Statement of Data Security Sample Clauses

Statement of Data Security. The Requester shall provide the Department a separate written statement (Statement of Data Security) of the administrative and physical precautions that will be taken to securely protect any data deemed confidential pursuant to this Agreement and/or statutory law. The Statement of Data Security is attached hereto and incorporated by reference as Attachment 2.
AutoNDA by SimpleDocs
Statement of Data Security. University of North Texas, hereinafter the “Requester,” shall take the following administrative and physical precautions to securely protect any information and/or data collected pursuant to the associated Research or Statistical Project Agreement (Agreement) or otherwise deemed confidential pursuant to the Agreement, federal law, or the laws of the State of Texas: All physical materials (including without limitation: papers, books, CDs, DVDs, videotapes, and photographs) will be kept in a locked file cabinet. All keys to this file cabinet will remain in the possession of the Requester and/or employees or associates of the Requester whose responsibilities cannot be accomplished without access to the materials in the file cabinet. All electronic materials will be stored on an encrypted password-protected computer to which only the Requester and approved members of the research team will have access. Confidential juvenile justice information will be treated as category I information in accordance with UNT System data handling requirements and state and federal law. Electronic materials will not be transmitted from designated research workstation using any manner of removable devices or network applications. Any research workstation backup for the purpose of research continuity planning will be encrypted and stored in a locked file cabinet. This Statement of Data Security is a binding part of the Agreement. The Requester's failure to comply with the precautions described herein may constitute a breach or default under the Agreement and entitle the Texas Juvenile Justice Department to seek any remedies for breach or default available under the Agreement or other law. Requester Signature Printed Name and Title Date Source Time Period Cohort Data Elements TJJD FY 2005-2013 Indeterminate and Determinate Commitments De-identified individual-level PACT data from each youth's first and last Full Screens ACE Questionnaire answers, including Supplemental Questionnaire 060 Placement Assignment information Source Time Period Cohort Data Elements Description TJJD EDI FY 2005-2013 Indeterminate and Determinate Commitments Child Table Referral Table Dispositions Table Detentions Table MAYSI Table Behavioral Health Service Table Offense Table Placement Table Program Table Program Component Table Supervision Table Drug Test Table Non-Residential Services Table Decode Table DPS Offense Code Table TJJD CCS FY 2005-2013 Indeterminate and Determinate Commitments CCF (003, 004, 0...
Statement of Data Security. Xxxxx Xxxxxxx University (JHU), hereinafter the “Requester,” shall take the following administrative and physical precautions to securely protect any information and/or data collected pursuant to the associated Research or Statistical Project Agreement (Agreement) or otherwise deemed confidential pursuant to the Agreement, federal law, or the laws of the State of Texas: This is a secondary data analysis research study. We are requesting for de-identified data and it does not contain any identifying information of the individuals. All data files will be saved and backed-up on a secure JHU provided department server space. The access to data and associated documentation will be available only to the Requester and/or employees or associates of the Requester under the JHU-IRB approved data-sharing agreement for this project. All files and analysis codes from this project will be preserved for a minimum of five years after any associated publications for re-use by the research group in accordance with the JHU Data Retention Policy. This Statement of Data Security is a binding part of the Agreement. The Requester's failure to comply with the precautions described herein may constitute a breach or default under the Agreement and entitle the Texas Juvenile Justice Department to seek any remedies for breach or default available under the Agreement or other law. Requester Signature Xx. Xxxxxxxxx Xxxxxxxxxx, Professor at Xxxxx Xxxxxxx University October 31, 2022 Date Requester Signature Xx. Xxxxx Xxxxxx, Postdoctoral Fellow at Xxxxx Xxxxxxx University October 31, 2022 Date Requester Signature Ms. Xx Xxx, Data Manager at Xxxxx Xxxxxxx University October 31, 2022 Date ATTACHMENT 2
Statement of Data Security. University of Chicago, hereinafter the “Requester,” shall take the following administrative and physical precautions to securely protect any information and/or data collected pursuant to the associated Research or Statistical Project Agreement (Agreement) or otherwise deemed confidential pursuant to the Agreement, federal law, or the laws of the State of Texas: Security Controls Access Control/Password Protection
Statement of Data Security. The Researcher shall provide the Department a separate written statement (Statement of Data Security) of the administrative and physical precautions that will be taken to securely protect any data deemed confidential pursuant to this Agreement and/or statutory law. The Statement of Data Security is attached hereto and incorporated by reference as Attachment 2.
Statement of Data Security. Council of State Governments Justice Center, hereinafter the “Requester,” shall take the following administrative and physical precautions to securely protect any information and/or data collected pursuant to the associated Research or Statistical Project Agreement (Agreement) or otherwise deemed confidential pursuant to the Agreement, federal law, or the laws of the State of Texas:
Statement of Data Security. University of North Texas, hereinafter the “Requester,” shall take the following administrative and physical precautions to securely protect any information and/or data collected pursuant to the associated Research or Statistical Project Agreement (Agreement) or otherwise deemed confidential pursuant to the Agreement, federal law, or the laws of the State of Texas: All physical materials (including without limitation: papers, books, CDs, DVDs, videotapes, and photographs) will be kept in a locked file cabinet. All keys to this file cabinet will remain in the possession of the Requester and/or employees or associates of the Requester whose responsibilities cannot be accomplished without access to the materials in the file cabinet. All electronic materials will be stored on an encrypted password-protected computer to which only the Requester and approved members of the research team will have access. Confidential juvenile justice information will be treated as category I information in accordance with UNT System data handling requirements and state and federal law. Electronic materials will not be transmitted from designated research workstation using any manner of removable devices or network applications. Any research workstation backup for the purpose of research continuity planning will be encrypted and stored in a locked file cabinet. This Statement of Data Security is a binding part of the Agreement. The Requester's failure to comply with the precautions described herein may constitute a breach or default under the Agreement and entitle the Texas Juvenile Justice Department to seek any remedies for breach or default available under the Agreement or other law. Requester Signature Printed Name and Title
AutoNDA by SimpleDocs
Statement of Data Security. UMass Chan Medical School, hereinafter the “Requester,” shall take the following administrative and physical precautions to securely protect any information and/or data collected pursuant to the associated Research or Statistical Project Agreement (Agreement): Access Control/Password Protection Physical Security

