Common use of Security Protocols Clause in Contracts

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 635 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Massachusetts Student Data Privacy Agreement

AutoNDA by SimpleDocs

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. .. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 66 contracts

Samples: Rhode Island Student Data, Rhode Island Student Data Privacy Agreement, Rhode Island Student Data

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEAXXX. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 35 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer digital environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to to: (i) fulfill the purpose of data requests by LEA; (ii) perform the Service(s), or (iii) fulfill the obligations or exercise any rights contained in this DPA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 19 contracts

Samples: Rhode Island Student Data, Massachusetts Student Data Privacy Agreement, Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring taking steps, including the requirements of this DPA, so that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers subprocessors to view or access data as set forth in accordance with Article IVII, section 4Section 6.

Appears in 14 contracts

Samples: Massachusetts Student Data Privacy Agreement, Massachusetts Student Data Privacy Agreement, Massachusetts Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. XXX.. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 7 contracts

Samples: Rhode Island Student Data Privacy Agreement, Rhode Island Student Data Privacy Agreement, Rhode Island Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that are reasonably designed to meet industry best s t a n d a r d practices in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to provide the services and fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 6 contracts

Samples: Massachusetts Student Data Privacy Agreement, Massachusetts Student Data Privacy Agreement, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring taking steps so that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 5 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that are reasonably designed to meet industry best s t a n d a r d practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 5 contracts

Samples: Massachusetts Student Data Privacy Agreement, Massachusetts Student Data Privacy Agreement, Massachusetts Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet standard industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 4 contracts

Samples: Rhode Island Student Data Privacy Agreement, Rhode Island Student, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 3 contracts

Samples: Massachusetts Student Data Privacy Agreement, Massachusetts Student Data Privacy Agreement, sdpc.a4l.org

Security Protocols. Both parties agree Each party agrees to maintain security protocols that meet industry best practices in regarding the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEAClient. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth provided in Article IV, section 4this Agreement.

Appears in 3 contracts

Samples: Client Services Agreement, Client Services Agreement, www.scoir.com

Security Protocols. Both parties agree to maintain security protocols that meet industry best standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer digital environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to to: (i) fulfill the purpose of data requests by LEAXXX; (ii) perform the Service(s), or (iii) fulfill the obligations or exercise any rights contained in this DPA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 3 contracts

Samples: sdpc.a4l.org, sdpc.a4l.org, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 2 contracts

Samples: Massachusetts Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet good industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Student Data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 2 contracts

Samples: Rhode Island, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA or Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEALEA or to provide the Services under the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 2 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the this DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the this DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 2 contracts

Samples: Privacy Agreement, Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEALEA or to provide the Services. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 2 contracts

Samples: Rhode Island Student Data, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEALEA or as otherwise set forth in this DPA. The foregoing does not limit the ability of the Provider to allow any necessary service providers Subprocessors to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Student Data and Personally Identifiable Data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit such data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers or Subprocessors to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEAXXX. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain reasonable security protocols that meet adhere to industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA Service Agreement in a secure computer digital environment and not copy, reproduce, or transmit data obtained pursuant to the DPAService Agreement, except as necessary to to: (i) fulfill the purpose of data requests by LEA. The foregoing does not limit XXX, (ii) perform the ability of Service(s), or (iii) fulfill the Provider to allow obligations or exercise any necessary service providers to view or access data as set forth rights contained in Article IV, section 4this DPA.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of services or data requests by LEAXXX. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Privacy Agreement

AutoNDA by SimpleDocs

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEALEA or to provide the services under the Service Agreement. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet are generally consistent with industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEALEA or as required by law. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed with a legal, contractual or necessary need to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to perform the Services or fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices for a university providing similar services in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests purposes as stated by LEAthe Service Agreement. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Massachusetts Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEAXXX. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section Section 4.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry industr y best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the this DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the this DPA, except as necessary to fulfill the purpose of data requests by LEAXXX. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed authorized to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEALEA or to perform the services under the Service Agreement. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Rhode Island Student Data

Security Protocols. Both parties agree to maintain security protocols that meet industry best standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to perform the services or to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree Each party agrees to maintain security protocols that meet industry best practices in regarding the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: 4.files.edl.io

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEALEA including providing the Service. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Student Data and Personally Identifiable Information obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit such data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Massachusetts Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any data, including ensuring that commercially reasonable measures to limit access of data may to only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Student Data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the DPA, except as reasonably necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section Section 4.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of services or data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Privacy Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.