Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed
Appears in 7 contracts
Sources: Student Data Privacy Addendum, Student Data Privacy Addendum, Student Data Privacy Addendum
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of Student Data requests by ▇▇▇.
Appears in 2 contracts
Sources: Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data or Teacher Data, including ensuring that Teacher or Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Teacher Data and Student Data obtained or
Appears in 2 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry best aligned withindustry standard practices in the transfer or transmission of any Student Datadata, including ensuring that Student Data data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the provisioning of the Services or the purpose of Student Data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry best commercially reasonable practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowedallowed to do so. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4. 4.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Datadata, including ensuring that Student Data data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Datadata, including ensuring that Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by ▇▇▇.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data, including ensuring that Student Data data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties Parties agree to maintain security protocols that meet applicable industry best practices standards in the transfer or transmission of any Student Data, including ensuring that adopting measures designed to enable Student Data may only to be viewed or accessed only by parties individuals or entities legally allowedallowed to do so. The foregoing does not limit the ability of Provider to allow any necessary Subprocessors to view or access data as set forth in this DPA. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computing environment.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Contractor shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Service Agreement, except as permitted hereunder and as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Sources: Data Privacy & Security
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Datadata, including ensuring that Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Agreement except as necessary to provide the Service, to fulfill data requests
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowedStudent
Appears in 1 contract
Sources: Student Data Privacy Addendum
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure computer environment and not copy, reproduce, or transmit Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purposes of the operation of the Service or to respond to data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data data may only be viewed or accessed by parties legally allowedallowed to do so. The foregoing does not limit the ability of PROVIDER to allow Subprocessors to view or access data as set forth in Article IV.2. and Article
Appears in 1 contract
Sources: Data Processing Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data, including ensuring that Student Data data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of Student Data requests by ▇▇▇.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Datadata, including ensuring that Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as permitted by this Agreement and/or necessary to provide, maintain, or improve the Service or fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Datadata, including ensuring that data Student Data may only be viewed or accessed by parties legally allowedallowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as permitted by this Agreement and/or necessary to provide, maintain, or improve the Service or fulfill the purpose of data requests by LEA.
Appears in 1 contract