Data Used Sample Clauses

Data Used. Canyon Creek Software uses Directory Information to allow parents and teachers to schedule conference appointments. Canyon Creek Software does not use educational, medical, disciplinary or other data/information. The only data created by users of the system is conference appointment dates and times.
AutoNDA by SimpleDocs
Data Used. The major part of the secondary data used in this study where found in articles, books and web-pages. Secondary data were also found and used from The Emergency Database (EM- DAT) and concerns historical data regarding countries related to disasters. In addition a survey was done related to the case study. The purpose of the survey was to collect primary data concerning humanitarian organizations preferences. The survey The survey was made available on the internet, and the invitation letter to participate in the survey was sent to 82 persons in total including all known Heads of logistics, if not known the main e-mail address, or known people in the organization. Organizations ranging from small private NOG’s to large multi-national NGO’s including IFRC and organizations within UN. 24 organizations responded to the questioner, where 12 completed the entire survey. In the further analysis we have only included the complete responses. The questioner was divided into two parts, each representing different aspect of our research. Part one looks into the preferences of the humanitarian organizations when it respect to lead time, punctuality, flexibility and customized products, and their preferences when it comes to long term contracts (LTA) and the extension of such contracts. Part two reveals the different organizations preferences regarding sourcing and pre- positioning, in respect to ROFI Industrier AS and their product spectrum. Quantitative data The data from the (EM-DAT) concerns countries affected from different types natural disasters during the period of 1999-2009. The data for each year were aggregated in order to define which countries have represented the biggest “markets” during the last decade. The data represented the different countries in terms of the different impacts made from natural disasters. The data were run through a process resulting in a group of countries that could be sorted out to be “target countries” and a group of disasters that could be defined as more dominant than others. The target countries and the dominant disasters were in the end used in order to propose where supplies should position their supplies to qualify for the humanitarian market and to be order winners.
Data Used. Canyon Creek Software uses Directory Information to allow parents and teachers to schedule conference appointments. Canyon Creek Software does not use EXHIBIT “B” SCHEDULE OF STUDENT DATA Category of Data Elements Check if used by your system Application Technology Meta Data IP Addresses of users, Use of cookies etc. COOKI ES Other application technology meta data-Please specify: Application Use Statistics Meta data on user interaction with application Assessment Standardized test scores Observation data Other assessment data- Please specify: Attendance Student school (daily) attendance data Student class attendance data Communication s Online communications that are captured (emails, blog entries) Conduct Conduct or behavioral data Demographics Date of Birth X Category of Data Elements Check if used by your system Place of Birth Gender Ethnicity or race Language information (native, preferred or primary language spoken by student) Other demographic information- Please specify: Enrollment Student school enrollment X Student grade level X Homeroom X Guidance counselor X Specific curriculum programs Year of graduation Other enrollment information- Please specify: Parent/Guardian Contact Information Address Email X Phone Parent/Guardian ID Parent ID number (created Category of Data Elements Check if used by your system to link parents to students) Parent/Guardian Name First and/or Last Schedule Student scheduled courses Teacher names X Special Indicator English language learner information Low income status Medical alerts /health data Student disability information Specialized education services (IEP or 504) Living situations (homeless/xxxxxx care) Other indicator information- Please specify: Student Contact Information Address Email Phone Student Identifiers Local (School district) ID X Category of Data Elements Check if used by your system number State ID number Vendor/App assigned student ID number Student app username Student app passwords Student Name First and/or Last X Student In App Performance Program/applica tion performance (typing program-student types 60 wpm, reading program-student reads below grade level) Student Program Membership Academic or extracurricular activities a student may belong to or participate in Student Survey Responses Student responses to surveys or questionnaires Student work Student generated content; writing, pictures etc. Other student work data - Category of Data Elements Check if used by your system Please specify: Trans...
Data Used. In the papers presenting new datasets, we examine what sensor data is collected. Due to space constraints, we describe only the type of sensors used, not specific usage details (e.g. the particu- lar touch events are examined). The main data categories used are summarised in Section 5. We have summarised the subject count, whether subjects needed to perform a specific task (every- thing from walking [35] to navigating maps [14]). Because it takes time to learn a task and that subject’s behavioural patterns can change over time, we examine whether researchers collect multi- ple session data, and if so, the time gap between sessions. It is also possible to have an “unconstrained” data collection, when data are captured over multiple days and doesn’t require the subject to interact with the system in any particular way, nor perform any task. We are interested in the overall duration of the data collection (sum of all data collection session duration). In some studies, it is argued that subjects should not know the real data capture reason in order not to affect the way how sub- jects interact with the mobile devices during data collection (e.g. [13]). Of course, it may be perceived to be unethical, if an “uncon- strained” data collection’s subjects would not know the collection reason and the type of data that is collected. Most of all we think that it is essential if authors publish data used in experiments and provide others with the data protocols so that others can reproduce their experiments identically. We try to see if there is a correlation between the fact that data is pub- lished and the citation count. It would seem logical, that papers that introduce public datasets would be cited more.

