Information governance arrangements Sample Clauses

Information governance arrangements. In order to: • have detailed advice about which datasets they can share, to prevent irrelevant or excessive information being disclosed, the ROOT is configured such that data can only be shared for the agreed fields. • make sure that the data organisations are uploading is accurate (for example by requiring a periodic sampling exercise and data quality analysis) each organisation can routinely run reports on their data (both in aggregated form and raw form). Each user also has a dashboard displaying key statistics to enable them to continually monitor the accuracy of the data submitted to the ROOT. • record data in the same format (abiding by open standards when applicable) the RCSLT provide a document defining each field to promote consistency. Additionally, the ROOT is built with data standards embedded. • have common rules for the retention and deletion of data items, as appropriate to their nature and content, and procedures for dealing with cases where different organisations may have different statutory or professional retention or deletion rules: o the pseudonymised patient data may currently remain on the system for as long as the organisation wish to participate in this project. The agreement and use of the service will be reviewed every two years, at which time each controller will reassess the basis and appropriateness for continued use of the system. o the personal data collected about the individuals using the ROOT will be retained indefinitely for active accounts; inactive accounts will be monitored and individuals notified every 18 months. • have common technical and organisational security arrangements, including the transmission of the data and procedures for dealing with any breach of the agreement in a timely manner; the agreements currently in place state: “notify the person named in Clause 3, immediately in instances where a data breach is identified or suspected. The UK GDPR introduces a duty to report certain personal data breaches to the relevant supervisory authority within 72 hours of becoming aware of the breach, where feasible”. • ensure their staff are properly trained and are aware of their responsibilities for any data they have access to; this is set out as part of the acceptable use policy that new users signi • have procedures for dealing with access requests, complaints or queries from members of the public; these should be directed to the RCSLT data protection officer (xxx@xxxxx.xxx) for users of the ROOT, and to the dat...
AutoNDA by SimpleDocs

Related to Information governance arrangements

  • GOVERNANCE ARRANGEMENTS Enforceability of the Agreement

  • Governance (a) The HSP represents, warrants and covenants that it has established, and will maintain for the period during which this Agreement is in effect, policies and procedures:

  • Contract Governance Any contract made or entered into by the TIPS is subject to and is to be governed by Section 271.151 et seq, Tex Lo Code. Otherwise, TIPS does not waive its governmental immunities from suit or liability except to the extent expressly by other applicable laws in clear and unambiguous language. Yes, I Agree (Yes) 9

  • Alternate 911 Arrangements If you are not comfortable with the limitations of the 911 Dialing service, you should consider having an alternate means of accessing traditional 911 or E911 services or terminating the Service.

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

Time is Money Join Law Insider Premium to draft better contracts faster.