Data Transfer Method Sample Clauses

The Data Transfer Method clause defines the procedures and protocols by which data is transmitted between parties under an agreement. It typically specifies the formats, technologies, or platforms to be used for data exchange, such as secure file transfer protocols, encrypted email, or dedicated portals. By clearly outlining these methods, the clause ensures that both parties understand and agree on how data will be securely and efficiently shared, thereby reducing the risk of data breaches and misunderstandings regarding data handling.
POPULAR SAMPLE Copied 1 times
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. (1) (f) of the GDPR. St Bart’s and all academies must make sure they have procedures in place to prevent:
Data Transfer Method. The parties to this Agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data.  Accidental compromise or damage during storage, handling, use, processing, transmission or transport;  Deliberate compromise or opportunist attack;  Unauthorised disposal or destruction of the data;  Unauthorised access;  Accidental loss of personal data should be avoided through the implementation of appropriate security procedures. Regular flow (specify frequency) See Appendix A More than 21 items per flow Yes Give full details of how the transfer will be made and what security measures will be in place e.g. encryption, business secure mail or recorded signed for etc. Face to face Named point of contact at BMBC and school Electronically (state method) Perspective Lite Secure File Transfer (Angel Solutions) Secure E Mail Yes – Egress, 7zip, password protected Other Synergy – Servelec (Orchestra) Has a risk assessment been carried out on the chosen methods of transfer? Yes – BMBC Information Security Team What are the identified risks? Email is sent to the wrong email address – training provided to all staffaccess to email can be revoked.
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data.
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. (1) (f) of the GDPR. BMDC and schools must make sure they have procedures in place to prevent: Where BMDC requests information from schools we will ensure we prescribe the manner of the delivery in an appropriate secure method. The data transfer method may change depending on the information to be provided, however BMDC will provide a secure alternative where necessary. BMDC will ensure information is collected and maintained in a secure manner compliant with the DPA/GDPR obligations.
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. (1) (f) of the GDPR. Primary Engineer and the school must make sure they have procedures in place to prevent: Accidental compromise or damage during storage, handling, use, processing, transmission or transport; Deliberate compromise or opportunist attack; Unauthorised disposal or destruction of the data; Unauthorised access; Accidental loss of personal data should be avoided through the implementation of appropriate security procedures. Where Primary Engineer requests information from schools we will ensure we prescribe the manner of the delivery in an appropriate secure method. The data transfer method may change depending on the information to be provided. Primary Engineer will ensure information is collected and maintained in a secure manner compliant with the DPA/GDPR obligations.
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. Regular flow (specify frequency)  The Provider submits details of the children eligible to free early education and care on a termly basis i.e. school term.  The Provider also submits their data for the Annual Early Years Census return by the deadline set in January.  Providers must submit their data in accordance with the deadlines set out in the claim deadlines and payment schedule, the schedule for the financial year 2020/21 can be downloaded here: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇.▇▇/beta/working-with- children/pdf/childcare-providers/free-early-education-care-funding-calendar- 20.pdf  Academies must continue to provide daily/weekly pupil data transfers to the School Data Quality Team via the automated transfer system as per the Data Sharing Agreement with the School Data Quality Team. Give full details of how the transfer will be made and what security measures will be in place. Other (please state method)  Transfer of child data from the Provider to Kirklees Council is via a secure online portal provided by Servelec. Each Provider has a secure login ▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇.▇▇/SynergyWebsite_Live/  Transfer of child data from Academies to Kirklees Council is also via Groupcall Xporter and Anycomms+, authorised officers/staff have a secure login ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇.▇▇/Login.aspx  Transfer of Early Years Pupil Premium eligibility confirmation from Kirklees Council to Academies is via AnyComms+, authorised officers/staff have a secure login ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇.▇▇/Login.aspx  Transfer of eligibility evidence from the Provider to Kirklees Council is via a secure document upload ▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇▇▇▇▇  Transfer from Kirklees Council to the Department for Education is via a secure online portal, authorised officers have a secure login ▇▇▇▇▇://▇▇▇▇▇▇▇▇.▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇.▇▇ Has a risk assessment been carried out on the chosen methods of transfer? Yes What are the identified risks?  Council network violation  Department for Education network violation  Login details accessed by unauthorised officers/staff  Data sent to incorrect recipient Address Kirkgate Buildings, ▇▇▇▇▇ Street, Huddersfield, HD1 1BY Responsible Managers ▇▇▇▇▇▇ ▇▇▇/▇▇▇▇ ▇’▇▇▇▇▇▇ Contact number ▇▇▇▇▇ ▇▇▇▇▇▇ Review Date January 2021
