Security Protocols Sample Clauses

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
AutoNDA by SimpleDocs
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store Student Data and Teacher Data pursuant to the Underlying Agreement and in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the Underlying Agreement, except as necessary to fulfill the purpose of the Underlying Agreement. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.4.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The Provider will provide prior notice to the LEA of any planned system change that may impact the security of Student Data. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Contractor shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by District or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Contractor to allow any necessary Service Providers to view or access data as set forth in the DPA.
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the collection, storage or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so.Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment.
AutoNDA by SimpleDocs
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as permitted by this Agreement and/or necessary to provide, maintain, or improve the Service or fulfill the purpose of data requests by LEA.
Security Protocols. Both parties agree to maintain security protocols in the transfer or transmission of any data designed so that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by School Unit. The foregoing does not limit the ability of the Provider to allow any subprocessors to view or access data in accordance with Article II, Section 6.
Security Protocols. Contractor personnel will comply with all the Judicial Council and Court-required security protocols in the performance of Work. Such protocols shall include the then-current Judicial Council Tool Control Policy. The version of the Judicial Council Tool Control Policy in effect as of the Effective Date is attached as Exhibit N.
Time is Money Join Law Insider Premium to draft better contracts faster.