Data Used Sample Clauses

Data Used. Canyon Creek Software uses Directory Information to allow parents and teachers to schedule conference appointments. Canyon Creek Software does not use educational, medical, disciplinary or other data/information. The only data created by users of the system is conference appointment dates and times.
Data Used. In the papers presenting new datasets, we examine what sensor data is collected. Due to space constraints, we describe only the type of sensors used, not specific usage details (e.g. the particu- lar touch events are examined). The main data categories used are summarised in Section 5. We have summarised the subject count, whether subjects needed to perform a specific task (every- thing from walking [35] to navigating maps [14]). Because it takes time to learn a task and that subject’s behavioural patterns can change over time, we examine whether researchers collect multi- ple session data, and if so, the time gap between sessions. It is also possible to have an “unconstrained” data collection, when data are captured over multiple days and doesn’t require the subject to interact with the system in any particular way, nor perform any task. We are interested in the overall duration of the data collection (sum of all data collection session duration). In some studies, it is argued that subjects should not know the real data capture reason in order not to affect the way how sub- jects interact with the mobile devices during data collection (e.g. [13]). Of course, it may be perceived to be unethical, if an “uncon- strained” data collection’s subjects would not know the collection reason and the type of data that is collected. Most of all we think that it is essential if authors publish data used in experiments and provide others with the data protocols so that others can reproduce their experiments identically. We try to see if there is a correlation between the fact that data is pub- lished and the citation count. It would seem logical, that papers that introduce public datasets would be cited more.
Data Used. Canyon Creek Software uses Directory Information to allow parents and teachers to schedule conference appointments. Canyon Creek Software does not use EXHIBIT “B” SCHEDULE OF STUDENT DATA Category of Data Elements Check if used by your system Application Technology Meta Data IP Addresses of users, Use of cookies etc. COOKI ES Other application technology meta data-Please specify: Application Use Statistics Meta data on user interaction with application Assessment Standardized test scores Observation data Other assessment data- Please specify: Attendance Student school (daily) attendance data Student class attendance data Communication s Online communications that are captured (emails, blog entries) Conduct Conduct or behavioral data Demographics Date of Birth X Category of Data Elements Check if used by your system Place of Birth Gender Ethnicity or race Language information (native, preferred or primary language spoken by student) Other demographic information- Please specify: Enrollment Student school enrollment X Student grade level X Homeroom X Guidance counselor X Specific curriculum programs Year of graduation Other enrollment information- Please specify: Parent/Guardian Contact Information Address Email X Phone Parent/Guardian ID Parent ID number (created Category of Data Elements Check if used by your system to link parents to students) Parent/Guardian Name First and/or Last Schedule Student scheduled courses Teacher names X Special Indicator English language learner information Low income status Medical alerts /health data Student disability information Specialized education services (IEP or 504) Living situations (homeless/xxxxxx care) Other indicator information- Please specify: Student Contact Information Address Email Phone Student Identifiers Local (School district) ID X Category of Data Elements Check if used by your system number State ID number Vendor/App assigned student ID number Student app username Student app passwords Student Name First and/or Last X Student In App Performance Program/applica tion performance (typing program-student types 60 wpm, reading program-student reads below grade level) Student Program Membership Academic or extracurricular activities a student may belong to or participate in Student Survey Responses Student responses to surveys or questionnaires Student work Student generated content; writing, pictures etc. Other student work data - Category of Data Elements Check if used by your system Please specify: Trans...