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. Regular flow (specify frequency) Daily Ad hoc N/A Give full details of how the transfer will be made and what security measures will be in place e.g. encryption, business secure mail or recorded signed for etc. Face to face N/A Telephone Contact schools to resolve pupil levels data conflicts. AnyComms N/A Secure E Mail To facilitate additional data validation from the DfE. Secure Mail N/A Secure Courier N/A Encrypted Removable Media N/A Other (please state method) Pupil level data is transferred from the schools Management Information System using encrypted third party file transfer. The transfer of this data is automatic and secure. Has a risk assessment been carried out on the chosen methods of transfer? Risk Factors have been assessed in DPIA number DPO21-47. What are the identified risks? Risks identified in DPIA number DPO21-47.  An employee may gain unauthorised access to the system, accessing personal data inappropriately. Either via password sharing or IT system error.  A user may download the data and use it for an unauthorised purpose.  An outside agency tries to access the data (hacking)  Data not being backed up, data which is lost is not capable of being retrieved  An employee changes sensitive data for their own purposes  Personal Sensitive Data is being shared with multiple parties in a joint project and there is the possibility of it going to the wrong place or ensuring the compliance of data protection of the other parties  Inadequate functionality (risks: not able to locate/delete records)
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. Regular flow (specify frequency) Quarterly in 2017 thereafter monthly in 2018 More than 21 items per flow Yes Give full details of how the transfer will be made and what security measures will be in place e.g. encryption, business secure mail or recorded signed for etc. Encrypted Removable Media Yes Has a risk assessment been carried out on the chosen methods of transfer? Yes What are the identified risks? The table below identifies the risks associated with the extraction of the data and the safeguards to mitigate risks: Identifying patients Patient identifiers are removed or replaced from the extraction. NHS number is pseudonymised Trusted organisation retains the source key of the pseudonym process Information held at BTHFT and the Ark Data is stored in a secure data environment Controls are implemented to ensure secure data access All data processor users are required to sign a confidentiality agreement Data contributors restrict data provided for patients that have registered an objection in line with recommendations from Dame ▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇’▇ report BTHFT and the University of Leeds have a Level 2 (satisfactory) IGT score Re-identifying patients GPs and Consultants will be provided access to the linked datasets providing direct care to patients only where the patient has specifically consented. Including patients that have opted out of the programme The extraction ignores patient records that have opted out of the programme where any of the opt out read codes in section 4 have been recorded. Transfer of data from data sources to the Trusted organisation / Data Processor The Trusted organisation and data contributors apply technical and physical controls on the transfer of data between data sources and the trusted organisation/data processor to minimise the risk of unlawful access, data loss and hacking. The public are unaware of the Connected Yorkshire programmes, the data that is collected, how it is used and the personal and public benefit A communications campaign is implemented to ensure that the public are informed and aware of the Connected Yorkshire programme. Patient information materials are made available which include details of where to find out more about the programme including data sharing and how to object if they do not wish ...
Data Transfer Method. All parties to this agreement are responsible for ensuring that appropriate security and confidentiality procedures are in place to protect the transfer, storage and use of the shared, person identifiable data. Less than 21 items per flow For Police Data: It is expected that parties of this agreement will have in place baseline security measures compliant with or be equivalent to BS17799: 2005 and ISO/IEC 27001:2013 and HMG standards in relation to information security.
Data Transfer Method. The Parties agree to use secure file transfer protocol as the secure data transfer system to protect the privacy of the Data Exchange.