Data Handling, and Storage Sample Clauses

The Data Handling and Storage clause defines the rules and responsibilities for managing, processing, and storing data within the scope of an agreement. It typically outlines requirements for data security, specifies how data should be stored (such as encryption or physical safeguards), and may address access controls or data retention periods. This clause ensures that sensitive or proprietary information is protected and handled in compliance with relevant laws or standards, thereby reducing the risk of data breaches and clarifying each party’s obligations regarding data management.
Data Handling, and Storage. To implement secure data storage in the proposed blockchain framework, the process for writing power usage data is detailed in Algorithm 1. This algorithm provides a structured approach to securely handling SG trans- actions. It outlines the key steps involved, including verifying the connection to the blockchain network via Metamask, checking the active network status (e.g., Sepolia), and executing the transaction to store data on the blockchain. The algorithm also incorporates error-handling mechanisms to ensure reliable operation in case of transaction failures. This process ensures data integrity and security in the proposed SG system, demonstrating the framework’s practical implementation. Algorithm 1 Algorithm for writing power usage data in Blockchain. Require: Metamask must be installed
Data Handling, and Storage. A. All computers used to upload, analyze, or store Data containing PII will be encrypted and password-protected. WestEd will store Data in a password-protected and encrypted cloud-based content management system. WestEd will store the Data in accordance with a Data Security Plan, available upon reasonable request. B. WestEd will only transfer PII using secure, encrypted transmission methods. C. Funding from the Bill and ▇▇▇▇▇▇▇ ▇▇▇▇▇ Foundation requires adherence to their Open Access Policy, specifying that the policy “…enables the unrestricted access and reuse of all peer-reviewed published research funded, in whole or in part, by the foundation, including any underlying data sets.” Only De-identified data will be shared under this policy. D. Reports containing aggregate-level data and results will also be presented to the members of professional associations and may be published in professional association publications. E. Educational Records shared by Rio Rancho Public Schools are and shall continue to be Partner’s property.
Data Handling, and Storage. A. All computers used to upload, analyze, or store Data containing PII will be encrypted and password-protected. WestEd will store Data in a password-protected and encrypted cloud-based content management system. WestEd will store the Data in accordance with a Data Security Plan, available upon reasonable request. B. WestEd will only transfer PII using secure, encrypted transmission methods. C. WestEd will de-identify the research data from this project and will securely store and archive data for long-term access. The project data may be archived with a national data repository (e.g. ICPSR). Data repositories make research and evaluation data accessible to authorized users for the purpose of scientific investigation, scholarship or teaching, or other forms of research and research development. If data are archived with a repository, that repository manages long-term data storage and data archive access. All archived data will be de-identified so that the identities of subjects cannot be readily ascertained or otherwise associated with the data. Data access will be restricted to verified scholars and researchers. D. Reports containing aggregate-level data and results will also be presented to the members of professional associations and may be published in professional association publications. E. Educational Records shared by Partner [Redwood City School District] are and shall continue to be Partner’s property.
Data Handling, and Storage. A. All computers used to upload, analyze, or store Data containing PII will be encrypted and password-protected. WestEd will store Data in a password-protected and encrypted cloud-based content management system. WestEd will store the Data in accordance with a Data Security Plan, available upon reasonable request. B. WestEd will only transfer PII using secure, encrypted transmission methods. C. WestEd will limit access to PII to only those individuals working on the Study who have legitimate interests in the PII and on a need to know basis. D. Names of study participants, schools or districts will be blinded for analysis. No individual shall be identifiable in any reports, publications, or other documents created by WestEd or its contractors with the use of Data nor will any identifying information such as district or school names be included. E. Reports containing aggregate-level data and results will also be presented to the members of professional associations and may be published in professional association publications. F. Educational Records shared by Partner are and shall continue to be Partner’s property.
Data Handling, and Storage. 6.1.1. The PRODUCT stores data directly on the fixed drive of the computer. A printer port is provided for hard copy output of these results which can be printed on both paper and transparency media. Soft copy output of such results to 3.5 inch high density disks or other storage media such as magneto optical drives and tape back up are optionally available. Commonly used LAN connections are available as an option for data access and storage.
Data Handling, and Storage. A. WestEd will not receive any Data except for teacher participation data and qualitative interview data from selected districts. The District will provide all other specified Data for evaluation of the Project directly to the Evaluation Subcontractor. WestEd will ensure that the Evaluation Subcontractor first enter into an agreement with WestEd that includes security and confidentiality terms no less stringent than those included in this MOU. Data shall not be provided to Evaluation Subcontractor until the District has received a copy of the executed agreement between WestEd and the Evaluation Subcontractor with evidence of security and confidentiality terms. B. Educational Records shared by Partner Wayne County Public Schools are and shall continue to be Partner’s property. C. In the event of any unauthorized use or disclosure, ▇▇▇▇▇▇ shall report the incident to the District as promptly as possible, but no more three (3) business days after ▇▇▇▇▇▇ learns of such use or disclosure. Such report shall identify: • The nature of the unauthorized use or disclosure, • The data used or disclosed, • Who made the unauthorized use or received the unauthorized disclosure, • What WestEd has done and shall do to mitigate the effects of the unauthorized use or disclosure, and • What corrective action WestEd has taken or shall take to prevent future similar unauthorized use or disclosure. WestEd shall also provide notice to District of unauthorized use or disclosure of Data or PII that may be reasonably requested by the District. The District also may require that WestEd promptly provide a written notice of the breach or disclosure, as well as a description of the corrective actions taken, to any District employee, student, or user directly impacted by the breach or disclosure. Any such corrective action and notice shall be subject to prior review and approval by the District.