Third Party Access Agreement

The third-party provider may not use IQVIA data for its own benefit. 3.3 Each party is solely responsible for selecting, implementing, and maintaining sufficient security procedures and policies to ensure that (a) that party`s use of the network connection (and the Company`s use of Appalachian State University devices) is secured and used only for authorized purposes, and (b) that party`s business records and data are protected from unauthorized access; Use, loss, alteration or destruction. The ITS Network Infrastructure and Control Systems Group is responsible for the design, configuration and engineering of the global firewalls required for network access. St. Mary`s University provides the third party with a point of contact for information services. The contact person will work with the third party to ensure that they comply with these rules. 10.3 Assignment. Neither party may assign this Agreement, in whole or in part, without the prior written consent of the other party. Any attempt to assign this Agreement without such consent shall be null and void. Subject to the foregoing, this Agreement is binding on the respective assigns and authorized assigns of the parties.

This policy shall also require that the third party and all its subcontractors with whom it is authorized to disclose the data provide only the minimum necessary information, safely return or destroy the personal data after the expiration of the contract and immediately inform the campus in the event of a breach of sensitive data. Violation of this policy may result in disciplinary action, which may include dismissal of employees, termination of business relationships for contractors or consultants. In addition, individuals are liable to loss of access to privileges and civil and criminal prosecutions of St. Mary`s University`s information resources. Third parties will be held responsible for paying compensation for damages resulting from disclosure, breach, loss of data or other events that compromise the university`s data. Iqvia and TPA providers have common customers, so we need to work together to maximize value for those customers. As a result, IQVIA provides limited licenses (TPA agreements) to TPA providers. TPA agreements specify what IQVIA data is, the access that APT providers may have to it, the permitted use, the need to maintain confidentiality and disclose it only in certain circumstances, and the requirement to return or destroy it at the end of a project.

Below are some tips to help TPA providers properly manage IQVIA data. IN WITNESS WHEREOF, the parties have taken steps to ensure that this Agreement is properly executed. Each party warrants and represents that its respective signatories, whose signatures appear below, have been and are duly authorized to sign this Agreement at the time of signature. 10.2 Waiver. A party`s failure to enforce any provision of this Agreement shall not be construed as a waiver of that party`s right to enforce those terms. 9. Term, Termination and Survival. This Agreement shall survive its termination by either party. Either party may terminate this Agreement for convenience by giving at least thirty (30) days` written notice of the effective date of termination.

Either party may also terminate this Agreement immediately if the other party violates this Agreement. Sections 5, 6, 7, 8, 10.1 and 10.2 shall survive termination of this Agreement. 8. Confidentiality. The Parties acknowledge that, by virtue of their relationship with each other under this Agreement, each Party has access to certain information and materials about the other Party`s technology and products that are confidential and of significant value to that Party, the value of which would be compromised if such information were disclosed to third parties (“Confidential Information”). If such confidential information is disclosed orally or visually, the disclosing party must combine the confidential information in writing within thirty (30) days of disclosure. Each party agrees not to use such Confidential Information disclosed to it by the other party in any manner for its own account, except as provided herein, or to disclose it to any third party. Each party will take all reasonable precautions to protect the confidentiality of such confidential information.

At the request of the receiving Party, the disclosing Party shall indicate whether or not it considers certain information or documents to be confidential. The receiving party acknowledges that the unauthorized use or disclosure of these could cause irreparable harm to the disclosing party that could not be compensated by financial damages. Therefore, each party agrees that the other party has the right to request injunctive and interim measures to remedy any actual or threatened unauthorized use or disclosure of that other party`s confidential information. The obligation of confidentiality of the receiving party does not apply to information that: (a) is already known to the receiving party or that is publicly available at the time of disclosure; (b) disclosed to the receiving party by a third party that does not breach any obligation of confidentiality to the party to this Agreement claiming ownership of such information; or (c) becomes publicly available upon disclosure without fault of the receiving party. Third parties must comply with all applicable university rules, policies, and standards and agreements, including but not limited to: Third-party network connections established through VPN tunnels are authenticated using the third-party authentication database maintained by Appalachian State University Information Technology Services. Objective: To ensure a secure method of network connectivity between Appalachian State University and all third parties and to provide a formalized method for requesting, approving, and tracking such connections. To initiate a third-party access request, customers can obtain a portal ID and password by contacting their IQVIA account manager. .

Posted in Uncategorized