Data Access definition

Data Access refers to methods and rights granted to RECIPIENT to receive Data. “Data Classification” refers to the sensitivity of Data as defined by the Office of the Chief Information Officer (OCIO) in OCIO Standard 141.10, as may be modified by the OCIO from time to time. Current categories are set forth in Attachment 1, OCIO Data Classification. “Data Encryption” refers to ciphers, algorithms or other encoding mechanisms that will encode Data to protect its confidentiality. Data encryption may be required during data transmission and/or data storage depending on the level of protection required for this Data. “Data Storage” refers to the state Data is in when at rest. “Data Transmission” refers to the methods and technologies to be used to move a copy of the Data between systems, networks, and/or workstations.
Data Access refers to rights granted to Designated Staff to view and use Data for the purposes expressly authorized by this Contract.
Data Access means the ability, right, or permission to access data (including collection, access, storage, and disposition). This includes software, hardware, peripherals, audio, printed and digital materials.

Examples of Data Access in a sentence

  • The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”).

  • A user approved by the relevant Data Access Committee(s) to access one or more datasets for a specified period of time and only for the purposes outlined in the Principal Investigator (PI)’s approved Research Use Statement.

  • The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research.

  • The Information Technology (IT) Director indicated on the Data Access Request, as well as any staff members and trainees under the direct supervision of the PI are also Approved Users and must abide by the terms laid out in the Data Use Certification Agreement.

  • If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy.


More Definitions of Data Access

Data Access means any operation that enables a third party to view personal data without the right to use it thereafter for other purposes; controller' shall mean the natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or European Community regulations, the controller or the specific criteria for his nomination may be designated by national or European Community law;
Data Access. Security Level" means the level of access privileges granted to the Agency's authorized users to retrieve the Department’s electronic data based upon the Agency's stated eligibility for such data, as outlined in Section 27 of this Agreement.
Data Access means collectively all relevant information, project agreements, financing agreements, technical and commercial information pertaining to the Project as compiled on a Virtual Data Room (VDR) and provided by the Lenders’ Representative to the Interested Bidders on an “as is where is” basis.
Data Access refers to the disclosure or transfer of Personal Data under the control or custody of PICPA to PICPA Officer/Employee, and vice-versa.
Data Access means any method that Bazaarvoice provides to you for the purpose of accessing Social Commerce Data (e.g., API or data feeds). Bazaarvoice grants you a non-transferable, non-exclusive, terminable, revocable, limited license to use the Data Access for the purposes of integrating the Social Commerce Data or into any application you develop. The Data Access cannot be used for any purpose except as provided in the above license or as explicitly allowed by Bazaarvoice. Unauthorized use of the Data Access includes, but is not limited to: (i) selling or providing access to third parties; (ii) supplying or using with any ad network, ad exchange, data broker or advertising creative.
Data Access. LIMITED: BLM Nevada shall ensure that access to the data set is limited to BLM staff, contractors, and subcontractors with a legitimate need to access the data consistent with this Agreement’s stated purpose. BLM Nevada is responsible for informing said individuals of the terms of this Agreement. PRODUCTS RESULTING FROM NDNH DATA: Copies of any products (such as new population data, models, theses, peer-reviewed journal articles, etc.) produced from BLM Nevada’s use of the data set must be submitted to NDNH at the conclusion of the project, or else concurrent with NDNH’s distribution of the data set to BLM Nevada. ARCHIVE COPY PERMISSIBLE: BLM Nevada may retain archival copies of expired data sets for the purpose of maintaining a record of information sources used in support of its analyses and decisions. Archival data sets stored by BLM Nevada will be labeled in a manner that clearly identifies the data as out-of-date (expired). Archival data sets will not be used to generate new products, analyses, or decisions, and shall be subject to the terms of this Agreement in perpetuity.
Data Access refers to rights granted to Contractor employees to directly connect to HCA’s systems, networks and /or applications via the State Governmental Network (SGN) combined with required information needed to implement these rights. “Data Transmission” refers to the methods and technologies to be used to move a copy of the data between HCA and Contractor systems, networks and/or employee workstations. “Data Storage” refers to the state data is in when at rest. Data can be stored on off-line devices such as CD’s or on-line on Contractor servers or Contractor employee workstations. “Data Encryption” refers to ciphers, algorithms or other mechanisms that will encode data to protect its confidentiality. Data encryption can be required during data transmission or data storage depending on the level of protection required.