Data Sharing and Use Clause Samples

The Data Sharing and Use clause defines the rules and limitations regarding how data exchanged between parties can be accessed, used, and disclosed. Typically, it outlines what types of data may be shared, the permitted purposes for using such data, and any restrictions on further distribution or modification. This clause is essential for protecting sensitive information, ensuring compliance with privacy laws, and clarifying each party’s responsibilities in handling shared data.
Data Sharing and Use. ‌ 1. The Parties will share “unprocessed” Covered Data: i.e., as originally generated, or, if so requested by the Data Recipient and approved by the applicable Responsible RC, as necessary in order to achieve a Permitted Purpose, then in an alternative format that allows easier processing without loss of any underlying information. 2. Except as otherwise explicitly provided for in this Agreement, Covered Data shall be given to Data Recipients solely for Permitted Purposes. While the applicable Responsible RC(s) will generally be the clearinghouse within their respective RC service area for provision of Covered Data requested by Data Recipients as permitted through the execution of this Agreement, Parties to this Agreement are not restricted from sharing any data that is treated as Covered Data directly with each other. a. Without limiting the foregoing, Covered Data shared under this Agreement may not be shared with any entity’s Merchant/Market Function, except: (i) During a Bulk Electric System Emergency as defined in the NERC Reliability Standards; (ii) As may be compelled by law or judicial or regulatory order or directive; or b. The usage limitations set forth in this Agreement shall not apply to Covered Data of a U.S. Original Data Provider where such data is requested by FERC, NERC, a Compliance Enforcement Authority, or a governmental authority exercising proper jurisdiction over such Data Recipient(s). The requirements related to notice when Covered Data of a U.S. Original Data Provider is requested by a third party or through Legal Process shall not apply where such notice is prohibited by investigative confidentiality or similar legal requirements. 3. Parties may engage contractors to provide support for the performance of operational and management tasks under this Agreement. Any such contract support shall use Covered Data or information exchanged under this Agreement solely for Permitted Purposes, including administration of this Agreement. A Party’s contractors shall be bound hereto in all respects and as fully as the Party itself. 4. The Original Data Provider shall maintain full control and ownership of Covered Data it provides. Any Original Data Provider's use or disclosure of its own Covered Data shall not be restricted by the terms of this Agreement or be deemed a breach of this Agreement. 5. Each Party shall have and maintain full control and ownership of any Derived Information that it creates; provided, however, that such Derived Info...
Data Sharing and Use. (a) Data Sharing. In addition to the adverse event and safety report reporting obligations under Section 5.7 below, each Party shall promptly provide the other Party with copies of all material Data and results generated from its (including its Affiliates’, licensees’ and sublicensees’) Development of the Licensed Compounds and Licensed Products in its Territory to the extent necessary for the Development of the Licensed Compounds and Licensed Products in the other Party’s Territory.
Data Sharing and Use. ‌ Grantee gives HRiA the right to access, possess, and use any non-identifying information or data that it develops or produces (or by anyone working on ▇▇▇▇▇▇▇’s behalf) as part of the work covered by this agreement, as well as any similar information or data provided to Grantee by another party for use in the work covered by this Grant Agreement. Grantee will provide such information or data upon request and is responsible for maintaining the confidentiality and security of such information or data and removing any personally identifiable information (e.g., name, address, phone number, social security number) from any such information or data provided to HRiA.
Data Sharing and Use a. The Program Coordinator will provide BC with a list of students enrolled in the program each semester, along with program of interest at UWF. b. BC will verify students’ continued eligibility which requires enrollment in a minimum of six college credits each semester. c. The Program Coordinator and BC will work collaboratively to follow up with students who do not meet eligibility to remain in the Program. d. Program Coordinator will provide BC with any Program assessment and evaluation data that are collected. e. Data collected in relationship to the Program may be shared between BC and UWF. By enrolling in the Program, students shall confirm their consent for BC and UWF to share relevant information to include, but not limited to: transcripts from BC and other institutions the student has attended, GPA, grades, program of study, contact information, potential transfer dates, degrees awarded, and other such data as may be necessary to assist the student as needed. f. Both parties agree that they will only use and maintain student records received from the other party in furtherance of the Program and in accordance with the requirements of FERPA and Sections 1002.22 and 1006.52, of the Florida Statues.
Data Sharing and Use. The Receiving Party represents and warrants that it shall comply, and shall ensure that any Subcustodians and third-party service providers comply, with all applicable national, federal, local and state law and policies regarding IT, security, access, data protection, and privacy, for example, Office of the Chief Information Officer of Washington State (OCIO) Policy No. 141.10. All Confidential Information will be transferred, transmitted, and stored in a method that meets the data’s security classification, as set forth herein, and to be updated when necessary. The Receiving Party shall adhere to industry standards such as National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and/or Center for Internet Security (CIS) Controls to protect IT systems, applications, and data. Purpose of Sharing and Authority to Share The Confidential Information shared under this Contract is needed for the Receiving Party to provide custody services. The Confidential Information is shared pursuant to this Contract and RCW 43.33A.010. Data Classification and Restrictions on Usage Confidential Information shared pursuant to this Contract is classified as Category 3 as described in OCIO Policy No. 141.10. Subject to the terms and conditions of this Contract, the WSIB hereby grants the Receiving Party a limited license for the access and use the Confidential Information for the sole purpose of providing the services described in this Contract. This grant of access will not be deemed as providing the Receiving Party with ownership rights to the Confidential Information. The Confidential Information being shared/accessed is owned and belongs to the WSIB. This Contract does not constitute a release of the Confidential Information for the Receiving Party’s discretionary use. The Receiving Party must use the Confidential Information received or accessed under this Contract only to carry out the purpose and justification of this Contract. Any analysis, use, or reporting that is not within the purpose of this Contract is not permitted without the WSIB’s prior written consent. This Contract does not constitute a release for the Receiving Party to share the Confidential Information to third parties, including Subcontractors or other third parties, without the WSIB’s prior written consent. All reports derived from the Confidential Information shared under this Contract, produced by the Receiving Party that are created with the intention of being published for or...
Data Sharing and Use