information consists solely of the following information in the Prospectus: (i) the last paragraph on the front cover page concerning the terms of the offering by the Placement Agent; and (ii) the statements concerning the Placement Agent contained in the first paragraph under the heading “Plan of Distribution.”

  • Transaction Information The Adviser shall furnish to the Trust such information concerning portfolio transactions as may be necessary to enable the Trust or its designated agent to perform such compliance testing on the Funds and the Adviser’s services as the Trust may, in its sole discretion, determine to be appropriate. The provision of such information by the Adviser to the Trust or its designated agent in no way relieves the Adviser of its own responsibilities under this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!