A description of the Sample Clauses

A description of the types of Unsecured PHI that were involved in the Breach (such as full name, Social Security number, date of birth, home address, account number, disability code, or other types of information that were involved);

Related to A description of the

  • General Description of Facilities Subject to and upon the terms and conditions herein set forth, (i) the Revolving Loan Lenders hereby establish in favor of the Borrower a revolving credit facility pursuant to which each Revolving Loan Lender severally agrees (to the extent of such Lender’s Revolving Commitment) to make Revolving Loans to the Borrower in accordance with Section 2.2, (ii) the Issuing Bank agrees to issue Letters of Credit in accordance with Section 2.23, (iii) the Swingline Lender agrees to make Swingline Loans in accordance with Section 2.4, (iv) each Revolving Loan Lender agrees to purchase a participation interest in the Letters of Credit and the Swingline Loans pursuant to the terms and conditions hereof; provided, that in no event shall the aggregate principal amount of all outstanding Revolving Loans, Swingline Loans and outstanding LC Exposure exceed at any time the Aggregate Revolving Commitment Amount from time to time in effect; and (v) each Term Loan Lender severally agrees to make a Term Loan to the Borrower in a principal amount not exceeding such Term Loan Lender’s Term Loan Commitment on the Closing Date.

  • General Description The purpose of the HUB Program is to promote full and equal business opportunities for all businesses in State contracting. In accordance with 34 TAC §20.14(d)(1)(D)(iii), a respondent (prime contractor) may demonstrate good faith effort to utilize Texas certified HUBs for its subcontracting opportunities if the total value of the respondent’s subcontracts with Texas certified HUBs meets or exceeds the statewide HUB goal or the agency specific HUB goal, whichever is higher. When a respondent uses this method to demonstrate good faith effort, the respondent must identify the HUBs with which it will subcontract. If using existing contracts with Texas certified HUBs to satisfy this requirement, only contracts that have been in place for five years or less shall qualify for meeting the HUB goal. This limitation is designed to encourage vendor rotation as recommended by the 2009 Texas Disparity Study.

  • Description of the Transfer The details of the transfer and of the personal data are specified in Annex B. The parties agree that Annex B may contain confidential business information which they will not disclose to third parties, except as required by law or in response to a competent regulatory or government agency, or as required under clause I(e). The parties may execute additional annexes to cover additional transfers, which will be submitted to the authority where required. Annex B may, in the alternative, be drafted to cover multiple transfers. ANNEX A

  • Description of Facility The Lenders grant to the Borrowers a revolving credit facility pursuant to which, and upon the terms and subject to the conditions herein set out:

  • Description of the Services The services over the term of the contract will include infrastructure projects:

  • Legal Description The real property along with improvements and fixtures thereon and with all appurtenant rights, privileges, and easements is best described as: (check one) ☐ - Industrial Property ☐ - Land (only) ☐ - Multi-Family with total residential units ☐ - Office Building ☐ - Retail Property ☐ - Mixed Use Property (any combination of above) ☐ - Other: Street Address: Tax Parcel Information (i.e., “Parcel ID” or “Tax Map & Lot”): Other Description:

  • General Description of Services The A-E shall provide CA-PM Support Services, including estimating and scheduling support, cost control, document control, and management of information to ensure timely and cost-effective capital and/or maintenance-repair projects. The A-E shall also manage projects consisting of the repair and refurbishment of COUNTY-owned, and/or leased facilities, and provide management of energy retrofit efficiency projects. The A-E will be contacted by COUNTY Project Manager or designee on an “as-needed” basis as projects arise to provide CA-PM Support Services. Requirements will be discussed by both Parties and then the A-E shall prepare a written Scope Statement that will include the specific work to be performed, including the costs and time required to complete the project/task. COUNTY Project Manager or designee will review the A-E’s Scope Statement, proceed with negotiation of task costs and when satisfied, issue a Contract Task Order against this CONTRACT. Orange County Public Works/Facilities Maintenance and Project Management (OCPW) are responsible for most capital and maintenance-repair projects to provide safe County facilities to all internal and external constituents of the County of Orange. Capital projects are projects with construction costs typically greater than $175,000 which may require community and stakeholder coordination, professional design services, environmental documentation, regulatory permitting, and contract management services. Maintenance-repair projects are typically under $175,000 and may not require professional design services. To meet workload demands, project scheduling commitments, and to supplement existing staff resources, OCPW intends to establish a contract to provide Contract Administration - Project Management (CA-PM) Support Services under the direction and supervision of OCPW for various Capital and Maintenance-repair projects. This scope of work is to describe the services to be provided as part of the Contract; and the administrative process of the Contract.

