Data Transfer Method Sample Clauses

Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data.
AutoNDA by SimpleDocs
Data Transfer Method. The parties to this Agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. Each party will make sure that personal data shall be processed in a manner that ensures appropriate security of the personal data including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage using appropriate technical solutions or organisational measures in accordance with principle 7 of the DPA/Article 5(1)(f) of the GDPR. BMBC and schools must make sure they have procedures in place to prevent:  Accidental compromise or damage during storage, handling, use, processing, transmission or transport;  Deliberate compromise or opportunist attack;  Unauthorised disposal or destruction of the data;  Unauthorised access;  Accidental loss of personal data should be avoided through the implementation of appropriate security procedures. Regular flow (specify frequency) See Appendix A Ad hoc More than 21 items per flow Yes Less than 21 items per flow Give full details of how the transfer will be made and what security measures will be in place e.g. encryption, business secure mail or recorded signed for etc. Face to face Named point of contact at BMBC and school Telephone Electronically (state method) Perspective Lite Secure File Transfer (Angel Solutions) Secure E Mail Yes – Egress, 7zip, password protected Secure Mail Secure Courier Encrypted Removable Media Other Synergy – Servelec (Orchestra) Has a risk assessment been carried out on the chosen methods of transfer? Yes – BMBC Information Security Team What are the identified risks? Email is sent to the wrong email address – training provided to all staffaccess to email can be revoked.
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. Regular flow (specify frequency)  The Provider submits details of the children eligible to free early education and care on a termly basis i.e. school term.  The Provider also submits their data for the Annual Early Years Census return by the deadline set in January.  Providers must submit their data in accordance with the deadlines set out in the claim deadlines and payment schedule, the schedule for the financial year 2019/20 can be downloaded here: xxxx://xxx.xxxxxxxx.xxx.xx/beta/working-with- children/pdf/childcare-providers/free-early-education-care-funding-calendar-19.pdf  Academies must continue to provide daily/weekly pupil data transfers to the School Data Quality Team via the automated transfer system as per the Data Sharing Agreement with the School Data Quality Team. Give full details of how the transfer will be made and what security measures will be in place. Other (please state method)  Transfer of child data from the Provider to Kirklees Council is via a secure online portal provided by Servelec. Each Provider has a secure login xxxxx://xxxxxxxxxx.xxxxxxxx.xxx.xx/ProviderPortal  Transfer of child data from Academies to Kirklees Council is also via Groupcall Xporter and Anycomms+, authorised officers/staff have a secure login xxxxx://xxx.xxxxxxxx.xxx.xx/Login.aspx  Transfer of Early Years Pupil Premium eligibility confirmation from Kirklees Council to Academies is via AnyComms+, authorised officers/staff have a secure login xxxxx://xxx.xxxxxxxx.xxx.xx/Login.aspx  Transfer of eligibility evidence from the Provider to Kirklees Council is via a secure document upload xxx.xxxxxxxx.xxx.xx/xxxxxxxxxx  Transfer from Kirklees Council to the Department for Education is via a secure online portal, authorised officers have a secure login xxxxx://xxxxxxxx.xxxxxx.xxxxxxxxx.xxx.xx Has a risk assessment been carried out on the chosen methods of transfer? Yes What are the identified risks?  Council network violation  Department for Education network violation  Login details accessed by unauthorised officers/staff  Data sent to incorrect recipient 8. Audit and Review Organisation’s Name Kirklees Council – Learning and Early Support Service – Childcare Sufficiency Team Address Kirkgate Buildings, Xxxxx Street, Huddersfield, HD1 1BY Respons...
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. Regular flow (specify frequency) Daily Ad hoc N/A Give full details of how the transfer will be made and what security measures will be in place e.g. encryption, business secure mail or recorded signed for etc. Face to face N/A Telephone Contact schools to resolve pupil levels data conflicts. AnyComms N/A Secure E Mail To facilitate additional data validation from the DfE. Secure Mail N/A Secure Courier N/A Encrypted Removable Media N/A Other (please state method) Pupil level data is transferred from the schools Management Information System using encrypted third party file transfer. The transfer of this data is automatic and secure. Has a risk assessment been carried out on the chosen methods of transfer? Risk Factors have been assessed in DPIA number DPO21-47. What are the identified risks? Risks identified in DPIA number DPO21-47.  An employee may gain unauthorised access to the system, accessing personal data inappropriately. Either via password sharing or IT system error.  A user may download the data and use it for an unauthorised purpose.  An outside agency tries to access the data (hacking)  Data not being backed up, data which is lost is not capable of being retrieved  An employee changes sensitive data for their own purposes  Personal Sensitive Data is being shared with multiple parties in a joint project and there is the possibility of it going to the wrong place or ensuring the compliance of data protection of the other parties  Inadequate functionality (risks: not able to locate/delete records)
Data Transfer Method. The Parties agree to use secure file transfer protocol as the secure data transfer system to protect the privacy of the Data Exchange.
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. Regular flow (specify frequency) Ad hoc More than 21 items per flow Less than 21 items per flow For Police Data: It is expected that parties of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security.

