Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Agreement except as necessary to provide the Service, to fulfill data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to disclose information as permitted under Section 2.5 or to allow any necessary Service Providers to view or access data as set forth in Section 4.4.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Contractor shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by District or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Contractor to allow any necessary Service Providers to view or access data as set forth in the DPA.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data and Teacher Data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed
Security Protocols. Both Parties agree to maintain security protocols consistent with industry standards and practices in the transfer or transmission of any Student Data, including those designed to ensure that such data may only be viewed or accessed by parties legally allowed to do so. The Provider shall maintain all Student Data obtained pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to this DPA, except as necessary to fulfill the purpose of data requests by the LEA, as set forth in this DPA or as otherwise required under applicable laws. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access Student Data.
Security Protocols. Both parties agree to maintain security protocols that meet industry standard practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data and Teacher Data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the
Security Protocols. Contractor personnel will comply with all the Judicial Council and Court-required security protocols in the performance of Work. Such protocols shall include the then-current Judicial Council Tool Control Policy. The version of the Judicial Council Tool Control Policy in effect as of the Effective Date is attached as Exhibit N.
Security Protocols. The Parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. PowerSchool will maintain all data obtained or generated pursuant to this Agreement in a secure digital environment and will not copy, reproduce, or transmit data obtained pursuant to this Agreement, except as necessary to fulfill the purpose of data requests by Customer.