Non-Access definition
Examples of Non-Access in a sentence
If the state educational authority Non-Access PACIAs enter into a separate written agreement with their agent(s) or contractor(s) binding them to the terms of the SWIS Data Sharing Agreement and consistent with the terms of 34 CFR 99.35(a)(3), then the state educational authority Non-Access PACIAs also may designate their agent(s) or contractor(s) as additional authorized representatives.
PII from Education Records disclosed without prior written consent to state educational authority Access PACIAs and/or state educational authority Non-Access PACIAs and their authorized representatives may only be used to evaluate and/or audit programs referenced in Section IX of the SWIS Data Sharing Agreement if those programs constitute “Federally- or state-supported education programs” under FERPA.
This Annex 1, SWIS Data Sharing Agreement/FERPA Written Agreement (this Agreement), pertains to the designation of authorized representatives by these state educational authority Access PACIAs and/or state educational authority Non-Access PACIAs, as described further below.
Each Access and Non-Access ▇▇▇▇▇ is subject to up to one jointly conducted Federal CCR per 12-month period.
This Agreement serves to secure compliance with the written agreement provisions in the FERPA regulations by state educational authority Access PACIAs and state educational authority Non-Access PACIAs and any entities that are both parties to the SWIS Data Sharing Agreement and listed as authorized representatives in Section IV of this Agreement.
Some, but not all, Access PACIAs (state educational authority Access PACIAs) and Non-Access PACIAs (state educational authority Non-Access PACIAs) also constitute “state educational authorities” under FERPA, as defined in Section V.X. of the SWIS Data Sharing Agreement, that exercise authority over the Federally and state- supported “Education Programs,” as defined in Section V.I. of the SWIS Data Sharing Agreement.
Ensuring that prior to any transfer of data from an Access SUIA to a Non-Access SUIA, encryption is applied with a strong password that, at minimum, meets the standards established by the National Institute of Standards and Technology (NIST).
Such Transit Traffic shall be at the same rates that existed prior to this Amendment, and any adjustment to reciprocal compensation rate element(s) that are assessed by a Party for terminating Non-Access Telecommunications Traffic pursuant to the Order shall not apply for purposes of calculating the rate(s) to be charged by CenturyLink for providing a Transit Service.
Such transit traffic shall be at the same rates that existed prior to this Amendment, and any adjustment to reciprocal compensation rate element(s) that are assessed by a Party for terminating Non-Access Telecommunications Traffic pursuant to the Order shall not apply for purposes of calculating the rate(s) to be charged by CenturyLink for providing a transit service.
KASME is used in subsequent procedures for deriving further keys for the protection of the user plane, Radio Resource Control signalling, and Non-Access Stra- tum signaling [29].