Common use of Collection of Personal Information Clause in Contracts

Collection of Personal Information. Throughout this section, we use the term ("Personal Information") to describe information that can be associated with a specific person and can be used to identify that person. We do not consider Personal Information to include information that has been anonymized so that it does not identify an individual person. We may determine, in our sole discretion, that it is necessary to obtain certain information including Personal Information (as defined above) about you and the source of the funds in order to comply with applicable law or regulation - in particular, but not limited to anti-money laundering laws - regarding selling Tokens/coins to you. Such information may include your name, address, phone, email, wallet address, date of birth, passport number, numbers that you may use or have registered with your local tax authority and other similar information. For such purposes, we may also obtain information and Personal Information about you from third parties such as identity verification services. You agree to provide us with such information promptly upon request, and you acknowledge that we may refuse to sell Tokens/coins to you until you provide such requested information and we have determined that it is permissible to sell you Tokens/coins under applicable law or regulation. Extent of Processing. We collect and process information and Personal Information only to the extent required for the performance of this Agreement. We will not disclose your information and Personal Information to any third parties, except as set forth in this Agreement or where such disclosure is permitted by applicable law. Even within Company and its affiliated entities, access to your information and Personal Information is limited to a subset of employees who perform obligations of Company under this Agreement. Safeguards. We protect your information and Personal Information using reasonable physical, technical, and administrative-technical and organizational measures to reduce the risks of loss, misuse, unauthorized access, disclosure, and alteration. Some of the safeguards we may use are firewalls and data encryption, physical access controls to our data centres, and information access authorization controls. All of our physical, electronic, and procedural safeguards are designed to comply with applicable laws and regulations.

Appears in 14 contracts

Samples: Node Purchase Agreement, Node Purchase Agreement, GMBH Diam Purchase Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.