Anonymity Sample Clauses

Anonymity. Individuals who report abuse may or may not be entitled to anonymity. While CP&P allows anonymous child abuse reporting for the general public, school staff may not be entitled to anonymity for these reports. Furthermore, there is no anonymity when incidents are reported to law enforcement authorities.
AutoNDA by SimpleDocs
Anonymity. Grant recipients will be advised of the Fund name when grants are issued from the Fund, unless indicated otherwise below. Additionally, to recognize and honor our Donors, The Community Foundation’s policy is to include Fund names in publicity about The Community Foundation unless Donors request to remain anonymous as indicated below. Please note that anonymity may always be requested in writing, on a grant- by-grant basis. ☐ I do not wish to have my Fund name included in The Community Foundation’s publicity, including the Annual Report. ☐ I request that all grants from the Fund be anonymous.
Anonymity. The school needs to collect identifiable information to facilitate the delivery of educational and support services, the job application process and fulfil other obligations and processes. However, some activities and interactions with the school may be done anonymously where practicable, which may include making an inquiry, complaint or providing feedback. How will the School use the personal information you provide? The School will use personal information it collects from you for the primary purpose of collection, and for such other secondary purposes that are related to the primary purpose of collection and reasonably expected by you, or to which you have consented.
Anonymity. Individuals who report abuse may or may not be entitled to anonymity. While DYFS allows anonymous child abuse reporting for the general public, school staff may not be entitled to anonymity for these reports. Furthermore, there is no anonymity when incidents are reported to law enforcement authorities.
Anonymity. Smart meters are supposed to transmit attributable fine grained data to the utility for the billing use-case. Nev- ertheless, the attributable fine grained data including device identity, energy usage, and so on, is vulnerable. For instance, an adversary can easily spoof/correlate the identities of smart meters that are reporting detailed fine grained information from the HAN to NAN. Thus, the identity of a meter should be kept private.
Anonymity. Assume that an adversary overhears on wireless packet and spoofs the identities, e,g., XXXXx and connects to the NAN gateway, it does not send SMIDj as a plaintext but hide the identity in Q1 = ESTj [SMIDj , NID, T 1]. Moreover, it can be noticed from the proposed scheme that the pseudonymity of idSTj is being provided using α and β. Resultant, only the legitimate NAN gateway can learn the identity of meter by decrypting Q1 = ESTj [SMIDj , NID, T 1] using the secret token (STj). Thus, it achieves identity anonymity and protects from identity spoofing attack. In addition, the comparison on security services among [14], [17], [19]–[23] and the proposed scheme is given in Table II. We can notice that the proposed LAKA can provide more security services than previously proposed ones.
Anonymity. LICENSEE shall have no right to use the names or other designation of THE UNIVERSITY OF COLORADO or the Inventors in connection with any sales or promotion of Product Units, Licensed services and Licensed Methods, as the case may be without the express written consent of the Institution or the Inventors, as the case may be.
AutoNDA by SimpleDocs
Anonymity. The Donor acknowledges that unless the Donor requests anonymity, Xxxx Community Foundation will publish Donor information publicly.” Donor requests anonymity.
Anonymity. 22.1 Best Companies agrees that in relation to all employees that are invited to participate in the survey that their individual views and opinions will remain anonymous, in particular:
Anonymity. This policy includes provisions for anonymity in that when a student or staff member voluntarily discloses use or being under the influence, information will be shared only on a “need to know” basis as provided in Idaho Code §§33-210.
Time is Money Join Law Insider Premium to draft better contracts faster.