Data linking Sample Clauses

Data linking. The NHS Number will be used to link records from different providers in accordance with Department of Health policy and standing instructions.16 Where the NHS Number is not present or validated, in accordance with standing instruction from the Health and Social Care Information Centre, the patient’s address details will be used to match records. It is expected that matching will only be required in relatively few cases, as the NHS Operating Framework 2012/13 and 2013/14 requires punitive contract sanctions be made against providers falling below the required standard for NHS Number completeness in Health Records by 31st March 2014.
AutoNDA by SimpleDocs
Data linking. In relational data it is useful to assume each tuple corresponds to an individual entity. This mapping is not usually present in a heterogeneous data repository. For example, one patient may have multiple pathology and lab reports pre- pared at different times. In order to preserve privacy for individuals and apply data anonymization in this complex data space, the data linking component links relevant attributes (structured attributes or extracted attributes from unstructured data) to each individual entity and produces a patient-centric representation of the data. The problem of data linkage is very hard, even for humans. FRIL is a probabilistic record linkage tool developed [35] to re- solve the potential attribute conflicts and semantic variations to aid in linking records. A novel aspect of the HIDE framework is that the data linking component and information extraction component form a feedback loop and are carried out in an iterative manner. Once attributes are extracted from unstructured information, they are linked or added to existing or new entities. Once the data are linked, the linked or structured information will in turn be utilized in the extraction component in the next iteration. The final output will be a patient-centric identifier view consisting of identifiers, quasi-identifiers, and sensitive attributes. This structured identifier view is also used to generate aggregated statistics in the form of data cubes.
Data linking a. For Outcome Measures focused on the percentage of cohort participants who are in education or training activities, or in unsubsidized employment, Independent Validator shall link relevant data sets from EDD and NSCH for program participants in the cohort

Related to Data linking

  • Linking to the Website and Social Media Features You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval, or endorsement on our part. This Website may provide certain social media features that enable you to: • Link from your own or certain third-party websites to certain content on this Website. • Send emails or other communications with certain content, or links to certain content, on this Website. • Cause limited portions of content on this Website to be displayed or appear to be displayed on your own or certain third-party websites. You may use these features solely as they are provided by us, and solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not: • Establish a link from any website that is not owned by you. • Cause the Website or portions of it to be displayed on, or appear to be displayed by, any other site, for example, framing, deep linking, or in-line linking. • Link to any part of the Website other than the homepage. • Otherwise take any action with respect to the materials on this Website that is inconsistent with any other provision of these Terms of Use. The website from which you are linking, or on which you make certain content available, must comply in all respects with the Content Standards set out in these Terms of Use. You agree to cooperate with us in causing any unauthorized framing or linking immediately to stop. We reserve the right to withdraw linking permission without notice. We may disable all or any social media features and any links at any time without notice in our discretion.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

Time is Money Join Law Insider Premium to draft better contracts faster.