Common use of Security Protocols Clause in Contracts

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store Student Data and Teacher Data pursuant to the Underlying Agreement and in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the Underlying Agreement, except as necessary to fulfill the purpose of the Underlying Agreement. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 28 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

AutoNDA by SimpleDocs

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store maintain all Student Data and Teacher Data obtained or generated pursuant to the Underlying Agreement and in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the Underlying Agreement, Agreement except as necessary to provide the Service, to fulfill data requests by LEA or as otherwise set forth in the purpose of the Underlying Agreement. The foregoing does not limit the ability of the Provider to disclose information as permitted under Section 2.5 or to allow any necessary service providers Service Providers to view or access data as set forth in Article IV, section 4Section 4.4.

Appears in 26 contracts

Samples: dpitfilestore.s3.amazonaws.com, sdpc.a4l.org, static.classdojo.com

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store maintain all Student Data and Teacher Data obtained or generated pursuant to the Underlying Agreement and DPA in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the Underlying AgreementDPA, except as necessary to fulfill the purpose of the Underlying Agreementdata requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 14 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store maintain all Student Data and Teacher Data obtained or generated pursuant to the Underlying Agreement and in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data data obtained pursuant to the Underlying Agreement, Agreement except as necessary to provide the Service, to fulfill data requests by LEA or as otherwise set forth in the purpose of the Underlying Agreement. The foregoing does not limit the ability of the Provider to disclose information as permitted under Section 2.5 or to allow any necessary service providers Service Providers to view or access data as set forth in Article IV, section 4Section 4.4.

Appears in 13 contracts

Samples: www.randolphcsd.org, sdpc.a4l.org, code.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data Teacher or Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store maintain all Teacher Data and Student Data and Teacher Data obtained or generated pursuant to the Underlying Agreement and DPA in a secure computer environment and not copy, reproduce, or transmit Student Teacher Data and Teacher Student Data obtained pursuant to the Underlying AgreementDPA, except as necessary to fulfill the purpose of data requests by LEA or as set forth in the Underlying Agreementagreement. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section Section 4.

Appears in 2 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet aligned with industry best standard practices in the transfer or transmission of any Student Data or Teacher Datadata, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store maintain all Student Data and Teacher Data obtained or generated pursuant to the Underlying Service Agreement and in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the Underlying Service Agreement, except as necessary to fulfill the provisioning of the Services or the purpose of Student Data requests by LEA or as otherwise permitted by the Underlying Service Agreement. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 2 contracts

Samples: Student Data Privacy Agreement, sdpc.a4l.org

AutoNDA by SimpleDocs

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data or Teacher Data, including but not limited to ensuring that data may only Teacher or Student Data is not permitted to be viewed or accessed by parties legally allowed to do sorestricted from doing so under applicable law. Provider shall process, collect, transmit or store maintain all Teacher Data and Student Data and Teacher Data pursuant to obtained via the Underlying Agreement and Services in a secure computer environment and not copy, reproduce, or transmit Teacher Data and Student Data and Teacher Data obtained pursuant to via the Underlying AgreementServices, except as necessary to fulfill provide the purpose of Services including by fulfilling data transfer requests by the Underlying AgreementLEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth required in Article IV, section 4order to perform services on behalf of the Provider.

Appears in 2 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store maintain all Student Data and Teacher Data obtained or generated pursuant to the Underlying Agreement and DPA in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the Underlying AgreementDPA, except as necessary to fulfill the purpose of the Underlying Agreementdata requests by XXX. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best standard practices in the transfer or transmission of any Student Data or Teacher Data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall process, collect, transmit or store maintain all Student Data and Teacher Data obtained or generated pursuant to the Underlying Agreement and DPA in a secure computer environment and not copy, reproduce, or transmit Student Data and Teacher Data obtained pursuant to the Underlying AgreementDPA, except as necessary to fulfill the purpose of the Underlying Agreementdata requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.