FP7 Security Research Clause Samples

FP7 Security Research. The RTD Research and Technological Development Framework Programme is the EU’s main instrument for funding (pre-operational) research and for establishing the European Research Area (ERA). The FPs provide multi-annual funding support to promote ‘world-class’ research, strengthen Europe’s scientific and industrial base, ▇▇▇▇▇▇ innovation, improve competitiveness and contribute to quality in employment. The 7th Framework Programme (FP7)16 with a budget of EUR 50.5 bn was adopted in 2006 and covers the 2007-2013 period. The aim of FP7 is to contribute to the EU becoming the world's leading research area through investment in world-class ‘state of the art’ research excellence. Its objectives are to: strengthen the scientific and technological base of European industry and to encourage international competitiveness, while promoting research that supports EU policies. FP7 is grouped into four programmes: Cooperation, Ideas, People and Capacities. The main instruments through which research funding is provided through FP7 include transnational collaborative projects and networks, which promote collaboration between publicly funded research and industry. Following the successful implementation of PASR, a fully-fledged EU Security Research programme (FP7 Security - Theme 10) was included for the first time in the RTD Framework Programmes. FP7 Security, which has a budget of EUR1.4 billion, falls within the Cooperation objective, which fosters collaborative research across Europe and other partner countries and is the core of FP7. Funding from the European Commission’s DG Enterprise is supplemented by national co-financing for Security Research projects from beneficiaries and in some cases from national government funds to support R&D.

Related to FP7 Security Research

  • System Security Review All systems processing and/or storing County PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Technology Research Analyst Job# 1810 General Characteristics

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Student Data Property of LEA All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

  • Research Funding (a) During each Collaboration Term and in connection with any wind-down activities contemplated by Section 13.4. Gilead shall reimburse Hookipa for all Out-of-Pocket Costs actually incurred (with no markup) by Hookipa in connection with the applicable Program, to the extent specifically contemplated in the applicable Research Plan and in accordance with the applicable Research Budget. Gilead shall reimburse the undisputed amount of such Out-of-Pocket Costs incurred in a [***] within [***] days after receipt from Hookipa of an invoice therefor issued within [***] days after the end of such [***]. (b) During each Collaboration Term for a Program, Gilead shall reimburse Hookipa at the FTE Rate for the costs of any FTEs (not to exceed the number of FTEs specified in the applicable Research Plan for such Program for any period without first obtaining, in each case, Gilead’s prior written consent) actually performing activities allocated to Hookipa under such Research Plan. Hookipa shall provide to Gilead, within [***] days after the end of each [***] during each Collaboration Term, a report indicating the number of FTEs actually provided by Hookipa with respect to each Program during such [***], Hookipa shall use standard industry systems and processes to record the number of hours and FTEs actually applied to each Program, which systems and processes shall be consistently and equitably applied to all Hookipa research programs with Third Parties. Gilead shall reimburse Hookipa the undisputed amount for such FTE costs incurred in a [***] within [***] days after receipt from Hookipa of an invoice therefor issued within [***] days after the end of each [***]. (c) For clarity, Gilead shall not be obligated to reimburse Hookipa for any costs or expenses incurred by Hookipa in the course of its activities under the Programs, other than: (i) those costs and expenses expressly identified in this Section 9.6 or elsewhere in this Agreement; (ii) reimbursement for the supply of Licensed Products to Gilead in accordance with the terms of any supply agreement entered into by the Parties pursuant to Section 7.2; or (iii) any other costs and expenses approved by Gilead in writing in advance.