Related to Data Used

  • Data Use First Data may use transaction data obtained from providing the Services to the Company to fulfil performance obligations under this Agreement and investigate fraud, or suspected fraud, related to the Company’s transactions. First Data may also use transaction data obtained from providing the Services under this Agreement in aggregated and anonymised form (as required by applicable Laws) for research and development, or to provide services generally.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Authorized User Overview and Mini-Bid Process Project Based IT Consulting Services Contracts enable Authorized Users to use a competitive Mini-bid Process to acquire Services on an as-needed basis, for qualified IT Projects. Project Based IT Consulting Services may include, but will not be limited to projects requiring: analysis, data classification, design, development, testing, quality assurance, security and associated training for Information Technology based applications. See section 1.3 Out of Scope Work for a listing of projects expressly excluded from the scope of this Contract. An Authorized User Agreement for Project Based IT Consulting Services will be governed first by the terms and conditions specified in the OGS Centralized Contract and second by terms and conditions added to the Authorized User Statement of Work. Additional terms and conditions shall not conflict with or modify the terms and conditions of the OGS Centralized Contract. NYS Executive Agencies must adhere to all internal processes and approvals including, as required, approval from NYS Office of Information Technology Services. Other Authorized Users must adhere to their own internal processes and approvals. In accordance with Appendix B, section 28, Modification of Contract Terms, an Authorized User may add additional required terms and conditions to this Mini-Bid and resultant Authorized User Agreement only if such terms and conditions (1) are more favorable to the Authorized User and (2) do not conflict with or supersede the OGS Centralized Contract terms and conditions. Examples of additional terms and conditions include: • Expedited delivery timeframe; • Additional incentives, such as discount for expedited payment/Procurement Card use; and • Any additional requirements imposed by the funding source or Federal law.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • SERVICE LEVEL DESCRIPTION The Fund Accounting Agreement is hereby amended by deleting the Service Level Description attached thereto and replacing it in its entirety with the Service Level Description attached hereto.

  • GENERAL SERVICE DESCRIPTION Service Provider will perform Telecom Invoice Processing Services (TAPS), for Long Distance Voice and Data Circuitry, for Service Receiver. Service Receiver and its Subsidiaries will utilize the Service Provider’s resources based on the functionality, processes, input and output screens and documents that support the Service Provider’s business and business processes in the twelve months prior to the Distribution date.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Authorized User’s Statement of Work A competitive Mini-Bid is required for every transaction under this Centralized Contract. An Authorized User must prepare a detailed Statement of Work using Appendix F, Attachment 1, Mini-Bid Template. The Authorized User must distribute the Mini-Bid to all qualified Vendors per Lot(s) (unless a Vendor has removed itself from consideration via the Appendix F, Attachment 5, Mini-Bid Participation Interest Template). Contact information, organized by Lot, will be available on the OGS website for this Contract. An Authorized User shall conduct its Mini-Bid in accordance with the requirements set forth in Appendix F, Attachment 2, How to Use this Contract. The following terms and conditions shall apply to each Mini-Bid issued by an Authorized User:  An Authorized User may require the execution of unique forms, such as Confidentiality Non- Disclosure agreements; and  An Authorized User is required to make tentative award and non-award notifications to each Contractor who submitted a response to the Mini-Bid. Additionally, the minimum time, excluding the date of release, between issuance of the Mini-Bid by the Authorized User to the Mini-Bid Opening is as follows:  Xxx 0 Xxxx-Xxxx: Xxxx (0) Xxxxxxxx Xxxx  Xxx 0 Mini-Bids: Ten (10) Business Days

  • Service Description The Parties will provide Common Channel Signaling (CCS) to one another via Signaling System 7 (SS7) network interconnection, where and as available, in the manner specified in FCC Order 95-187, in conjunction with all traffic exchange trunk groups. SS7 signaling and transport services shall be provided by GTE in accordance with the terms and conditions of this Section 9 of this Article. The Parties will cooperate on the exchange of all appropriate SS7 messages for local and intraLATA call set-up signaling, including ISDN User Part (ISUP) and Transaction Capabilities Application Part (TCAP) messages to facilitate full interoperability of all CLASS Features and functions between their respective networks. Any other SS7 message services to be provided using TCAP messages (such as data base queries) will be jointly negotiated and agreed upon.