Schedule of Disposition Sample Clauses

Schedule of Disposition. Data shall be disposed of by the following date: As soon as commercially practicable. By
AutoNDA by SimpleDocs
Schedule of Disposition. Data shall be disposed of by the following date: As soon as commercially practicable. Embrace® shall retain student data for one year in read-only format. All student data shall be deleted after expiration of that one-year. Embrace is not responsible for any lost student data after expiration of Contract.
Schedule of Disposition. Data shall be disposed of by the following date: As soon as commercially practicable. By [ ] 4. Signature 05/03/2023 Authorized Representative of LEA Date 5. Verification of Disposition of Data Authorized Representative of Provider Date EXHIBIT “E” GENERAL OFFER OF PRIVACY TERMS
Schedule of Disposition. Data shall be disposed of by the following date: As soon as commercially practicable. By [ ] 4. Signature 09/21/2023 Authorized Representative of LEA Date 5. Verification of Disposition of Data 09/21/2023 Authorized Representative of Provider Date 1. Offer of Terms‌ EXHIBIT “E” GENERAL OFFER OF PRIVACY TERMS North Provider offers the same privacy protections found in this DPA between it and East ISD (“Originating LEA”) which is dated, 09/21/2023 to any other LEA (“Subscribing LEA”) who accepts this General Offer of Privacy Terms (“General Offer”) through its signature below. This General Offer shall extend only to privacy protections, and Provider’s signature shall not necessarily bind Provider to other terms, such as price, term, or schedule of services, or to any other provision not addressed in this DPA. The Provider and the Subscribing XXX may also agree to change the data provided by Subscribing LEA to the Provider to suit the unique needs of the Subscribing LEA. The Provider may withdraw the General Offer in the event of: (1) a material change in the applicable privacy statues; (2) a material change in the services and products listed in the originating Service Agreement; or three (3) years after the date of Provider’s signature to this Form. Subscribing LEAs should send the signed Exhibit “E” to Provider at the following email address: xxxxxxxxx@xxxxxxxxxxxxxxxxx.xxx [NAME OF PROVIDER] BY: Date: 09/21/2023 Printed Name: Title/Position: Manager of Proposal Services
Schedule of Disposition. Data shall be disposed of by the following date: _D As soon as commercially practicable. _D sy ( l
Schedule of Disposition. Data shall be disposed of by the following date: _ ___ As soon as commercially practicable. _ _ By [ ] EXHIBIT “E” [Intentionally omitted] E XHIBIT “F” DATA SECURITY REQUIREMENTS Adequate Cybersecurity Frameworks 2/24/2020 The Education Security and Privacy Exchange (“Edspex”) works in partnership with the Student Data Privacy Consortium and industry leaders to maintain a list of known and credible cybersecurity frameworks which can protect digital learning ecosystems chosen based on a set of guiding cybersecurity principles* (“Cybersecurity Frameworks”) that may be utilized by Provider . Cybersecurity Frameworks MAINTAINING ORGANIZATION/GROUP FRAMEWORK(S) National Institute of Standards and Technology NIST Cybersecurity Framework Version 1.1 National Institute of Standards and Technology NIST SP 800-53, Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity (CSF), Special Publication 800-171 International Standards Organization Information technology — Security techniques — Information security management xxxxxxx (XXX 00000 series) Secure Controls Framework Council, LLC Security Controls Framework (SCF) Center for Internet Security CIS Critical Security Controls (CSC, CIS Top 20) Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) Cybersecurity Maturity Model Certification (CMMC, ~FAR/DFAR) Please visit xxxx://xxx.xxxxxx.xxx for further details about the noted frameworks. *Cybersecurity Principles used to choose the Cybersecurity Frameworks are located here Provider security measures The Provider uses the following technical and organizational measures to protect Student Data: Management controls ● The Provider maintains a comprehensive information security program with an appropriate governance structure (including a dedicated Information Security team) and written security policies to oversee and manage risks related to the confidentiality, availability and integrity of Personal Information. ● The Provider aligns its information security program and measures with industry best practices, such as the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 27001, Open Web Application Security Project (OWASP), and National Institute of Standards and Technology (NIST) 800 frameworks. These controls are distilled and incorporated into an internal compliance framework that is applicable to all products and services. ● The Provider uses internal resources and thi...
Schedule of Disposition. ☐ Data shall be disposed of by the following date: As soon as commercially practicable. ☐ By Click or tap to enter a date.
AutoNDA by SimpleDocs
Schedule of Disposition. Data shall be disposed of by the following date: ___ _ _ As soon as commercially practicable. ___ _ _ By [ ]
Schedule of Disposition. Please allow 28 days from the following business day from which a request for deletion is received to complete this deletion process. The Lea undertakes to ensure that its students use the “Play as Guest” option when joining a game. The Provider shall not be liable for any actions or ommissions if students were instructed to create a new account and/or provide Personal Identifiable Information, either at registration, or throughout a game.
Schedule of Disposition. Data shall be disposed of by the following dat e: _0_ As soon as commercially practicable. _O_By [ l
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!