Common use of Security Protocols Clause in Contracts

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.4.

Appears in 13 contracts

Samples: Student Data Privacy Agreement, sdpc.a4l.org, code.org

AutoNDA by SimpleDocs

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.44. 4.

Appears in 11 contracts

Samples: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the Agreement except as necessary to provide the Service, to fulfill the purpose of data requests by LEA XXX or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to disclose information as permitted under Section 2.5 or to allow any necessary Service Providers to view or access data as set forth in Section 4.4.

Appears in 7 contracts

Samples: sdpc.a4l.org, resources.finalsite.net, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by LEA XXX or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.44. 4.

Appears in 5 contracts

Samples: Student Data Privacy Agreement, sdpc.a4l.org, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by LEA XXX or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.4.

Appears in 4 contracts

Samples: sdpc.a4l.org, code.org, cdn5-ss18.sharpschool.com

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers Subprocessors to view or access data as set forth in Section 4.4Article IV, section 4.

Appears in 3 contracts

Samples: Massachusetts Student Data Privacy Agreement, sdpc.a4l.org, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best standard practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement DPA in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement DPA, except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the AgreementLEA. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers service providers to view or access data as set forth in Section 4.4Article IV, section 4.

Appears in 2 contracts

Samples: Rhode Island Student Data, sdpc.a4l.org

Security Protocols. Both parties agree to maintain security protocols that meet industry best commercially reasonable practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.44. 4.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure computer digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement Service Agreement, except as necessary to fulfill the purpose of data Student Data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.4XXX.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure computer digital environment and not copy, reproduce, or transmit data obtained pursuant to the Agreement Service Agreement, except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers Subprocessors to view or access data as set forth in Article IV, Section 4.44.

Appears in 1 contract

Samples: Privacy Agreement

AutoNDA by SimpleDocs

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement DPA in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement DPA, except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the AgreementLEA. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers service providers to view or access data Student Data as set forth in Section 4.4Article IV, section 4.

Appears in 1 contract

Samples: Rhode Island Student Data

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement Service Agreement, except as necessary to fulfill the purpose purposes of the operation of the Service or to respond to data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.4LEA.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.4.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement DPA in a secure computer environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement DPA, except as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the AgreementXXX. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers service providers to view or access data Student Data as set forth in Section 4.4Article IV, section 4.

Appears in 1 contract

Samples: Rhode Island Student Data

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Data, including ensuring that Student Data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all Student Data obtained or generated pursuant to the Service Agreement in a secure computer digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement Service Agreement, except as permitted hereunder and as necessary to fulfill the purpose of data requests by LEA or as otherwise set forth in the Agreement. The foregoing does not limit the ability of the Provider to allow any necessary Service Providers to view or access data as set forth in Section 4.4LEA.

Appears in 1 contract

Samples: Privacy Agreement

Security Protocols. Both parties agree to maintain security protocols that meet industry best practices standards in the transfer or transmission of any Student Datadata, including ensuring that Student Data may only mayonly be viewed or accessed by parties legally allowed to do so. Provider shall maintain all Student Data obtained or generated pursuant to the Agreement DPA in a secure computer environment and not andnot copy, reproduce, or transmit data Student Data obtained pursuant to the Agreement DPA, except as necessary to provide the Services and fulfill the purpose of data Student Data requests by LEA or as otherwise set forth in the Agreement. LEA.. The foregoing does not limit the ability of the ofthe Provider to allow any necessary Service Providers service providers to view or access data as set forth in Section 4.4Article IV, section 4.

Appears in 1 contract

Samples: sdpc.a4l.org

Time is Money Join Law Insider Premium to draft better contracts faster.