DATA SHARING Shared Technology and System Security Sample Clauses

DATA SHARING Shared Technology and System Security. Whenever possible the Jefferson/Franklin Region appreciates state support for tech sharing. While Missouri has made progress in the sharing of data, true data integration is still a challenge. Each partner operates independent systems that do not have the capability to communicate with each other. Governor ▇▇▇▇▇▇ has encouraged all departments to explore options to share and integrate data through his workforce development initiatives. This has helped spur more discussion and pilot projects around these issues. Through initiatives such as the Workforce Data Quality Initiative Grant (WDQI) and strong support from the governor's office, there is movement forward in this area. Core partners have completed a Memorandum of Agreement (MOA) that now allows data sharing of employer information. Work continues on a data warehouse that will allow opportunities to safely share jobseeker information as well. At the State level core program partners have completed a MOU and will work toward sharing data and information. They continue to collaborate to further the goal of achieving all common primary indicators of performance. Policies exist to provide assurance that participants' Personally Identifiable Information (PII) will be kept confidential. Specific examples include separate confidential files.

Related to DATA SHARING Shared Technology and System Security

  • Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Equipment and Software Any costs incurred by Kodak resulting from Customer (1) changes to the configuration of the Equipment or Software, or (2) postponement of Delivery or installation of the Equipment or Software;

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).