Commercial Access Policy Sample Clauses

Commercial Access Policy. Data from the CFFPR are to be used for valid scientific research that is intended for publication in a peer- reviewed journal. Information from the Registry may not be used or further disclosed to direct marketing or sales, or for any other purpose that has not been reviewed and approved by the Patient Registry/ CER Committee. Cystic Fibrosis Foundation Patient Registry Data Application and Confidentiality Agreement All data requests must be submitted as described below, noting: • For all members of the project team: Name, title, address, phone, e-mail, role on the project, and whether they need access to CF Foundation Patient Registry data. It is the principal investigator’s responsibility to ensure that all team members have reviewed and approve the proposal for submission to the CF Foundation. For further clarification, the primary investigator (PI) should be an employee of the same institution as the person who will be receiving the CF Foundation Patient Registry dataset and performing the analysis. The CF Foundation Patient Registry dataset cannot be shared outside of this institution. • At most institutions, medical fellows cannot serve as PIs. Please list the fellow’s mentor as the PI. • The Confidentiality Disclosure Agreement (CDA), IRB approval letter, and Information Use Agreement that is applicable when identifiers are requested shall all be executed with the institution where the CF Foundation Patient Registry dataset will be released by the CF Foundation. • If the PI needs to share their CF Foundation Patient Registry dataset with another person(s) who is/are employed elsewhere, please indicate this on the application in the collaborator identification section. The CF Foundation will contact them regarding all necessary paperwork, including the Confidentiality Disclosure Agreement, the IRB approval letter, and the Information Use Agreement. • Prior to any team member with access to the dataset changing institutions during the project, the CF Foundation must be notified via xxxxxxxxxxxx@xxx.xxx. Regulatory documents will need to be updated with the new institution prior to the dataset leaving the original institution. Data requests must include the following:
AutoNDA by SimpleDocs
Commercial Access Policy. Data from the FSR Patient Registry is to be used for valid scientific research that is intended for publication in a peer-reviewed journal. Information from the registry may not be used or further disclosed to direct marketing or sales, or for any purpose that has not been approved by the FSR Patient Registry Committee. Commercial entities may submit a Patient Registry Data Application to be reviewed by the FSR Patient Registry Committee. Data subsets will not be released directly to such applicants; FSR or an FSR approved third party must be contracted for data analysis. FSR and/or affiliated parties must be compensated for data analysis, details of which will be specified in a subsequent agreement.
Commercial Access Policy. Data from iCureCeliac® is to be used for valid scientific research that is intended for publication in a peer- reviewed journal. Information from the registry may not be used or further disclosed to direct marketing or sales, or for any purpose that has not been approved by the CDF Research Committee.

Related to Commercial Access Policy

  • General Access BCA agrees to provide Agency with access to the Minnesota Criminal Justice Data Communications Network (CJDN) and those systems and tools which the Agency is authorized by law to access via the CJDN for the purposes outlined in Minn. Stat. § 299C.46.

  • DATA/ACCESS/CONFIDENTIALITY/ PRESERVATION 10.1 As used in this Agreement, the word “data” shall mean all information and things developed or obtained during the performance of, or acquired or developed by reason of, this Agreement, including, but not limited to, all studies, reports, files, formulae, surveys, maps, charts, sound recordings, video recordings, pictorial reproductions, drawings, analyses, graphic representations, computer programs, computer printouts, notes, letters, memoranda, papers, and documents, all whether finished or unfinished.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Required Procurement Procedures for Obtaining Goods and Services The Grantee shall provide maximum open competition when procuring goods and services related to the grant-assisted project in accordance with Section 287.057, Florida Statutes.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

Time is Money Join Law Insider Premium to draft better contracts faster.