  • DESCRIPTION OF TRANSFER Categories of data subjects whose personal data is transferred Data exporter may submit Personal Data to the Service, the extent of which is determined and controlled by the data exporter in its sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of data subjects: ● Customers, business partners, and vendors of the data exporter (who are natural persons) ● Employees or contact persons of data exporter customers, business partners, and vendor ● Employees, agents, advisors, contractors, or any user authorized by the data exporter to use the Service (who are natural persons) Categories of personal data transferred Data exporter may submit Personal Data to the Service, the extent of which is determined and controlled by the data exporter in its sole discretion, and which may include, but is not limited to the following categories of personal data: ● First and last name ● Business contact information (company, email, phone, physical business address) ● Personal contact information (email, cell phone) ● Title ● Position ● Employer ● ID data ● Professional life data ● Personal life data (in the form of security questions and answers) ● Connection data ● Localization data Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures. Data exporter may submit special categories of data to the Service, the extent of which is determined and controlled by the data exporter in its sole discretion, and which may include Personal Data concerning health information. If applicable, data exporter agrees that it has reviewed and assessed the restrictions and safeguards applied to the special categories of Personal Data, including the measures described in the Trust & Compliance Documentation (as defined by this DPA) and Documentation (as defined in the Agreement), and has determined that such restrictions and safeguards are sufficient. The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis) Subject to Customer’s use of the Service, Personal Data will be transferred on a continuous basis during the term of the Agreement. Nature of the processing Identity and access management and related services pursuant to the Agreement. Purpose(s) of the data transfer and further processing The objective of Processing of Personal Data by the data importer is the performance of the Service pursuant to the Agreement and as instructed by data exporter in its use of the Service. The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period Data exporter may retain Personal Data in the Service for the duration of the Agreement. Personal Data within the Service post-termination of the Agreement will be retained and deleted in accordance with the Documentation. For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing Sub-processors may only Process Personal Data as necessary for the performance of the Service pursuant to the Agreement and for the duration of the Agreement. Sub-processor information are made available on Okta’s ‘Agreements’ webpage (accessible via xxx.xxxx.xxx/xxxxxxxxxx under the “Trust & Compliance Documentation” link).

  • Description of the service 9.1.1 Internet banking service implies an ability for the client to manage and receive remotely the following services from the bank by means of using the special Internet-site of the bank xxxxx://xxx.xxxxxxxxxxxxxxx.xx:

  • Topic Description Licensee Responsibilities Licensee must:  Take appropriate steps to ensure the security, integrity, and confidentiality of Confidential Information and must comply with all relevant applicable laws and regulations, including laws protecting borrower privacy.  Not disclose Confidential Information to third parties, without Xxxxxx Mae’s prior written approval, except on a need‐to‐know basis to Licensee’s partners, Topic Description affiliates, officers, employees, directors, contractors, counsels, agents or representatives, provided they are subject to confidentiality obligations at least as stringent as those set forth in this Section A3.  Not use Confidential Information in any way that could be viewed as a conflict of interest, a breach of confidentiality or privacy, or the gaining of an unfair advantage from the relationship with Xxxxxx Xxx.  Implement commercially reasonable measures meeting or exceeding industry standards to ensure the security, integrity, and confidentiality of Confidential Information, including using industry‐standard encryption for data in transit and virus checking programs designed to prevent the transmission and receipt of viruses and other malicious code, implementing appropriate disaster recovery and back‐up procedures, implementing appropriate procedures to prevent disclosure of data and other materials to a party other than the intended recipient, and employing methods for securely disposing or destroying such information.  These measures must meet, at least, the same level of protection that the Receiving Party seeks for its own information of a similar nature.  Licensee must collaborate with Xxxxxx Mae in assessing the sufficiency of these measures and Licensee’s information security program, upon reasonable request.  Instruct its Related Parties who may receive Confidential Information about the requirements of this Section A3, and the processes and procedures necessary to comply with them.  Comply with all reasonable security policies and procedures required by Xxxxxx Xxx related to the access and use of Xxxxxx Mae’s systems or any Licensed Materials.  Not transmit to Xxxxxx Mae’s systems any materials that contain bugs, viruses, worms or other functions, routines, devices or instructions which may create any unauthorized access or damage to, or interruption in the functioning of, the Licensed Application or Xxxxxx Mae’s systems. Restrictive Legends  Licensee must abide by and reproduce and include any restrictive legend or proprietary rights notice that appears in or on any Confidential Information of Xxxxxx Xxx or any Third‐Party Licensor (or other third‐party owner) that it is authorized to reproduce.  Licensee also agrees that it will not remove, alter, cover or distort any trademark, trade name, copyright or other proprietary rights notices, legends, symbols or labels appearing on or in any Confidential Information of Xxxxxx Mae or any Third‐Party Licensor (or other third‐party owner). Required Actions in Case of Data Breach  Licensee must address any Data Breach with prompt and effective corrective action, including cooperation with Xxxxxx Xxx in the investigation and remediation of such Data Breach, as well as prompt disclosure and notification where legally required; and  Licensee must promptly notify Xxxxxx Mae of any Data Breach in writing ‐‐ at xxxxxxx_xxxxxxxxxxxx@xxxxxxxxx.xxx ‐‐ and must take all steps reasonably requested by Xxxxxx Xxx to mitigate the consequences of such Data Breach.