Information Sharing Policies Sample Clauses

Information Sharing Policies. We use four types of information sharing policies in the information sharing protocol. They are information release (IR) policies, credential release (CR) policies, trust level adjustment (TLA) policies, and access control (AC) policies. To illustrate the four types of policies, we need to first introduce a set of notations. In our protocol, we assume there are two agencies: A and B. We assume Ca1, …, Cam are the m credentials held by agency A; and Cb1, …, Cbn are the n credentials held by agency B. We assume Ua1, …, Uau are the u units of information owned by A; and Ub1, …, Ubv are the v units of information owned by B. We assume TL(A) is the trust level of A in the eyes of agency B, which indicates the degree to which B trusts A; and TL(B) is the trust level of B maintained by A. We assume the trust levels are quantified using an integer from 1 to 10, the simplest way. Although trust levels can be quantified in a more complicated way, numerical trust levels are enough to show the idea of our information sharing protocol. Finally, we assume utitlity(Uai) measures the utility level of information unit Uai to agency A, which indicates the degree to which Uai is useful to A. We assume utilities are quantified using an integer from 1 to 7. Now we define the four types of information sharing policies one by one following an order that can best illustrate the relationships among these policies. An information release policy is used to help agency A to determine when a specific information unit can be disclosed to agency B. An IR policy is simply a set of component policies. An example IR component policy is shown in Figure 4, where we can see that an IR component policy is composed of two parts: the condition part is a conjunction or disjunction of a set of predicates, and the action part specifies the information unit that can be released when the condition is satisfied?” The condition of an IR component policy can consist of 0 to 4 predicates. When there are 0 predicates, there is no restriction to disclose the information unit. When there are 4 predicates, as Figure 4 shows, when agency A wants to determine whether to disclose an information unit to agency B, the first predicate is to check if B is “authorized” to access the information unit. How such checking should be done is specified by an access control policy which we will define shortly. Condition: access-control-passed({Cb1, …, Cbp}, Uaj) AND received-and-valid(Ub1, …, Ubq) AND utility(Ub1, …, Ubq) >...
AutoNDA by SimpleDocs

Related to Information Sharing Policies

  • Information Sharing (a) HHSC will provide the MA Dual SNP with resources regarding the LTSS covered by Medicaid in accordance with this section.

  • Payroll Information Payroll checks shall include all required information, a clear designation as to the amount and category, e.g., regular, overtime or holiday pay, of compensation for which payment is being made.

  • SIGNIFICANT ACCOUNTING POLICIES The interim financial statements are prepared by using the same accounting policies and methods of computation as were used for the financial statements for the year ended December 31, 2019, except the changes in accounting policies as follows.

  • Sharing Information Each party hereto shall as promptly as possible, and in any event within two (2) business days, inform the other of any material communications between such party and the FCC or any other Governmental Authority regarding this Agreement or the transactions contemplated hereby. If any party receives a request for additional information or documentary material from any such Governmental Authority, then such party shall endeavor in good faith to make, or cause to be made, as promptly as practicable and after consultation with the other party, an appropriate response to such request.

  • - CLEC INFORMATION CLEC agrees to work with Qwest in good faith to promptly complete or update, as applicable, Qwest’s “New Customer Questionnaire” to the extent that CLEC has not already done so, and CLEC shall hold Qwest harmless for any damages to or claims from CLEC caused by CLEC’s failure to promptly complete or update the questionnaire.

  • Required Confidential Information Status Form CONFIDENTIAL INFORMATION SUBMITTED IN RESPONSE TO COMPETITIVE PROCUREMENT REQUESTS OF EDUCATION SERVICE CENTER REGION 8 AND TIPS (ESC8) IS GOVERNED BY TEXAS GOVERNMENT CODE, CHAPTER 552 If you consider any portion of your proposal to be confidential information and not subject to public disclosure pursuant to Chapter 552 Texas Gov’t Code or other law(s), you must attach a copy of all claimed confidential materials within your proposal and put this COMPLETED form as a cover sheet to said materials then scan, name “CONFIDENTIAL” and upload with your proposal submission. (You must include all the confidential information in the submitted proposal. The copy uploaded is to indicate which material in your proposal, if any, you deem confidential in the event the receives a Public Information Request.) ESC8 and TIPS will follow procedures of controlling statute(s) regarding any claim of confidentiality and shall not be liable for any release of information required by law. Upon your claim and your defense to the Office of Texas Attorney General is required to make the final determination whether the information submitted by you and held by ESC8 and TIPS is confidential and exempt from public disclosure. Tobii Dynavox LLC Name of company Xxxx Xxxxxxxx, President, North American Market Printed Name and Title of authorized company officer declaring below the confidential status of material 0000 Xxxxxxx Xx., Suite 400 Pittsburgh PA 15203 800-344-1778 Address City State ZIP Phone ALL VENDORS MUST COMPLETE THE ABOVE SECTION. I DO CLAIM parts of my proposal to be confidential and DO NOT desire to expressly waive a claim of confidentiality of all information contained within our response to the solicitation. The attached contains material from our proposal that I classify and deem confidential under Texas Gov't Code Sec. 552 or other law(s) and I invoke my statutory rights to confidential treatment of the enclosed materials. ATTACHED ARE COPIES OF PAGES OF CLAIMED CONFIDENTIAL MATERIAL FROM OUR PROPOSAL THAT WE DEEM TO BE NOT PUBLIC INFORMATION AND WILL DEFEND THAT CLAIM TO THE TEXAS ATTORNEY GENERAL IF REQUESTED WHEN A PUBLIC INFORMATION REQUEST IS MADE FOR OUR PROPOSAL. Signature Date 2/3/2020 OR I DO NOT CLAIM any of my proposal to be confidential, complete the section below.

  • Budget Information Funding Source Funding Year of Appropriation Budget List Number Amount EPIC 18-19 301.001F $500,000 EPIC 20-21 301.001H $500,000 R&D Program Area: EDMFO: EDMF TOTAL: $ 1,000,000 Explanation for “Other” selection Reimbursement Contract #: Federal Agreement #:

  • Membership Information 4.3.1 The District shall take all reasonable steps to safeguard the privacy of CSEA members’ personal information, including but not limited to members Social Security Numbers, personal addresses, personal phone number, personal cellular phone number, and status as a union member.

  • Disclosure of Personal Information We may disclose your personal information to third parties, when necessary, and to our affiliates in connection with the services we provide related to your holding of Units of the Fund(s), including:

  • OPERATIONAL INFORMATION (i) ISIN Code: [ ]

Time is Money Join Law Insider Premium to draft better contracts faster.