DATA AND MONITORING Sample Clauses

DATA AND MONITORING. 8.1 The Parties shall comply with and shall use reasonable endeavours where reasonably requested to assist each other with complying with any and all obligations under the General Data Protection Regulation (“GDPR”), the DPA and or the FOIA including but not limited to the provision of information to enable a Party to respond to lawful requests and to ensure that any data processed to enable the furtherance of this Agreement is done so lawfully.
AutoNDA by SimpleDocs
DATA AND MONITORING. ‌‌‌ The collection, analysis and comparison of good quality data is critical for the all NHS screening programmes in England. PHE Screening aims to develop a consistent approach to data collection and reporting across all screening programmes and is committed to making sure that stakeholders have access to: • reliable and timely information about the quality of the screening programme • data at local, regional and national levelquality measures across the screening pathway without gaps or duplications Performance thresholds are selected to align with existing screening standards and service objectives; 1 or 2 thresholds are specified. The acceptable threshold is the lowest level of performance which screening services are expected to attain to assure patient safety and service effectiveness. All screening services should exceed the acceptable threshold and agree service improvement plans to meet the achievable threshold. Screening services not meeting the acceptable threshold are expected to put in place recovery plans to deliver rapid and sustained improvement. The achievable threshold represents the level at which the screening service is likely to be running optimally. All screening services should aspire to attain and maintain performance at or above this level.
DATA AND MONITORING. 7.1 XXXXX uk has the right to collect, monitor, use and disclose any data arising out of Client’s use of the Services for all of the following purposes:
DATA AND MONITORING. The Parties shall comply with and shall use reasonable endeavours where reasonably requested to assist each other with complying with any and all obligations under the General Data Protection Regulation (“GDPR”), the DPA and or the FOIA including but not limited to the provision of information to enable a Party to respond to lawful requests and to ensure that any data processed to enable the furtherance of this Agreement is done so lawfully. The Parties shall process personal data of Staff Members for personnel administration and management purposes and to comply with their obligations regarding the keeping of personnel records. The Parties shall be data controllers responsible for all the data they collect. The Parties shall each inform Staff Members about the processing they undertake in accordance with their responsibilities under chapter 3 of the GDPR The Parties shall have regard to each other’s’ information security and governance needs and take appropriate measures (including any which are requested by the Party disclosing personal data) to keep the information secure and prevent unauthorised access to or other processing of the personal data. Where a Party receiving personal data becomes aware of any loss, unauthorised disclosure or other unlawful processing of personal data shared under this Agreement it will immediately notify the Party which has disclosed the personal data of this breach and will allow the disclosing Party to inspect its arrangements for ensuring the security of data shared under this Agreement.

Related to DATA AND MONITORING

  • Reporting and Monitoring Please provide a brief description of the mechanisms proposed for this project for reporting to the UNDP and partners, including a reporting schedule.

  • EVALUATION AND MONITORING The ORGANIZATION agrees to maintain books, records and other documents and evidence, and to use accounting procedures and practices that sufficiently and properly support the complete performance of and the full compliance with this Agreement. The ORGANIZATION will retain these supporting books, records, documents and other materials for at least three (3) calendar years following the year in which the Agreement expires. The COUNTY and/or the State Auditor and any of their representatives shall have full and complete access to these books, records and other documents and evidence retained by the ORGANIZATION respecting all matters covered in and under this Agreement, and shall have the right to examine such during normal business hours as often as the COUNTY and/or the State Auditor may deem necessary. Such representatives shall be permitted to audit, examine and make excerpts or transcripts from such records, and to make audits of all contracts, invoices, materials, and records of matters covered by this Agreement. These access and examination rights shall last for three calendar years following the year in which the Agreement expires. The COUNTY intends without guarantee for its agents to use reasonable security procedures and protections to assure that related records and documents provided by the ORGANIZATION are not erroneously disclosed to third parties. The COUNTY will, however, disclose or make this material available to those authorized by/in the above paragraph or permitted under the provisions of Chapter 42.56 RCW without notice to the ORGANIZATION. The ORGANIZATION shall cooperate with and freely participate in any other monitoring or evaluation activities pertinent to this Agreement that the COUNTY finds needing to be conducted.

  • Control and Monitoring Each Party shall provide or arrange for 24-hour control and monitoring of their portion of the Interconnection Facilities.

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

  • Evaluation, Testing, and Monitoring 1. The System Agency may review, test, evaluate and monitor Grantee’s Products and services, as well as associated documentation and technical support for compliance with the Accessibility Standards. Review, testing, evaluation and monitoring may be conducted before and after the award of a contract. Testing and monitoring may include user acceptance testing. Neither the review, testing (including acceptance testing), evaluation or monitoring of any Product or service, nor the absence of review, testing, evaluation or monitoring, will result in a waiver of the State’s right to contest the Grantee’s assertion of compliance with the Accessibility Standards.

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Service Monitoring Customer gives express consent for Vodafone to monitor Customer’s use of the Service (and disclose and otherwise use the information obtained) only to: (a) the extent allowed by Applicable Law; (b) comply with Applicable Law; (c) protect the Network from misuse; (d) protect the integrity of the public internet and/or Vodafone’s systems and Networks; (e) the extent necessary to determine if Customer has breached any conditions or restrictions on use of the Service; (f) provide the Service; and/or (g) take other actions agreed or requested by Customer.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.