Data Ownership BA acknowledges that BA has no ownership rights with respect to the Protected Information.
Customer Ownership Customer owns and has sole responsibility for the accuracy, quality, integrity, and appropriateness of all original data, content and information provided to Xxxxxx Xxxxxxx in conjunction with the Services, and, when paid for, Customer will own all modified content and information as specified under the SOW (collectively the “Content,” which, together with the Customer’s trademarks or logos, are referred to as the “Customer Material).”
Software Ownership If Contractor develops or pays to have developed computer software exclusively with funds or proceeds from the Contract to perform its obligations under the Contract, or to perform computerized tasks that it was not previously performing to meet its obligations under the Contract, the computer software shall be exclusively owned by or licensed to the Department. If Contractor develops or pays to have developed computer software which is an addition to existing software owned by or licensed exclusively with funds or proceeds from the Contract, or to modify software to perform computerized tasks in a manner different than previously performed, to meet its obligations under the Contract, the addition shall be exclusively owned by or licensed to the Department. In the case of software owned by the Department, the Department grants to Contractor a nontransferable, nonexclusive license to use the software in the performance of the Contract. In the case of software licensed to the Department, the Department grants to Contractor permission to use the software in the performance of the Contract. This license or permission, as the case may be, terminates when Contractor has completed its work under the Contract. If Contractor uses computer software licensed to it which it does not modify or program to handle the specific tasks required by the Contract, then to the extent allowed by the license agreement between Contractor and the owner of the software, Contractor grants to the Department a continuing, nonexclusive license for either the Department or a different contractor to use the software in order to perform work substantially identical to the work performed by Contractor under the Contract. If Contractor cannot grant the license as required by this section, then Contractor shall reveal the input screens, report formats, data structures, linkages, and relations used in performing its obligations under the contract in such a manner to allow the Department or another contractor to continue the work performed by contractor under the Contract.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Equipment Ownership The ownership of all equipment provided by the Contractor shall remain with the Contractor, and equipment shall be maintained by the Contractor in accordance with manufacturer recommendations and all Federal (including OSHA), New York State and local codes. The Contractor shall provide and maintain the collection equipment at the Authorized User’s facility(s) for use twenty-four hours per day, seven days per week, 365 days per year. If equipment is removed for longer than brief periods for emptying the container, it shall be replaced with equal type and capacity equipment to ensure continuous dumping ability. If not so provided, the Authorized User shall be provided with a rebate for the amount of time they were unable to dump and the Authorized User may seek "Remedies for Breach" as stated in Appendix B. If the equipment is owned by the Authorized User, the Authorized User assumes liability and costs associated with the equipment and a price reduction may be passed along to the Authorized User representing the difference in cost, if any, for the Contractor not having to provide the equipment.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.
Contract Database Metadata Elements Title: Great Neck Union Free School District and Great Neck Paraprofessionals Association (2011) Employer Name: Great Neck Union Free School District Union: Great Neck Paraprofessionals Association Local: Effective Date: 07/01/2011 Expiration Date: 06/30/2015 PERB ID Number: 5132 Unit Size: Number of Pages: 28 For additional research information and assistance, please visit the Research page of the Catherwood website - xxxx://xxx.xxx.xxxxxxx.xxx/library/research/ For additional information on the ILR School - xxxx://xxx.xxx.xxxxxxx.xxx/ ARTICLE# TITLE PAGE# Preamble 2 Article 1 Association Rights 2 Article 2 Board-Administration-Association Relationship and Procedures 4 Article 3 Exchange of Proposals 6 Article 4 Professionals Duties and Responsibilities of Paraprofessionals 7 Article 5 Work Assignments 8 Article 6 Annual Appointment 10 Article 7 Selection and Promotion 10 Article 8 Evaluations and Standards 11 Article 9 Procedures for Termination of Employment 11 Article 10 Conferences 12 Article 11 Human Resource File 12 Article 12 Professional Growth 13 Article 13 Sick Leave 14 Article 14 Personal Leave 16 Article 15 Other Leaves 17 Article 16 Grievance Procedures 18 Article 17 Legal Assistance 19 Article 18 Conformity to Law 19 Article 19 Health Insurance 20 Article 20 Retirement Plan 20 Article 21 Salary Schedule 21 Article 22 Seniority Policy 23 Article 23 Compensation for Financial Loss 24 Article 24 Duration of Agreement 25 Appendix A Determination of Negotiating Unit 25 Appendix B Payroll Deduction Authorization 26 Appendix C Bus Aides 26 Appendix D Salary Schedules 27
Joint Ownership 10 Annuitant............................................................... 10
Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.