Single Site Data Clause Samples

The 'Single Site Data' clause defines the handling and use of data that is collected or generated at a specific, individual location within the scope of an agreement. Typically, this clause outlines who owns the data, how it may be accessed or shared, and any restrictions on its use, often applying to research, clinical trials, or service delivery at a particular site. By clearly specifying the rights and responsibilities regarding data from a single site, the clause helps prevent disputes over data ownership and ensures compliance with privacy or regulatory requirements.
Single Site Data. After pooled dataset is published by Collaborator or one hundred eighty (180) calendar days after data lock, whichever is earlier, Principal Investigator may freely publish and/or present the results derived from the data collected solely by VA. VA shall determine the authorship and contents (including scientific conclusions and professional judgments) of any publication or presentation. VA shall provide Collaborator with a copy for review in accordance with Section 6.3 Presentations and Publications.

Related to Single Site Data

  • Site Data (i) The Contractor shall be deemed to have inspected and examined the Site and its surroundings and to have satisfied himself before entering into the Agreement in all material respects including but not limited to: (a) the form and nature of the Site (including, inter-alia, the surface and sub- surface conditions and geo-technical factors); (b) the hydrological and climatic conditions; (c) the extent and nature of the works already completed and Materials necessary for the execution and completion of the Works and the remedying of any defects that includes already executed part also. (d) the suitability and the adequacy of the Site for the execution of the Works; (e) the means of access to the Site and the accommodation the Contractor may require; (f) arranging permits as required as per [.] of the Agreement. (g) the requirements of operation and maintenance; and (h) all other factors and circumstances affecting the Contractor's rights and obligations under the Agreement, the Contract Price and Time for Completion.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Notice to Proceed - Site Improvements The Recipient shall not commence, or cause to be commenced, any site improvements or other work on the Land until the Director has issued a Notice to Proceed to the Recipient. Such Notice to Proceed will not be issued until the Director is assured that the Recipient has complied with all requirements for the approval of a grant under Revised Code Sections 164.20 through 164.27 and has completed any land acquisition required by the Project. A Notice to Proceed shall be required for all Project prime contractors or direct procurement initiated by the Recipient following execution of this Agreement.