Data Contract Condition Language for:
Andrew W. Mellon Foundation

sorted by Category and Condition

December 8, 2016, 3:05 pm

Data Use

No re-identification

III. 4. The Researcher and the Authorized Persons shall not use Restricted Information in any way to identify individual persons or academic institutions or small groups of individual persons or academic persons (e.g., by conducting statistical analyses based on small "cell" sizes, or by cross-tabulating the same data by different variables.

No redistribution of data

II. Restricted Information shall be used only by the Researcher and the Authorized Persons, and only for the purpose of conducting the Project at the Institution or another location approved by the Institution.

Stick to original research plan

II. Restricted Information shall be used only by the Researcher and the Authorized Persons, and only for the purpose of conducting the Project at the Institution or another location approved by the Institution.

Inspections & Penalties

Penalty

V. The Institution shall be responsible for any damages, loss, cost or liability (including reasonable attorney's fees and the cost of enforcing this indemnity) arising out of or resulting from any unauthorized use or disclosure of Restricted Information by the Institution, the Researcher or the Authorized Persons, or from any other violation of this Agreement. In addition, because money damages would be inadequate for any breach of this Agreement, in the event of any breach or threatened breach of this Agreement by the Institution, the Researcher or the Authorized Persons, the Foundation shall also be entitled, without the requirement of posting a bond or other security, to equitable relief, including injunctive relief and specific performance. Such remedies shall not be the exclusive remedies for any breach of this Agreement but will be in addition to all other remedies available at law or equity to the Foundation.

Inspections & Penalties

Site Inspections can/will occur

III. 6. The Institution, the Researcher and the Authorized Persons shall allow employees or agents of the Foundation access to the place work using Restricted Information is performed, if requested, for the purpose of reviewing compliance with this Agreement.

Security

Work location defined

III. 2. All work on the Project involving Restricted Information shall be performed only at the facilities of the Institution or another location approved by the Institution. The Researcher and the Authorized Persons shall not remove any hardcopy, tape, compact disk, diskette or other media containing Restricted Information from the Institution or other location approved by the Foundation (except to another location approved by the Institution) for any reason without the approval of the Foundation.

Legal Details

Data Breach

III. 5. The Institution, the Researcher and the Authorized Persons agree to notify the Foundation immediately upon (i) the discovery of any breach or suspected breach of security of Restricted Information, (ii) any unauthorized disclosure of Restricted Information, or (iii) the receipt of any legal, investigatory, or other demand for access to Restricted Information in any form.

Inadvertent Discovery

III. 4. The Researcher and the Authorized Persons shall not use Restricted Information in any way to identify individual persons or academic institutions or small groups of individual persons or academic persons (e.g., by conducting statistical analyses based on small "cell" sizes, or by cross-tabulating the same data by different variables). If an individual person or academic institution or small group of individual persons or academic institutions is identified for any reason, the Researcher and the Authorized Persons shall make no use of this knowledge and shall hold the identity of the individual person or academic institution or group of individuals or academic institutions in confidence.

Extras Administration

Expiration: When Finished

II. Upon the completion or discontinuance of the Project, or upon any failure to comply with the terms of this Agreement by the Institution, the Researcher or any Authorized Person, the Researcher shall promptly deliver to the Foundation (or at the Foundation's direction, shall destroy) all Restricted Information, and shall perform any and all necessary acts (including without limitation erasing files containing Restricted Information from computer hard drives) such that no record or file whatsoever (electronic or otherwise)containing Restricted Information shall be retained by the Researcher, the Authorized Persons or the Institution.

Return/destroy media

II. Upon the completion or discontinuance of the Project, or upon any failure to comply with the terms of this Agreement by the Institution, the Researcher or any Authorized Person, the Researcher shall promptly deliver to the Foundation (or at the Foundation's direction, shall destroy) all Restricted Information, and shall perform any and all necessary acts (including without limitation erasing files containing Restricted Information from computer hard drives) such that no record or file whatsoever (electronic or otherwise)containing Restricted Information shall be retained by the Researcher, the Authorized Persons or the Institution.