This data sharing agreement outlines the terms between two parties for sharing personal data, including the purpose of sharing, types of data to be shared, how the data will be processed and protected, remedies for violations of individual rights, designated data protection officers, duration of the agreement, how individuals can access the agreement, details of any online access to data, and methods for secure handling or destruction of shared data.
This data sharing agreement outlines the terms between two parties for sharing personal data, including the purpose of sharing, types of data to be shared, how the data will be processed and protected, remedies for violations of individual rights, designated data protection officers, duration of the agreement, how individuals can access the agreement, details of any online access to data, and methods for secure handling or destruction of shared data.
This data sharing agreement outlines the terms between two parties for sharing personal data, including the purpose of sharing, types of data to be shared, how the data will be processed and protected, remedies for violations of individual rights, designated data protection officers, duration of the agreement, how individuals can access the agreement, details of any online access to data, and methods for secure handling or destruction of shared data.
2. Types of personal data 3. Personal information processor that will process personal data 4. Manners of how PIC and PIP are processing personal data 5. The remedies available to a data subject in case the processing of personal data violates his or her rights and how these rights may be exercised; 6. Designated data protection officer or compliance officer. 7. Duration of the agreement 8. Inform how a data subject can obtain a copy of the data sharing agreement. 9. If a personal information controller shall grant online access to personal data under its control or custody, it shall specify the following information: a. Parties that shall be granted online access; b. Types of personal data that shall be made accessible online; c. Estimated frequency and volume of the proposed access d. Program, middleware and encryption method that will be used. 14. Method that shall be adopted for the secure return, destruction, or disposal of the shared data.