Common use of Security Protocols Clause in Contracts

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 320 contracts

Samples: California Student Data Privacy Agreement, Privacy Agreement, California Student Data Privacy Agreement

AutoNDA by SimpleDocs

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 235 contracts

Samples: History of Agreement, History of Agreement, History of Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 206 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 150 contracts

Samples: Student Data Privacy Agreement, Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 94 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 69 contracts

Samples: California Student Data Privacy Agreement, California Student Data Privacy Agreement, California Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit.

Appears in 61 contracts

Samples: Student Data Privacy Agreement, Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputerenvironment.

Appears in 57 contracts

Samples: History of Agreement, History of Agreement, History of Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer collection, storage or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement DPA in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 53 contracts

Samples: Virginia School, Virginia School, Virginia School

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 52 contracts

Samples: Student Data Privacy Agreement, Privacy Agreement, Utah Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. The Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 34 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. The Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 24 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.to:

Appears in 23 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 22 contracts

Samples: Texas Data Privacy Agreement, Texas Data Privacy Agreement, Texas Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 19 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEACFISD.

Appears in 18 contracts

Samples: Privacy Agreement, Privacy Agreement, Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA. In the event that transmission or storage is necessary, the Contractor agrees to never email data or store data on a non-encrypted device.

Appears in 8 contracts

Samples: Privacy Agreement, Privacy Agreement, Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 7 contracts

Samples: California Student Data Privacy Agreement, Student Data Privacy Agreement, California Student Data Privacy Agreement

Security Protocols. Both The parties agree to shall maintain security protocols that meet industry standards in regarding the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 4 contracts

Samples: Student Data, Student Data, Student Data

Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 4 contracts

Samples: History of Agreement, sdpc.a4l.org, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 3 contracts

Samples: Texas Data Privacy Agreement, Texas Data Privacy Agreement, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 3 contracts

Samples: Privacy Agreement, History of Agreement, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX. In the event that transmission or storage is necessary, the Contractor agrees to never email data or store data on a non-encrypted device.

Appears in 2 contracts

Samples: Privacy Agreement, Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 2 contracts

Samples: Sharing and Privacy Agreement, Sharing and Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any dataData, including ensuring that data Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data Data requests by LEAXXX.

Appears in 2 contracts

Samples: Data Privacy Agreement, Data Privacy Agreement

Security Protocols. Both parties agree Provider agrees to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 2 contracts

Samples: Nebraska Student Data Privacy Agreement, Nebraska Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed authorized to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or to perform the services under the Service Agreement.

Appears in 2 contracts

Samples: Privacy Agreement, Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring designed so that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any subprocessors to view or access data in accordance with Article II, Section 4.

Appears in 2 contracts

Samples: Privacy Agreement, Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best standardpractices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 2 contracts

Samples: Privacy Agreement, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the provisioning of the Services or the purpose of data requests by LEA.

Appears in 1 contract

Samples: California Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring protocols intended to ensure that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Services or fulfill the purpose of data requests by LEAXXX.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both The parties agree to shall maintain security protocols that meet industry standards in regarding the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 1 contract

Samples: Student Data Privacy

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Service to or fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service AgreementAgreement and as set forth hererin, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain a commercially reasonable security protocols that meet program consistent with applicable industry standards in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a reasonably secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the services and fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring protocols intended to ensure that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Services or fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that commercially reasonable measures to limit access of =data may to only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as reasonably necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in for the transfer or and transmission of any data, including ensuring data in a manner designed to provide that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Padlet Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Services and to fulfill the purpose of data requests by LEASchool Unit.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any dataData, including ensuring that data Data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data Data obtained or generated pursuant to in connection with the Service Agreement Services in a secure digital computer environment and shall not copy, reproduce, or transmit data obtained pursuant to the Service AgreementData, except as necessary to fulfill the purpose of data requests by LEA, to perform the Services or as otherwise instructed by LEA or permitted under this DSPA.

Appears in 1 contract

Samples: Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or to provide the services under the Service Agreement.

Appears in 1 contract

Samples: Washington Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in for the transfer or and transmission of any data, including ensuring data in a manner designed to provide that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 1 contract

Samples: Padlet Data Privacy Agreement

Security Protocols. Both parties agree to maintain a commercially reasonable security protocols that meet program consistent with applicable industry standards in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the services and fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: California Student Data

Security Protocols. Both parties We both agree to maintain security protocols that meet industry standards in for the transfer or and transmission of any data, including ensuring data in a manner designed to provide that data may only be viewed or accessed by parties legally allowed to do so. Provider We shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 1 contract

Samples: Software Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit. The foregoing does not limit the ability of the Provider to allow any subprocessors to view or access data in accordance with Article II, Section 6.

Appears in 1 contract

Samples: Student Data Privacy Agreement

AutoNDA by SimpleDocs

Security Protocols. Both parties agree to maintain a commercially reasonable security protocols programs that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed restricting the viewing or accessed by access of datato the parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a reasonably secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the services and fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: California Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA. Notwithstanding the above, data under this section shall not include information that has been anonymized or deidentified.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed authorized to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX or to perform services under the Services Agreement.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEABCSD.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may n1ay only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputerenvironment.

Appears in 1 contract

Samples: History of Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet consistent with industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or otherwise provide the Services.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any dataData, including ensuring that data Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: California Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputerenvironment.

Appears in 1 contract

Samples: History of Agreement

Security Protocols. Both parties Parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that using commercially reasonable measures to limit access of data may to only be viewed or accessed by parties persons legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as reasonably necessary to fulfill the purpose of data requests by LEALEA or the Services Agreement, or as required by law.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Student Data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit or as permitted hereunder or under the Service Agreement.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties Parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may using commercially reasonable measures to limit access to Data to only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of performing the Services or data requests by LEA.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain a commercially reasonable security protocols program that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring data that are designed to ensure that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Services or fulfill the purpose of data requests by LEAXXX.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed authorized to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX or to perform the services under the Service Agreement.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or to provide the services under the Service Agreement.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards industrybest practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed Viewed or accessed by parties legally allowed to do so. Provider ProVider shall maintain all data obtained or generated pursuant to the Service SerVice Agreement in a secure digital environment enVironment and not copy, reproduce, or transmit data obtained pursuant to the Service SerVice Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transfer, transmission and storage of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: noredink-product.s3-us-west-2.amazonaws.com

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may datamay only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALISD.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider The Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAthe District.

Appears in 1 contract

Samples: Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring data that are designed to ensure that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Services or fulfill the purpose of data requests by LEA.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAXXX or to provide the services under the Service Agreement.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring data designed so that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit. The foregoing does not limit the ability of the Provider to allow any subprocessors to view or access data in accordance with Article II, Section 6.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards industry- standardpractices in the transfer or transmission of any data, including ensuring that data may only be onlybe viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or as permitted by the Service Agreement.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.