Data Requests and Release Sample Clauses

Data Requests and Release. Contractor is responsible for responding to and fulfilling data product requests; and collecting payment for data products as well as services, such as data file linkages from the Data Requestors. Contractor is responsible for all CDR Program standardized agreements, updating the data request and data release policies, processing requests through the Data Governance Committee, maintaining a log of data and access requests (both denied and approved), and maintaining a log of DUA compliance monitoring and reporting activities. Contractor is responsible for developing DUA Exhibit A: Approved CDR Data Application(s) and Exhibit C: Data Submission Agreement, in collaboration with HCA and the Data Governance Committee. Contractor and HCA recognize the need to evaluate the existing Health Information Exchange Participation Agreement to ensure the growing needs of the CDR Program are met. HCA, as the Program Administrator, will sign DUAs when data is requested by a Washington State Agency, or by Contractor when requesting data as a Private Entity. Contractor will execute a DUA substantially similar to Exhibit B: Data Use Agreement, with Data Requestors for approved requests. Contractor must maintain the confidentiality of the data it collects, including direct or indirect patient identifiers. Contractor is responsible for implementing and maintaining the appropriate processes and internal controls to ensure data are accessible only to authorized Data Users in compliance with all applicable laws. Contractor, in collaboration with HCA and the Data Governance Committee, is responsible for developing policies and procedures to ensure the quality and security of data releases. The policies and procedures include user related processes, data request processes, input related processes, and data destruction procedures at the end of the project that required the data. This also includes collaborating with the Data Requestor’s Internal Review Board for research use cases, which may include the Washington State Internal Review Board (WSIRB), developing a standard confidentiality agreement, data management plan, DUA and monitoring compliance to DUAs.
AutoNDA by SimpleDocs

Related to Data Requests and Release

  • DATA REQUESTS Upon the written request of the District, the State Auditor’s Office, the Appraisal District, or the Comptroller during the term of this Agreement, the Applicant, the District or any other entity on behalf of the District shall provide the requesting party with all information reasonably necessary for the requesting party to determine whether the Applicant is in compliance with its rights, obligations or responsibilities, including, but not limited to, any employment obligations which may arise under this Agreement.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release.

  • Notice of Enrollment Said meeting and conferring shall not be subject to the impasse procedures in Government Code Section 3557. The Department sponsoring the NEO shall provide the foregoing information no less than five (5) business days prior to the NEO taking place. The Department will make best efforts to notify the Union NEO Coordinator of any last-minute changes. Onboarding of individual employees for administrative purposes is excluded from this notice requirement.

  • Notice of Separation When an employee’s resignation is presumed in accordance with Section 27.2 above, the Employer will separate the employee by sending a separation notice to the employee by certified mail to the last known address of the employee. Such notice will include information regarding eligibility for continuation of medical benefits.

  • Application Form By electronically signing or submitting the Application Form you:

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • RELEASE OF BID EVALUATION MATERIALS Requests concerning the evaluation of Bids may be submitted under the Freedom of Information Law. Information, other than statistical or factual tabulations or data such as the Bid Tabulation, shall only be released as required by law after Contract award. Bid Tabulations are not maintained for all procurements. Names of Bidders may be disclosed after Bid opening upon request. Written requests should be directed to the Commissioner.

  • Waiver of FOIA Request The defendant waives all of his rights, whether asserted directly or by a representative, to request or receive from any department or agency of the United States any records pertaining to the investigation or prosecution of this case including, without limitation, any records that may be sought under the Freedom of Information Act, 5 U.S.C. § 552, or the Privacy Act of 1974, 5 U.S.C. § 552a.

  • Photographic/Recording Release I hereby grant and convey unto the Released Parties all right, title and interest in any and all photographs and video/audio/electronic recordings of me, including as to my name, image and voice, made by or on behalf of any of the Released Parties during my Activities with the Released Parties, including, but not limited to, the right to use such materials for any purpose and to any royalties, proceeds or other benefits derived from them. I understand that I will not have any ownership interest in or to such photographs, images and/or recordings, I have not been provided or promised any compensation to me, and I hereby waive any rights, privileges or claims based on any right of publicity, privacy, ownership or any other rights arising, relating to or resulting from the photographs, images and/or recordings. I understand and agree that this paragraph also applies to my minor child(ren) who are volunteering.

  • PHOTOGRAPH RELEASE You give your permission to us to use any photograph or photographic image including video or video stills taken of you while you are in any Common Areas of the Community or at any Community sponsored events. You hereby grant us and any of our affiliates, successors or someone authorized by us, the irrevocable and unrestricted right and permission to copyright, in its own name or otherwise, the unlimited use of your image, without restriction as to changes or alterations, made through any medium, for any legal purpose whatsoever. You also consent to the use of any printed matter in conjunction therewith. You hereby waive any right that you may have to inspect or approve the finished product and the advertising copy or other matter that may be used in connection therewith or the use to which it may be applied. You hereby release, discharge, and agree to hold harmless us and any of our affiliates, successors or someone authorized by us, for all claims and demands arising out of or in connection with the use of the images taken of you, including without limitation any and all claims for libel, false light or invasion of privacy.

Time is Money Join Law Insider Premium to draft better contracts faster.