Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 304 contracts
Sources: California Student Data Privacy Agreement, California Student Data Privacy Agreement, California Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 269 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 256 contracts
Sources: Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 197 contracts
Sources: Student Data Privacy Agreement, Utah Student Data Privacy Agreement, Data Privacy & Security
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 93 contracts
Sources: Oregon Student Data Privacy Agreement, Oregon Student Data Privacy Agreement, Oregon Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 80 contracts
Sources: Utah Student Data Privacy Agreement, Utah Student Data Privacy Agreement, Utah Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputerenvironment.
Appears in 76 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer collection, storage or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement DPA in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 73 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 68 contracts
Sources: California Student Data Privacy Agreement, California Student Data Privacy Agreement, California Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit.
Appears in 67 contracts
Sources: Maine Student Data Privacy Agreement, Maine Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. The Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 50 contracts
Sources: Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. The Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 22 contracts
Sources: Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 22 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Texas Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 18 contracts
Sources: Oregon Student Data Privacy Agreement, Oregon Student Data Privacy Agreement, Oregon Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEACFISD.
Appears in 18 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer collection, storage or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. .Provider shall maintain all data obtained or generated pursuant to the Service Agreement DPA in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 15 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.data
Appears in 9 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA. In the event that transmission or storage is necessary, the Contractor agrees to never email data or store data on a non-encrypted device.
Appears in 7 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 5 contracts
Sources: California Student Data Privacy Agreement, Oregon Student Data Privacy Agreement, California Student Data Privacy Agreement
Security Protocols. Both The parties agree to shall maintain security protocols that meet industry standards in regarding the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 4 contracts
Sources: Texas Student Data Privacy Agreement, Illinois Student Data Privacy Agreement, Illinois Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 4 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.may
Appears in 3 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement, Oregon Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 3 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 3 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.secure
Appears in 3 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement, Maine Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 3 contracts
Sources: Data Sharing and Privacy Agreement, Data Sharing and Privacy Agreement, Data Sharing and Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring designed so that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any subprocessors to view or access data in accordance with Article II, Section 4.
Appears in 2 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties Parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties Parties legally allowed to do so. Provider shall maintain all data Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment computer environment, which may include secure cloud based storage, and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇ under this DPA or by the U.S. Department of Education under the Cooperative Agreement.
Appears in 2 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer collection, storage or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement DPA in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 2 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇. In the event that transmission or storage is necessary, the Contractor agrees to never email data or store data on a non-encrypted device.
Appears in 2 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement DPA in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.and
Appears in 2 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties agree Provider agrees to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 2 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.digital
Appears in 2 contracts
Sources: Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any dataData, including ensuring that data Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data Data requests by LEA▇▇▇.
Appears in 2 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.transmit
Appears in 2 contracts
Sources: Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.maintain
Appears in 2 contracts
Sources: Student Data Privacy Agreement, Student Data Privacy Agreement
Security Protocols. Both parties Parties agree to maintain security protocols that meet industry standards best practices in the transfer collection, storage or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement DPA in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 2 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best standardpractices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 2 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.Service
Appears in 2 contracts
Sources: Wisconsin Student Data Privacy Agreement, Wisconsin Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed authorized to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or to perform the services under the Service Agreement.
Appears in 2 contracts
Sources: Washington Student Data Privacy Agreement, Washington Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEABCSD.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer collection, storage or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.the
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the provisioning of the Services or the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or to provide the services under the Service Agreement.
Appears in 1 contract
Sources: Utah Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit. The foregoing does not limit the ability of the Provider to allow any subprocessors to view or access data in accordance with Article II, Section 6.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may datamay only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALISD.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet consistent with industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or otherwise provide the Services.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data Student Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of performing the Services or data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.Provider
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.maintain
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAGCSD.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain a commercially reasonable security protocols that meet program consistent with applicable industry standards in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the services and fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider The Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAthe District.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both The parties agree to shall maintain security protocols that meet industry standards in regarding the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring data that are designed to ensure that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Services or fulfill the purpose of data requests by LEA▇▇▇.
Appears in 1 contract
Sources: Utah Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any dataData, including ensuring that data Data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data Data obtained or generated pursuant to in connection with the Service Agreement Services in a secure digital computer environment and shall not copy, reproduce, or transmit data obtained pursuant to the Service AgreementData, except as necessary to fulfill the purpose of data requests by LEA, to perform the Services or as otherwise instructed by LEA or permitted under this DSPA.
Appears in 1 contract
Sources: Data Sharing and Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEALEA or to provide the services under the Service Agreement.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transfer, transmission and storage of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Sources: Data Protection Addendum
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.Service
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed authorized to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇ or to perform services under the Services Agreement.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEADCSD.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may datamay only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.CFISD. . The foregoing does not limit the ability of the Provider to allow any necessary service
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.obtained
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. The Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.the
Appears in 1 contract
Security Protocols. Both parties agree to maintain a commercially reasonable security protocols that meet program consistent with applicable industry standards in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a reasonably secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the services and fulfill the purpose of data requests by LEA.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain a commercially reasonable security protocols programs that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed restricting the viewing or accessed by access of datato the parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a reasonably secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the services and fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed Viewed or accessed by parties legally allowed to do so. Provider ProVider shall maintain all data obtained or generated pursuant to the Service SerVice Agreement in a secure digital environment enVironment and not copy, reproduce, or transmit data obtained pursuant to the Service SerVice Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in for the transfer or and transmission of any data, including ensuring data in a manner designed to provide that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties Parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may using commercially reasonable measures to limit access to Data to only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Sources: Data Sharing and Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may n1ay only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards industry- standardpractices in the transfer or transmission of any data, including ensuring that data may only be onlybe viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputerenvironment.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties pa1ties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose pmpose of data requests by LEA▇▇▇.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any dataData, including ensuring that data Data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data Data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA. Notwithstanding the above, data under this section shall not include information that has been anonymized or deidentified.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards standard practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties Parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that using commercially reasonable measures to limit access of data may to only be viewed or accessed by parties persons legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as reasonably necessary to fulfill the purpose of data requests by LEALEA or the Services Agreement, or as required by law.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data Student Data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit or as permitted hereunder or under the Service Agreement.
Appears in 1 contract
Sources: Maine Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Service to or fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties We both agree to maintain security protocols that meet industry standards in for the transfer or and transmission of any data, including ensuring data in a manner designed to provide that data may only be viewed or accessed by parties legally allowed to do so. Provider We shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 1 contract
Sources: Software Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards industrybest practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputer environment.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA▇▇▇ or to provide the services under the Service Agreement.
Appears in 1 contract
Sources: Utah Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to provide the Services and to fulfill the purpose of data requests by LEASchool Unit.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service AgreementAgreement and as set forth hererin, except as necessary to fulfill the purpose of data requests by LEA▇▇▇.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that restricting the viewing or access of data may only be viewed or accessed by to the parties legally allowed to do so. Provider Operator shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEAcomputerenvironment.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Protocols. Both parties agree to maintain a commercially reasonable security protocols program that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that commercially reasonable measures to limit access of =data may to only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as reasonably necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.shall
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider Contractor shall maintain all data Student Data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Appears in 1 contract
Sources: Student Data Privacy Agreement
Security Protocols. Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring data designed so that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital computer environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEASchool Unit. The foregoing does not limit the ability of the Provider to allow any subprocessors to view or access data in accordance with Article II, Section 6.
Appears in 1 contract
Sources: Maine Student Data Privacy Agreement