Surveillance System data Sample Clauses

Surveillance System data. Every individual authorized to access Ohio Cancer Incidence Surveillance System (OCISS) data holds a position of trust relative to this information and must recognize the responsibilities entrusted to him/her in preserving security and confidentiality of this information. OCISS data, including information that could be used to identify an individual and his or her health status, is considered confidential information. Confidentiality requirements that apply to these data include, but are not limited to, Ohio Revised Code Section 3701.17. City or county regulations or ordinances or other laws may place additional restrictions on data use and release. The inappropriate actions of an authorized user of OCISS data may threaten the security and confidentiality of this information. Persons provided access to OCISS data shall know, understand, and adhere to the following requirements:
AutoNDA by SimpleDocs
Surveillance System data. Every individual authorized to access Ohio Cancer Incidence Surveillance System (OCISS) data holds a position of trust relative to this information and must recognize the responsibilities entrusted to him/her in preserving security and confidentiality of this information. OCISS data, including information that could be used to identify an individual and his or her health status, is considered confidential information.

Related to Surveillance System data

  • Surveillance The COR will receive and document all complaints from Government personnel regarding the services provided. If appropriate, the COR will send the complaints to the Contractor for corrective action.

  • Video Surveillance All video surveillance will be directed by the YSU police department.

  • Electronic Surveillance The primary purpose of electronic surveillance is to ensure the health, welfare and safety of all educators, students and visitors to District property and to safeguard District facilities and equipment. As such, the District and the Association agree:

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Procurement Planning Prior to the issuance of any invitations to bid for contracts, the proposed procurement plan for the Project shall be furnished to the Association for its review and approval, in accordance with the provisions of paragraph 1 of Appendix 1 to the Guidelines. Procurement of all goods and works shall be undertaken in accordance with such procurement plan as shall have been approved by the Association, and with the provisions of said paragraph 1.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Data Analysis In the meeting, the analysis that has led the College President to conclude that a reduction- in-force in the FSA at that College may be necessary will be shared. The analysis will include but is not limited to the following: ● Relationship of the FSA to the mission, vision, values, and strategic plan of the College and district ● External requirement for the services provided by the FSA such as accreditation or intergovernmental agreements ● Annual instructional load (as applicable) ● Percentage of annual instructional load taught by Residential Faculty (as applicable) ● Fall Full-Time Student Equivalent (FFTE) inclusive of dual enrollment ● Number of Residential Faculty teaching/working in the FSA ● Number of Residential Faculty whose primary FSA is the FSA being analyzed ● Revenue trends over five years for the FSA including but not limited to tuition and fees ● Expenditure trends over five years for the FSA including but not limited to personnel and capital ● Account balances for any fees accounts within the FSA ● Cost/benefit analysis of reducing all non-Residential Faculty plus one Residential Faculty within the FSA ● An explanation of the problem that reducing the number of faculty in the FSA would solve ● The list of potential Residential Faculty that are at risk of layoff as determined by the Vice Chancellor of Human Resources ● Other relevant information, as requested

  • Statistical Analysis 31 F-tests and t-tests will be used to analyze OV and Quality Acceptance data. The F-test is a 32 comparison of variances to determine if the OV and Quality Acceptance population variances 33 are equal. The t-test is a comparison of means to determine if the OV and Quality Acceptance 34 population means are equal. In addition to these two types of analyses, independent verification 35 and observation verification will also be used to validate the Quality Acceptance test results.

  • Reporting Frequency During any period of time when you are subject to the requirement in paragraph 1 of this award term and condition, you must report proceedings information through XXX for the most recent five year period, either to report new information about any proceeding(s) that you have not reported previously or affirm that there is no new information to report. Recipients that have Federal contract, grant, and cooperative agreement awards with a cumulative total value greater than $10,000,000 must disclose semiannually any information about the criminal, civil, and administrative proceedings.

  • Internet Connectivity School must provide sufficient hardline internet connectivity and the required network configurations (provided in Exhibit A) for each Pixellot System to allow live broadcasts. PlayOn will provide the point-to-point wireless internet base station (“Point to Point”) when needed to deliver hardline internet connectivity to Pixellot Systems installed in outdoor venues; provided that PlayOn is able to select the make and model of the Point to Point system. In the event that School requests, or requires, a specific Point to Point system that is different from what is provided by PlayOn, then School must provide and install the Point to Point system at its own expense.

Time is Money Join Law Insider Premium to draft better contracts faster.