Data Collection and Storage Sample Clauses

Data Collection and Storage. Participate Australia collects personal and statistical data of Participants for internal use and to report to the NDIA and other government agencies that require such data. This data is depersonalized and encoded when transmitted to those agencies, and all data is handled and stored in accordance with our Privacy and Confidentiality Policy. See clause 2.9.
AutoNDA by SimpleDocs
Data Collection and Storage. § 15.1 For security reasons, the access data (ID of the key which allows conclusions to be drawn about the tenant, access time and date are stored. The tenant agrees to this.
Data Collection and Storage. MOTI collects, stores, and uses System User data on an on-going basis and in strict accordance with the MOTI Privacy Policy. MOTI reserves the right to in the future commercialize such data, subject to it being anonymised and always subject to the provisions of the MOTI Privacy Policy.
Data Collection and Storage. The case unit will be analysed through the collection of primary and secondary data. Primary data sources are interviews, direct observation, and informal discussions. Secondary data sources will mainly be a set of documents of the firm that are produced as a consequence of the DiDIY transformation. Before starting the collection of primary data (Xxxxx et al. 1998), some preliminary background information will be collected in order to help the interviewer during the data collection process. The preliminary information will come from the Internet web site of the firm and some supplementary information will be given by the organizational interviewee. Together with a representative of each firm, the names and the positions of all the potential participants will be identified and contacted for an interview (Xxxxx et al. 1998). The interviews will be semi-structured interviews (Xxxxxxxxx 1964; Emory 1980). In order to operationalise the theoretical constructs and ground the findings, whenever possible, will be interviewed key representatives of a “worker”. The interview will be focused on introducing the main themes and sub-themes to discuss together with the interviewee. At the beginning of each interview an introduction on the reasons and the objects of the interview will be performed (Xxxxxxxx & Xxxxxx 1992, p. 75; Xxxxx & Xxxxxxxx 1994). This explanation will reduce the researcher effects at the site, which could bias the data collection (Xxxxx et al. 1998, Xxxxx & Xxxxxxxx 1994). The interview guide will be designed to gather the characteristics of the interviewee and what is her/his view. In fact, the interview guide will include a first draft measure of IT capability and a list of questions about the other constructs under investigation. Since the research will be highly exploratory, a pilot-case will be generated and subsequently a multiple case study, involving other firms (Yin 2003; Xxxx & Xxxx 2003), will follow. To build a triangulation and to give rigor to the study other sources of evidence will be included: direct observations, historical archive records, physical artefacts. The quantitative data will be collected directly on a copy of the interview guide by the interviewer, while the qualitative data produced by the interview will be synthesized in a report, immediately after each interview. These reports, the quantitative data collected on the direct observation and the collected secondary data will be archived in a repository. To increase homo...
Data Collection and Storage. Data privacy and security obligations are implemented in Noona Healthcare procedures so that data processing is carried out according to statutory and regulatory requirements. Noona Healthcare has entered in written agreements with sub-processors regarding data privacy and security obligations in accordance with statutory and regulatory requirements. Appropriate process and technical controls are used in processing and storage of customer data according to information security risk assessment (ISO27001). Security is part of Noona Service system architecture on all levels: software architecture, data center architecture and network architecture. Noona service is secured with application level controls, firewalls, application firewalls and denial of service protection mechanisms. Identity and message information is encrypted on application level with rotating and patient specific symmetric encryption keys. Patient data audit log is collected and archived. All data is encrypted in rest and in transit. System components are segregated to dedicated subnets according to component security level. Noona Service is hosted in multitenant architecture. Access to customer data is restricted with authentication, authorization, cryptographic access controls, role access controls and customer user group access controls. Noona Service system components are deployed in redundant configuration to ensure availability in case of system component failure. System data storages are backed up daily. In the event of storage failure customer data can be recovered from backups. Noona healthcare has disaster recovery procedure to recover from system wide technical failure or data corruption. The following sub-contractors are used to provide Noona Service: - Noona mobile service is hosted in Amazon AWS in Europe, Ireland. - User Analytics are processed in Microsoft Azure in Europe, Ireland. - Log processing services are provided by Sumologic in Europe Data will be collected by Xxxxx and stored centrally by FORTH, cleaned-homogenized, and shared with ICCS and NHG to jointly conduct analyses. Data will be extracted at different time phases during the project (i.e. after the M6 data is complete) to conduct interim analyses and quality checks. Requests for data sharing by other partners to perform additional analyses should be directed to the PCC.
Data Collection and Storage. The software shall record test data in a means compatible with the software’s report system and automatic testing routines. In manual mode, the operator is in control of when to store data points, unless the technical manual (see 3.1.1) requires data recording at specific intervals. If the technical manual (see 3.1.1) requires data storage at intervals, the software shall automatically store data at these intervals without operator intervention. In automatic mode, the developed software shall be in control of data storage/collection and intervals without operator intervention.
Data Collection and Storage. 1. As per the agreement between the OCE and the APMA, the APMA is subject to the Data and Information Sharing Protocol (“DISP”). The Supplier confirms that they have read and understood the DISP and its appendices, attached herein and marked as Appendix 1 to this Agreement.
AutoNDA by SimpleDocs
Data Collection and Storage. A. The NAC shall have the ability to collect data for any property of any object and store this data for future use.
Data Collection and Storage. For each “ABCT Driver,” the Clearinghouse shall obtain the “Required Data” upon each of the “Triggering Events.”

Related to Data Collection and Storage

  • Data Collection Some downloaded software included in the Materials may generate and collect information about the software and usage and transmit it to Intel to help improve Intel’s products and services. This collected information may include product name, product version, time of event collection, license type, support type, installation status, hardware and software performance, and use. 9.

  • Sub-processing 1. The data importer shall not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the sub-processor which imposes the same obligations on the sub-processor as are imposed on the data importer under the Clauses. Where the sub-processor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the sub-processor’s obligations under such agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.