Client Data Tracking Clause Samples

Client Data Tracking. GRANTEE shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, description of service provided and progression of client self sufficiency. Such information shall be tracked monthly and made available to GRANTEE monitors or their designees for review upon request.
Client Data Tracking. The Recipient will enter information on all client services and demographic information for all participant households in the City of Portland in the on-line database system Community Services (AKA ServicePoint), due at the same time as the quarterly reports. PHB will provide, free of charge, access, training and support for use of Community Services. Payment for invoices may be withheld until this information is entered into Community Services if it is not available by the time Quarterly and Final Project Reports are due. Recipient will submit the following program reports: - Quarterly and Year-End report form (Exhibit G) - [If applicable: Community Services: PHB – Participant Demographics Report] Exhibit C Terms and Conditions
Client Data Tracking. GRANTEE shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, household composition, including number of children under age 18, description of service provided and progression of client self-sufficiency. Such information shall be tracked monthly and made available to GRANTEE monitors or their designees for review upon request.
Client Data Tracking. The Subrecipient will enter information on all client services, including those delivered by the subcontractor agency, The Commons Law Center, and demographic information for all participant households in the City of Portland in the on- line database system ServicePoint, due at the same time as the quarterly reports. PHB will provide, free of charge, access, training and support for use of ServicePoint. Payment for invoices may be withheld until this information is entered into Service Point if it is not available by the time Quarterly and Final Project Reports are due. Subrecipient will submit the following program reports: 1. Quarterly and Year-End report form (Exhibit G) 2. Service Point: PHB – Participant Demographics Report

Related to Client Data Tracking

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Data Encryption 2.1. For all COUNTY data, The CONTRACTOR shall encrypt all non-public data in transit regardless of the transit mechanism. 2.2. For all COUNTY data, if the CONTRACTOR stores sensitive personally identifiable or otherwise confidential information, this data shall be encrypted at rest. Examples are social security number, date of birth, driver’s license number, financial data, federal/state tax information, and hashed passwords. 2.3. For all COUNTY data, the CONTRACTOR’S encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements as outlined at ▇▇▇▇://▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf

  • Access Toll Connecting Trunk Group Architecture 8.2.1 If Reconex chooses to subtend a Verizon access Tandem, Reconex’s NPA/NXX must be assigned by Reconex to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center subtends as identified in the LERG. 8.2.2 Reconex shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from Reconex’s Customers. 8.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office Reconex utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the Tandem Verizon utilizes to provide Exchange Access in such LATA. 8.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow Reconex’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access tandem.

  • Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality , reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Supplier shall follow its archiving procedures for Customer Data as described in the relevant Service Level Agreement or the Supplier’s Hosting Policy (as applicable). The Supplier may, without obligation to the Customer, make such additional backup or archiving arrangements as it sees fit. 5.3 In the event of any loss or damage to Customer Data during the Licence Term, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in the relevant Service Level Agreement or the Supplier’s Hosting Policy (as applicable). 5.4 The Supplier shall not be required to maintain, back-up, protect or retrieve any Customer Data after the expiry of the Licence Term. 5.5 If the Customer utilises the customer service icon provided within the Software, the Customer acknowledges that any Customer Data uploaded via such service will be subject to the relevant third-party supplier’s security policy. The Supplier currently utilises the Fresh Desk application. For a copy of the Fresh Desk Security Policy see ▇▇▇▇://▇▇▇▇▇▇▇▇▇.▇▇▇/security. The Supplier accepts no liability for any Customer Data transferred through the customer service icon provided within the Software. 5.6 The Supplier shall not be responsible for any loss suffered by the Customer as a result of or arising from the destruction, alteration, or disclosure of any Customer Data caused by any third party (including any third-party providing customer service functionality in connection with the Software), except and to the extent that the Supplier is entitled to recover and has so recovered an amount (net of the costs of recovery) equal to such loss from the relevant third party. 5.7 If the Supplier processes any personal data on the Customer's behalf when performing its obligations under these Terms and Conditions of Use, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer undertakes to comply with all the requirements of the Data Protection ▇▇▇ ▇▇▇▇ in connection with any personal data processed by the Supplier on the Customer's behalf when performing its obligations under these Terms and Conditions of Use; (b) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully process the personal data in accordance with these Terms and Conditions of Use on the Customer's behalf; (c) the Customer acknowledges and agrees that the personal data may be transferred or stored outside the EEA or the country where the Customer and the Authorised Users are located in order to carry out the Services and the Supplier's other obligations under these Terms and Conditions of Use; (d) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing and transfer as required by all applicable data protection legislation; (e) the Supplier shall process the personal data only in accordance with these Terms and Conditions of Use and any lawful instructions reasonably given by the Customer from time to time; (f) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage; and (g) the Customer shall make and maintain all necessary registration applications within all appropriate categories under the DPA as are required in relation to any personal data processed by the Supplier on the Customer's behalf when performing its obligations under these Terms and Conditions of Use. 5.8 The Customer shall indemnify and keep indemnified the Supplier against all actions, proceedings , costs, claims, demands , liabilities , losses and expenses whatsoever arising out of or in connection with the Supplier 's processing of personal data on the Customer's behalf when performing its obligations under these Terms and Conditions of Use, save to the extent that the same is caused by or arises from the Supplier’s (or its directors, employees or sub-contractors’) negligence or breach of its obligations under these Terms and Conditions of Use.