Data Sovereignty by Design in Data Spaces Clause Samples

Data Sovereignty by Design in Data Spaces. In the more general literature on data sovereignty, (▇▇▇▇▇▇ et al., 2021) identify several specific values commonly associated with it (e.g., control and power; security and non- maleficence; deliberation, representation, and inclusion; privacy; ownership; and transparency). Data sovereignty itself often appears as a kind of overarching concept, or umbrella concept, which incorporates many different values within it. The traditional understanding of sovereignty itself is often classified as a ‘cluster concept’ (▇▇▇▇, 2002) because it consists of many related concepts, such as autonomy (of citizens), justice (within the state), and security (of the state). For this report, we identified the most significant values for the application of agricultural data sovereignty in data spaces, based on extensive literature searches, value mapping from current agricultural data sharing documents (such as the EU Code of Conduct for Agricultural Data Sharing by Contractual Agreement – the EUCC) (see Appendix 2 for a detailed explanation of this process). The proposed set of values, their definitions, and, when relevant, the motivations behind choosing them are listed in Table 3. Human Welfare People’s physical, material, and psychological well-being. Including avoiding actions that can go against human welfare. Privacy The right of an individual to determine what information about himself or herself can be communicated to others. Informed Consent To ▇▇▇▇▇▇ people’s voluntary and reviewable agreement using accurate information about what is being agreed, including potential benefits and ▇▇▇▇▇. Control Right to control access to information, use it, manage it, derive income from it, and bequeath it. Autonomy People’s ability to decide, plan, and act in ways that they believe will help them achieve their goals without being controlled by anyone else. Justice Fairness in the way people is dealt with. Avoiding social or technical bias, especially in making all people successful users of information technology. Accountability A situation in which someone can be made responsible for things that happen and can give a satisfactory reason for them. Trust Existing expectations between people who can experience goodwill, extend goodwill toward others, feel vulnerable, and experience betrayal. Solidarity Unity or agreement of feeling or action, especially among individuals with a common interest; mutual support within a group. Dignity Avoiding discrimination or stigmatization, includi...

Related to Data Sovereignty by Design in Data Spaces

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the ISO OATT.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not ▇▇▇, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.