Related to Data Transfer Method

  • Billing Method 1.5.1 To receive payment for services rendered under this contract, the Contractor shall submit a fully completed invoice for work previously performed to: Minneapolis Public Housing Authority Attention: Accounts Payable, Suite 307 0000 Xxxxxxxxxx Xxx X, Xxxxxxxxxxx, XX 00000 or: xxxxxxxx@xxxxxxx.xxx

  • Transfer Methods and Amounts Section 15 of the General Terms (Payment Methods and Amounts) applies to the Service, even in circumstances where the External Account is closed and we are attempting to return funds to such Account.

  • Test method 3.3.1. The method used shall be that described in Annex 3, paragraph 3.1.

  • Change of Method Without limiting the terms of this Agreement (a) Viking and Camber shall be empowered, upon their mutual agreement, at any time prior to the Effective Time, to change the method or structure of effecting the combination of Viking and Camber (including the provisions of ARTICLE I), if and to the extent they both deem such change to be necessary, appropriate or desirable or (b) if, at any time during the period beginning on the date that is forty (40) days after the date of this Agreement and ending on the later of (x) the time that the S-4 shall have become effective under the Securities Act and (y) the date that is sixty (60) days after the date of this Agreement, either of the Boards of Directors of Camber or Viking determines in good faith that a change in the structure of effecting the combination of Viking and Camber to a Direct Merger would be in the best interests of the Combined Company following the Merger, upon written notice to the other party of such determination, Camber and Viking shall take all action necessary, and cooperate in good faith, to effect such change in structure, including by making effective amendments to this Agreement (including the provisions of ARTICLE I) and to the S-4 to the extent necessary in connection therewith, provided that such notice may only be delivered following good faith consultation with the other party; provided, however, that no such change shall (i) alter or change the Exchange Ratio or the number of shares of Camber Common Stock received by holders of shares of Viking Common Stock in exchange for each share of Viking Common Stock, unless, in connection with any change effected pursuant to the foregoing clause (b), the economic benefits that are intended to accrue to Camber’s stockholders and Viking’s stockholders pursuant to the terms of this Agreement and the transactions contemplated hereby are identical in all but de minimis respects, (ii) adversely affect the Tax treatment of Camber’s stockholders or Viking’s stockholders pursuant to this Agreement, (iii) adversely affect the Tax treatment of Viking, Camber, the Combined Company and/or their respective Subsidiaries pursuant to this Agreement, or (iv) would reasonably be expected to prevent the consummation of the transactions contemplated by this Agreement or delay the consummation of such transactions beyond the Termination Date. The parties agree to reflect any such change in an appropriate amendment to this Agreement executed by both parties in accordance with Section 9.1.

  • Payment Methodology The Contractor shall be compensated based on the Service Rates in Attachment for units of service authorized by the Institution in a total amount not to exceed the Contract Maximum Liability established in Section C.1. The Contractor’s compensation shall be contingent upon the satisfactory completion of units of service or project milestones identified in Attachment B. The Contractor shall submit invoices, in form and substance acceptable to the Institution with all of the necessary supporting documentation, prior to any payment. Such invoices shall be submitted for completed units of service or project milestones for the amount stipulated.

  • Payment Method Payment shall be made by the Contractor to the Subcontractor as follows: (choose one) ☐ - Immediately upon completion of the Services to the satisfaction of the Contractor. ☐ - Within business days after completion of the Services to the satisfaction of the Contractor. ☐ - Shall be paid on a ☐ weekly ☐ monthly ☐ quarterly ☐ other

  • Allocation Method The Plan Administrator will allocate a Plan-Designated QNEC using the following method (Choose one of a., b., c., or d.):

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Settlement Method For any Option, Net Share Settlement; provided that if the Relevant Settlement Method set forth below for such Option is not Net Share Settlement, then the Settlement Method for such Option shall be such Relevant Settlement Method, but only if Counterparty shall have notified Dealer of the Relevant Settlement Method in the Notice of Final Settlement Method for such Option.

  • Data Universal Number System (DUNS) number Requirement Grantee will provide their valid DUNS number contemporaneous with execution of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.