Related to Data Used

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Authorized User Overview and Mini-Bid Process Project Based IT Consulting Services Contracts enable Authorized Users to use a competitive Mini-bid Process to acquire Services on an as-needed basis, for qualified IT Projects. Project Based IT Consulting Services may include, but will not be limited to projects requiring: analysis, data classification, design, development, testing, quality assurance, security and associated training for Information Technology based applications. See section 1.3 Out of Scope Work for a listing of projects expressly excluded from the scope of this Contract. An Authorized User Agreement for Project Based IT Consulting Services will be governed first by the terms and conditions specified in the OGS Centralized Contract and second by terms and conditions added to the Authorized User Statement of Work. Additional terms and conditions shall not conflict with or modify the terms and conditions of the OGS Centralized Contract. NYS Executive Agencies must adhere to all internal processes and approvals including, as required, approval from NYS Office of Information Technology Services. Other Authorized Users must adhere to their own internal processes and approvals. In accordance with Appendix B, section 28, Modification of Contract Terms, an Authorized User may add additional required terms and conditions to this Mini-Bid and resultant Authorized User Agreement only if such terms and conditions (1) are more favorable to the Authorized User and (2) do not conflict with or supersede the OGS Centralized Contract terms and conditions. Examples of additional terms and conditions include: • Expedited delivery timeframe; • Additional incentives, such as discount for expedited payment/Procurement Card use; and • Any additional requirements imposed by the funding source or Federal law.

  • Data Location 1.1. The CONTRACTOR shall not store or transfer non-public COUNTY data outside of the United States. This includes backup data and Disaster Recovery locations. The CONTRACTOR will permit its personnel and contractors to access COUNTY data remotely only as required to provide technical support. (Remote access to data from outside the continental United States is prohibited unless approved in advance and in writing by the County.)

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Internet Access to Contract and Pricing Information Access by Authorized Users to Contract terms and pricing information shall be made available and publically posted on the OGS website. To that end, OGS shall publically post the Contract Pricelist, including all subsequent changes in the Contract offerings (adds, deletes, price revisions), Contractor contact information, and the Contract terms and conditions, throughout the Contract term.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • DATA PROCESSING TERMS For the purposes of the Data Protection Legislation, the Sponsor is the Controller, the Participating Site is the Sponsor's Processor and the PIC is the Sub-Processor of the Participating Site in relation to all Processing of Personal Data that is Processed for the purpose of this Study and for any future research use under the Controllership of the Sponsor, that would not have taken place but for this Agreement regardless where that Processing takes place. The Parties acknowledge that whereas the Sponsor is the Controller in accordance with Clause 3.2, the PIC is the Controller of the Personal Data collected for the purpose of providing clinical care to the Participants. This Personal Data may be the same Personal Data, collected transparently and processed for research and for care purposes under the separate Controllerships of the Sponsor and PIC. Where the PIC is the Participating Site's Sub-Processor and thus where the Processing is undertaken by the PIC for the purposes of the Study, Clauses 3.5 to 3.9 below will apply. For the avoidance of doubt, such Clauses do not apply where the PIC is Processing the Participant Personal Data as a Controller. The PIC agrees only to Process Personal Data for and on behalf of the Participating Site in accordance with the instructions of the Participating Site or Sponsor and for the purpose of the Study and to ensure the Sponsor’s and Participating Site’s compliance with the Data Protection Legislation; The PIC agrees to comply with the obligations applicable to Processors described by Article 28 GDPR including, but not limited to, the following: to implement and maintain appropriate technical and organisational security measures sufficient to comply at least with the obligations imposed on the Controller by Article 28(1); to not engage another Processor without the prior written authorisation of the Sponsor (Article 28(2)); to Process the Personal Data only on documented instructions from the Participating Site or Sponsor unless required to do otherwise by legislation, in which case the PIC shall notify the Participating Site before Processing, or as soon as possible after Processing if legislation requires that the Processing occurs immediately, unless legislation prohibits such notification on important grounds of public interest (Article 28(3a)).; to ensure that personnel authorised to Process Personal Data are under confidentiality obligations (Article 28(3b)); to take all measures required by Article 32 GDPR in relation to the security of processing (Article 28(3c)); to respect the conditions described in Article 28(2) and (4) for engaging another Processor (Article 28(3d)); to, taking into account the nature of the Processing, assist the Participating Site and/or the Sponsor, by appropriate technical and organisational measures, insofar as this is possible, to respond to requests for exercising Data Subjects’ rights (Article 28(3e)); to assist the Controller, to ensure compliance with the obligations pursuant to Articles 32 to 36 GDPR taking into account the nature of the Processing and the information available to the PIC (Article 28(3f)); to, at the choice of the Sponsor, destroy or return all Personal Data to the Sponsor at the expiry or early termination of the Agreement, unless storage is legally required (Article 28(3g)) or where that Personal Data is held by the PIC as Controller for the purpose of clinical care or other legal purposes; and

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

Time is Money Join Law Insider Premium to draft better contracts faster.