COMPUTER PRIVACY Sample Clauses

COMPUTER PRIVACY. The University and the CSU- AAUP recognize the University’s right and obligation to provide the CSU community with high quality computer and network resources, to protect the security and integrity of the computer facilities owned and operated by the University, and at the same time to treat faculty electronic mail (“email”) and faculty computer files as private to the fullest extent permitted by law. The University and the CSU- AAUP agree that the rights of academic freedom and freedom of expression apply to the use of the University’s computer and network resources, as do the responsibilities associated with those rights.
AutoNDA by SimpleDocs

Related to COMPUTER PRIVACY

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • Health Information System i. As required by 42 CFR 438.242(a), the MCP shall maintain a health information system that collects, analyzes, integrates, and reports data. The system shall provide information on areas including, but not limited to, utilization, grievances and appeals, and MCP membership terminations for other than loss of Medicaid eligibility.

  • Personal Information and Privacy 9.1 We will handle Personal Information in accordance with the Privacy Legislation and our privacy policy available at xxx.xxxxxxxxxxxxxxx.xxx/xx/xxxxxxx-xxxxxx/.

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • PayPal's Seller Protection Program If you sell a good or service to a buyer, you may be eligible for PayPal's Seller Protection program. When it applies, PayPal's Seller Protection program entitles you to retain the full purchase amount. PayPal determines, in its sole discretion, whether your claim is eligible for PayPal’s Seller Protection Program. There is no limit on the number of payments eligible for PayPal's Seller Protection program. By accessing the transaction details page in your PayPal account you can see transactions that may be eligible for protection under this program. The Seller Protection Program terms and conditions are set out in the PayPal’s Seller Protection Program page and form part of this User Agreement.

  • Privacy Policies Each party will make available a Privacy Policy that complies with Law. Xxxxxx’s Privacy Policy explains how and for what purposes Stripe collects, uses, retains, discloses and safeguards the Personal Data you provide to Stripe.

  • INFORMATION AND PRIVACY You understand and agree that in conjunction with employee training, quality control and the provision of services, we may monitor and/or electronically record cellular transmissions related to the Services, as well as conversations with you or others. Further, you understand that privacy cannot be guaranteed on telephone, cellular network and computer systems, and we shall not be liable to you for any claims, loss, damages or costs which may result from a lack of privacy experienced. You consent to us (i) using information about you and your location (collectively, “information’) to administer services, offer you new products or services, enforce the terms of this Agreement, prevent fraud and respond to regulatory and legal requirements, (ii) response to a subpoena or other such legal process, and (iii) using and sharing aggregate Subscriber information and statistics that do not include information that identifies you personally.

  • Access to Protected Health Information 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Time is Money Join Law Insider Premium to draft better contracts faster.