Secure Information Exchange Sample Clauses

Secure Information Exchange. Electronic exchange can be the most secure and auditable means of exchanging information provided this is done using suitable secure technology. Personal information should only be exchanged electronically using a secure messaging system. Attendees at meetings where personal data is discussed must also ensure that controls applied to agenda and minute documents are as secure as those used for requesting and securing personal information, since these will often name the individuals being considered and contain elements of the information contributory to the decision making process. Records of meetings and personal information must be subject to the principles set out in the ISA, particularly in relation to purpose and retention. If a recipient organisation wishes to remove shared information from their premises, they must ensure that the information is kept secure at all times, must not be made available to individuals who are not authorised to see it, and must only be used for the purposes specified within the ‘Information Sharing Agreement’.
AutoNDA by SimpleDocs
Secure Information Exchange. Electronic exchange can be the most secure and auditable means of exchanging information provided this is done using suitable secure technology. Standard e-mail, even with encryption, is not generally sufficiently secure to protect personal information. Personal information should only be exchanged electronically using a secure messaging system. Attendees at meetings where personal data is discussed must also ensure that controls applied to agenda and minute documents as are as secure as those used for requesting and securing personal information, since these will often name the individuals being considered and contain elements of the information contributory to the decision making process. Records of meetings and personal information must be subject to the principles set out in the ISA, particularly in relation to purpose and retention. If a recipient organisation wishes to remove shared information from their premises, they must ensure that the information is kept secure at all times, must not be made available to individuals who are not authorised to see it, and must only be used for the purposes specified within the ‘Information Sharing Agreement
Secure Information Exchange. Electronic exchange can be the most secure and auditable means of exchanging information provided this is done using suitable secure technology. Personal information should only be exchanged electronically using a secure messaging system. Attendees at meetings where personal data is discussed must also ensure that controls applied to agenda and minute documents as are as secure as those used for requesting and securing personal information, since these will often name the individuals being considered and contain elements of the information contributory to the decision making process. Records of meetings and personal information must be subject to the principles set out in the ISA, particularly in relation to purpose and retention. If a recipient organisation wishes to remove shared information from their premises, they must ensure that the information is kept secure at all times, must not be made available to individuals who are not authorised to see it, and must only be used for the purposes specified within the ‘Information Sharing Agreement’ 7.8 Sharing information securely It is important that information is shared securely. Those who receive personal data should take appropriate measures to protect the data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, and against all other unlawful forms of processing. This includes when data is being shared and stored both electronically and manually (e.g. paper). All designated Officers who have access to personal data should have been assessed for reliability in line with the employer’s requirements for the role, for example Disclosure and Barring Scheme (DBS) checks. A greater degree of staff vetting and/or training is needed where there is a greater importance that relevant data be secure. The information Commissioner has issued the following guidelines concerning obligations for agencies: Does the data controller have a security policy setting out management commitment to information security within the organisation? Is the responsibility for the organisations security policy clearly placed on a particular person or department? Are sufficient resources and facilities made availability to enable that responsibility to be fulfilled? Shared information should be stored securely, and if no statutory guidance dictates otherwise the recipient organisation should destroy the information when it is no longer needed for the purpose for which it was provided...
Secure Information Exchange. Electronic exchange can be the most secure and auditable means of exchanging information provided this is done using suitable secure technology. Standard e-mail, even with encryption, is not generally sufficiently secure to protect personal information. Personal information should only be exchanged electronically using a secure messaging system. Personal or sensitive information must not be transferred by e-mail unless the recipient’s e-mail address contains; cjsm; cjx; gcsx; gsi; gsx; mod; xxx.xxx; pnn. Where this is the case, only information that is sensitive up to the level of ‘RESTRICTED’ may be e-mailed Attendees at meetings where personal data is discussed must also ensure that controls applied to agenda and minute documents as are as secure as those used for requesting and securing personal information, since these will often name the individuals being considered and contain elements of the information contributory to the decision making process. Records of meetings and personal information must be subject to the principles set out in the ISA, particularly in relation to purpose and retention. If a recipient organisation wishes to remove shared information from their premises, they must ensure that the information is kept secure at all times, must not be made available to individuals who are not authorised to see it, and must only be used for the purposes specified within the ‘Information Sharing Agreement
Secure Information Exchange. The Parties will establish a common secure information exchange platform compliant with BMS Information Security practices for the purpose of electronically sharing information accessible to each Party for the receipt, review, investigation, recordation, communication, and exchange (as between the Parties) of data, information, correspondence and other materials required to be exchanged by the Parties hereunder (the “Secure Information Exchange”). The JSC shall establish guidelines and procedures for utilizing the Secure Information Exchange which shall be in accordance with, and enable the Parties and their Affiliates to fulfill their reporting obligations under, applicable Law. Without limiting the foregoing, unless otherwise agreed to by the Parties, any non-anonymized (i.e., unblinded) data or information provided to the Internal BMS Gatekeeper, the Firewalled Scientist or the JSC hereunder pursuant to the applicable provisions of ARTICLE II shall be stored on a Secure Information Exchange hosted and controlled by Repare (and not BMS) and made accessible to the Internal BMS Gatekeeper, the Firewalled Scientist or the JSC solely through the Secure Information Exchange.

Related to Secure Information Exchange

  • Information Exchange As soon as reasonably practicable after the Effective Date, the Parties shall exchange information regarding the design and compatibility of the Interconnection Customer’s Interconnection Facilities and Participating TO’s Interconnection Facilities and compatibility of the Interconnection Facilities with the Participating TO’s Transmission System, and shall work diligently and in good faith to make any necessary design changes.

  • Transaction Information The Adviser shall furnish to the Trust such information concerning portfolio transactions as may be necessary to enable the Trust or its designated agent to perform such compliance testing on the Funds and the Adviser’s services as the Trust may, in its sole discretion, determine to be appropriate. The provision of such information by the Adviser to the Trust or its designated agent in no way relieves the Adviser of its own responsibilities under this Agreement.

  • Holdings Information and Pricing The Adviser shall provide regular reports regarding Fund holdings, and shall, on its own initiative, furnish the Trust and its Board from time to time with whatever information the Adviser believes is appropriate for this purpose. The Adviser agrees to immediately notify the Trust if the Adviser reasonably believes that the value of any security held by a Fund may not reflect its fair value. The Adviser agrees to provide any pricing information of which the Adviser is aware to the Trust, its Board and/or any Fund pricing agent to assist in the determination of the fair value of any Fund holdings for which market quotations are not readily available or as otherwise required in accordance with the 1940 Act or the Trust’s valuation procedures for the purpose of calculating each Fund’s net asset value in accordance with procedures and methods established by the Board.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!