Data Output Sample Clauses

Data Output. The Recipient warrants that it has provided a list of all intended Data output (e.g. data, reports, manuscripts, or other Project products) that it plans to derive from the WA-APCD Data, and that this list is now attached as Exhibit H. Additionally, Recipient agrees to obtain pre-approval from the LO prior to the disclosure of designated Data output as listed in Exhibit H to anyone other than Authorized Data Users. These cases include but are not limited to: use of direct identifiers, use of proprietary financial information, data reseller/derivative products and uses that involves linking WA APCD Data to any other information. The LO will complete its Data output pre-approval within four weeks of receipt to confirm that: The Recipient organization is compliant with minimum cell size and complementary cell suppression rules; The Data output has incorporated appropriate protections to prevent inferential identification of individuals (patients, providers, payers, etc.); The Data output is consistent with the Project description contained in the Recipient’s Data Application; and All requirements in WAC 00-00-000 have been followed.
AutoNDA by SimpleDocs
Data Output. 3.3.4.1 Output results with relevant, associated information via onboard display and/or annunciator, or via external IRDA compatible printers or terminal.
Data Output. There are two types of data output that may come out of the web service. [I] The first type is data or resources as such. This is particularly the cases where the web services include services such as viewing or downloading. In such cases, the basic rule to be followed is that the data or resources should be delivered to the end user with a license that confers the same or less rights than the one obtained by the web service provider. In other words, the service provider cannot give to the end user rights that she has not obtained. Another approach that is followed particularly in the cases where third party content is provided, is that the service provider either has a re-distribution contract with the content/ data provider that sets the terms and conditions under which the material is to be provided or the service provider does not obtain any license at all but rather just passes the resource to the end user with a license of the choice of the content/ data provider. Depending on the type of the license under which the content/ data is provided to the end user, it may be that the license also covers the retaining of the data/ content on the service provider's servers or that the content/ data is delivered to the end user through a web service that draws data from different source that do not necessarily reside on the web service provider's servers. We will return to this issue, when we cover the data input side.
Data Output. The side scan sonar data is summarised in the following drawings attached at the end of the report: ○ Side scan sonar track plot (ChartFigure1 – SSS-1) ○ Seabed features combined with side scan sonar track plot (Chart Figure 2 – SSS- 2)
Data Output 

Related to Data Output

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Interconnection Customer Provided Services The services provided by Interconnection Customer under this LGIA are set forth in Article 9.6 and Article 13.5.1. Interconnection Customer shall be paid for such services in accordance with Article 11.6.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

Time is Money Join Law Insider Premium to draft better contracts faster.