Related to Statement of Data Security

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53). Contractor also shall provide technical and organizational safeguards against accidental, unlawful, or unauthorized access or use, destruction, loss, alteration, disclosure, transfer, commingling, or processing of such information that ensure a level of security appropriate to the risks presented by the processing of County Data, Contractor personnel and/or subcontractor personnel and affiliates approved by County to perform work under this Contract may use or disclose County personal and confidential information only as permitted in this Contract. Any other use or disclosure requires express approval in writing by the County of Orange. No Contractor personnel and/or subcontractor personnel or affiliate shall duplicate, disseminate, market, sell, or disclose County personal and confidential information except as allowed in this Contract. Contractor personnel and/or subcontractor personnel or affiliate who access, disclose, market, sell, or use County personal and confidential information in a manner or for a purpose not authorized by this Contract may be subject to civil and criminal sanctions contained in applicable federal and state statutes. Contractor shall take all reasonable measures to secure and defend all locations, equipment, systems, and other materials and facilities employed in connection with the Services against hackers and others who may seek, without authorization, to disrupt, damage, modify, access, or otherwise use Contractor systems or the information found therein; and prevent County data from being commingled with or contaminated by the data of other customers or their users of the Services and unauthorized access to any of County data. Contractor shall also continuously monitor its systems for potential areas where security could be breached. In no case shall the safeguards of Contractor’s data privacy and information and cyber security program be less stringent than the safeguards used by County. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information and cyber security program prior to commencement of Services and from time to time during the term of this Contract. All data belongs to the County and shall be destroyed or returned at the end of the contract via digital wiping, degaussing, or physical shredding as directed by County.

  • Confidentiality and Data Security (a) The Custodian agrees to keep confidential, and to cause its employees and agents to keep confidential, all records of the Funds and information relating to the Funds, including without limitation information as to their respective shareholders and their respective portfolio holdings, unless the release of such records or information is made (i) in connection with the services provided under this Agreement, (ii) at the written direction of the applicable Fund or otherwise consented to, in writing, by the respective Funds, (iii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Custodian has determined, on the advice of counsel, that it is required to comply, or (iv) where the Custodian has determined, on the advice of counsel, that the failure to release such information would expose the Custodian to civil or criminal contempt proceedings; provided in the case of clause (iii) or (iv) the Custodian provides the applicable Fund written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Section 10(a), or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. Notwithstanding the foregoing but subject to Section 10(d), (1) the Custodian may use information regarding the Funds in connection with certain functions performed on a centralized basis by the Custodian, its affiliates or its or their service providers (including audit, accounting, risk, legal, compliance, sales, administration, product communication, relationship management, compilation and analysis of customer-related data and storage) and disclose such information to its affiliates and to its or their service providers who are subject to the confidentiality obligations hereunder with respect to such information, but only for the purpose of servicing the Funds in connection with the relationship contemplated by this Agreement or providing additional services to the Funds, and (2) the Custodian may aggregate Fund or Portfolio data with similar data of other customers of the Custodian (“Aggregated Data”) and may use Aggregated Data so long as such Aggregated Data represents such a sufficiently large sample that no Fund or Portfolio data can be identified either directly or by inference or implication.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

Time is Money Join Law Insider Premium to draft better contracts faster.