Data retention, storage and exploitation Sample Clauses

Data retention, storage and exploitation. Researchers are ultimately responsible for ensuring appropriate security for confidential material. In order to protect the participants’ privacy and anonymity, participants’ data will be kept confidential, stored in anonymised form and be made inaccessible to third parties. All necessary precautions will be taken to protect the user’s data from misuse. All questionnaires and assessment tools used in the field tests will use ID codes (rather than participant names) and will be stored in a dedicated locked room/secure file (specially, in field test cases). PRECIOUS will provide a solution where data is collected in personal devices e.g. mobile phone and then transferred and stored in another user device at home e.g. home server. The data stored in the home device previous user consent can be uploaded to the server located in data centres (i.e. cloud) to be processed when additional computing power is required e.g. food analysis. Usage time of data is not still fully stipulated at this stage of the project and will be specified in next ethical reports. For certain applications, it might be useful to store user- related data like medical data or images from different sources over a longer period of time for the purpose of later evaluation, which we refer to as Big Data. Concerning Big Data in the overall security concept, privacy and security is ensured by the following concept:  User-related Big Data is split into categories, e.g. location data is never stored together with related health data in order to make it impossible to find the identity of a user by analysing one category (like position data) and correlate it with another category (e.g. health related data).  Big Data resides in a low (or even the lowest) security level because Big Data storage is assumed insecure in our security concept.  The real identity of the user is hidden by removing any reference to the user from the data set and tagging the data set. The relation tag  user only is stored in a higher security layer than where the Big Data is located.  3rd party cloud providers should not be used.

Related to Data retention, storage and exploitation

  • DELIVERY, STORAGE, AND HANDLING The Contractor shall be responsible to inspect all components on delivery to ensure that no damage occurred during shipping or handling for furnish and installation projects. For equipment only purchases, the ordering entity shall be responsible to inspect all components on delivery. Materials must be stored in original undamaged packaging in such a manner to ensure proper ventilation and drainage, and to protect against damage, weather, vandalism, and theft until ready for installation.

  • Meteorological Data Reporting Requirement (Applicable to wind generation facilities only)

  • Data Retention 11.1 The Parties agree to erase Personal Data from any computers, storage devices and storage media that are to be retained as soon as practicable after it has ceased to be necessary for them to retain such Personal Data under applicable Data Protection Legislation and their privacy policy (save to the extent (and for the limited period) that such information needs to be retained by the a Party for statutory compliance purposes or as otherwise required by the contract), and taking all further actions as may be necessary to ensure its compliance with Data Protection Legislation and its privacy policy.

  • Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.