Requester and Approved User Responsibilities Sample Clauses

Requester and Approved User Responsibilities. The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to th...
AutoNDA by SimpleDocs
Requester and Approved User Responsibilities. The Requester agrees that the Approved User has reviewed and understands the principles for statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the Approved User’s facility or at the contractor’s facility. In addition, the Approved User is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific Collaborators, including contractors, who are not at the Requester must submit their own DAR.
Requester and Approved User Responsibilities. The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the same institution as the PI must submit their own DAR.
Requester and Approved User Responsibilities. The Requester agrees that the Approved User has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved User further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant Requester policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the Approved User is in good standing (i.e., no known sanctions) with the Requester, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved User may use the dataset(s) only in accordance with the parameters described on the dbGaP website for the appropriate research use, as well as any limitations on such use, of the dataset(s) and as described in the DAR and as required by law. The Approved User agrees to submit either a Project Renewal or Project Close-out request prior to the expiration date of the one-year data access period. The Approved User also agrees to submit an annual progress update or a final progress report prior to the one-year anniversary of the DAR, as described under Article 9 (Research Use Reporting) below. Failure to submit a Project Renewal or to complete the Project Close-out process, including confirmation of data destruction by the Requester through its Institutional Signing Official, may result in termination of all current data access and/or suspension of the Approved User and all associated personnel and Requester Collaborators from submitting new DARs for a period to be determined by NIH. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. An Approved User who has access to personal identifying information for research participants in the original study at the Requester or through their Requester Collaborators may be required to have IRB approval. By approving and submitting the attached DAR, the Requester through its Institutional Signing Official provides assurance that relevant institutional policies and national, tribal, and state laws and regulations, as applicable, have been followed, including IRB approval if required. The Institutio...
Requester and Approved User Responsibilities. The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the same institution as the PI must submit their own DAR.
Requester and Approved User Responsibilities. The Requester (e.g., Lead Investigator) agrees through the submission of the WIHS Concept Sheet that the Investigators named in the WIHS Concept Sheet have reviewed and understand the principles for responsible research use and data handling of the genomic datasets as defined in WIHS Genomics Data Use Contract, the WIHS Genomics Data Code of Conduct, and the WIHS Data Security Best Practices Requirements. The Requester (e.g., Lead Investigator) and Approved Users (e.g., co-Investigators, trainees, Contractors) further acknowledge that they are responsible for ensuring that all uses of the data are consistent with federal, state, and local laws and regulations and any relevant institutional policies. The Requester certifies that all investigators are in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and all Approved Users may use the dataset(s) only in accordance with the parameters described in the approved WIHS Concept Sheet for the appropriate research use, as well as any limitations on such the use, of the dataset(s) and as described in the approved WIHS Concept Sheet and as required by law. Through submission of the WIHS Concept Sheet, the Lead Investigator agrees to submit either a project renewal or close-out request prior to the expiration date of the 1-year data access period. The Lead Investigator also agrees to submit an annual progress update or a final progress report at the 1-year anniversary of the approved WIHS Concept Sheet, as described under Research Use Reporting below. Failure to submit a renewal or complete the close-out process, including confirmation of data destruction by the WIHS PI/Contact, may result in termination of all current data access and/or suspension of the Lead Investigator and all associated key personnel and collaborators from submitting new WIHS Concept Sheets for a period to be determined by NIH. Repeated violations or unresponsiveness to WIHS and/or NIH requests may result in further measures affecting the Requester. Approved Users who may have access to personal identifying information for research participants in the original study at their institution or through their collaborators may be required to have IRB approval. By approving and submitting the attached WIHS Concept Sheet, the WIHS PI/Contact provides assurance that relev...
Requester and Approved User Responsibilities statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the Approved User’s facility or at the contractor’s facility. In addition, the Approved User is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific Collaborators, including contractors, who are not at the Requester must submit their own DAR.
AutoNDA by SimpleDocs
Requester and Approved User Responsibilities. The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the MICRO/M RNA NETWORK data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and all 2 The National Institute for Standards and Technology defines cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. For more information see: xxxx://xxxx.xxxx.xxx/publications/nistpubs/800- 145/SP800-145.pdf 3 The National Institute for Standards and Technology defines a cloud service provider as a company that offers some component of cloud computing to other businesses or individual, typically Infrastructure as a Service (IaaS), Software as a Service (SaaS) or Platform as a Service (PaaS), as defined by the National Institute of Standards and Technology. For more information see: xxxx://xxxx.xxxx.xxx/publications/nistpubs/800-145/SP800-145.pdf Approved Users may use the dataset(s) only in accordance with the parameters described on the dbGaP website for the appropriate research use, as well as any limitations on such use, of the MICRO/M RNA NETWORK dataset and as described in the DAR and as required by law. Through submission of the DAR, the PI agrees to submit either a project renewal or close-out request prior to the expiration date of the 1-year data access period. The PI also agrees to submit an annual progress update or a final progress report prior to the 1-year anniversary of the DAR, as described under Research Use Reporting below. Failure to submit a renewal or to complete the close-out process, inc...
Requester and Approved User Responsibilities. The Requester agrees that the Approved User has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved User further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant Requester policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the Approved User is in good standing (i.e., no known sanctions) with the include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific Collaborators, including contractors, who are not at the Requester must submit their own DAR.

Related to Requester and Approved User Responsibilities

  • Employer Responsibilities Recognizing the inherent risk(s) in a correctional setting, the Employer is obligated to provide a safe workplace and to educate employees on proper safety procedures and use of protective and safety equipment. The Employer is committed to responding to legitimate safety concerns raised by the Union and employees. The Employer will comply with federal and state safety standards, including requirements relating to first aid training, first aid equipment and the use of protective devices and equipment.

  • Customer’s Responsibilities 9.1 If and to the extent applicable or under the control of the Customer, Customer shall provide complete and accurate information regarding requirements for the Project and the Site(s), including, without limitation, constraints, space requirements, underground or hidden facilities and structures, and all applicable drawings and specifications.

  • Client’s Responsibilities In addition to other responsibilities herein or imposed by law, the Client shall:

  • Customer Responsibilities Customer shall:

Time is Money Join Law Insider Premium to draft better contracts faster.