DATA PROTECTION CONTACT Sample Clauses

DATA PROTECTION CONTACT. ServiceNow and its Sub-Processor Affiliates (defined below) will maintain a dedicated data protection team to respond to data protection inquiries throughout the duration of this DPA and can be contacted at xxxxxxx@xxxxxxxxxx.xxx.
AutoNDA by SimpleDocs
DATA PROTECTION CONTACT. 4Mation and its Sub-Processor Affiliates (defined below) will maintain a dedicated data protection team to respond to data protection inquiries throughout the duration of this DPA and can be contacted at: xxxx@xxxx0xxxxxx.xxx. 5 Requests made from Data Subjects and Authorities‌
DATA PROTECTION CONTACT. Kensu and its Sub-Processor Affiliates (defined below) will maintain a dedicated data protection team to respond to data protection inquiries throughout the duration of this DPA and can be contacted at xxxxxxx@xxxxx.xx.
DATA PROTECTION CONTACT. Gearset has personnel responsible for the protection and Processing of Personal Data. Those personnel may be reached at xxxxx@xxxxxxx.xxx.
DATA PROTECTION CONTACT. [Guidance note: insert each Party’s “PoC” (Point of Contact), as at the Commencement Date, here.]
DATA PROTECTION CONTACT. 15.1 OOCL can be contacted in respect of any privacy and data protection matters at: Corporate Customer Service Department Orient Overseas Container Line Ltd. Address: 00xx Xxxxx, Xxxxxxx Xxxxxx, 00 Xxxxxxx Xxxx, Xxxxxxx, Hong Kong Telephone: (000) 0000 0000 Email: xxxxxxx@xxxx.xxx SCHEDULE 1
DATA PROTECTION CONTACT. For all data protection related issues or misuse you can either contact iWhoAmI at the corporate office or email xxxx.xxxxxxxxxx@xXxxXxX.xxx. iWhoAmI Limited Company registered in the Republic of Ireland. Registration Number: 565999
AutoNDA by SimpleDocs
DATA PROTECTION CONTACT. 12.1 Carrier can be contacted in respect of any privacy and data protection matters at: Corporate Customer Service Department Orient Overseas Container Line Ltd. Address: 00xx Xxxxx, Xxxxxxx Xxxxxx, 00 Xxxxxxx Xxxx, Xxxxxxx, Xxxx Xxxx Telephone: (000) 0000 0000 Email: xxxxxxx@xxxx.xxx SCHEDULE 1
DATA PROTECTION CONTACT. 15.1. Our data protection lead is Xxxx Xxxxx. He may be contacted via email at xxxx@xxxx-xxxxx.xxx. By signing below I warrant and represent that I am duly authorised to sign the Agreement and bind my organisation For: For Counting What Counts Signature: Signature: Title: Title: Director Date: Date: 18-05-19 ANNEX A DETAILS OF PROCESSING Processing of the Protected Data by us under this DPA and the Agreement shall be for the subject-matter, duration, nature and purposes and involve the types of Personal Data and categories of Data Subjects set out in this Annex A based on the expected use of the IIT and IIT Services by NPOs and ACE, as applicable. As a Controller, you and your Authorised Users decide which questions to use, how to design your Surveys, what Personal Data to process and why. We simply provide the IIT and IIT Services to enable you to do so. The details of processing will vary according to such choices but are generally described below based on our expected use of the IIT by NPOs. Brief description of processing What processing is being done? The following processing activities will primarily be performed by you in your capacity as Controller. Certain activities (marked with **) reflect where CWC processes the same data as a Controller for business administration purposes as described in our Data Privacy Notice xxxxx://xxxxxxxxxxxxxxxx.xx.xx/cookie- policy What types of data are being processed on behalf of NPO? NPOs can use the self-serve platform to create Surveys that capture questions prescribed by ACE or bespoke questions in order to gain audience insights. NPOs can generate reports and metrics. NPOs will receive training and have access to a help line and live support as well as access to training and demonstration videos. Collection of Personal Data supplied by NPO and derived from IIT Use**. Storage/organisation Transfer outside the EEA to Australia. Our AWS server is in London but CC employees based in Australia process a limited amount of Protected Data (e.g. to provide support) as well as for CWC’s own purposes as a Controller. CC developers in India and the US do not process any data. If in an exceptional case they needed to process Protected Data (for example to de-bug), which is unlikely, they would seek and document explicit consent of the Data Subject as required Art. 49(1)(a), GDPR. Use/consultation Transfer to a third party: see Annex C (List of Sub-Processors) Adaptation/alteration Retention Destruction/erasure / pseudonymi...

Related to DATA PROTECTION CONTACT

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • PERSONAL DATA PROTECTION 7.1 By accessing ESZAM AUCTIONEER SDN BHD website, the E-Bidders acknowledge and agree that ESZAM AUCTIONEER SDN BHD website may collect, retain, or disclose the E-Bidder’s information or any information by the e-bidders for the effectiveness of services, and the collected, retained or disclosed information shall comply with Personal Data Protection Act 2010 and any regulations, laws or rules applicable from time to time.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • PERSONAL DATA PROTECTION ACT 7.1. PAH is committed to protecting the privacy, confidentiality and security of all personal data to which it is entrusted. It has been our policy to ensure your personal information are protected. With the introduction of the Malaysian Personal Data Protection Act 2010 ("PDPA"), we are even committed to ensure the privacy and confidentiality and security of all personal data are protected in line with the PDPA. We process personal data which you have provided to us voluntarily through our website upon your registration and this includes personal data such as your name, address, NRIC and contact details. In this regards, you have expressly consent to our processing of your personal data. If you give us personal data or information about another person, you must first confirm that he/she has appointed you to act for him/her, to consent to the processing of his/her personal data and to receive on his/her behalf any data protection notices. We may request your assistance to procure the consent of such persons whose personal data is provided by you to us and you agree to do so. You shall indemnify us in the event we suffer loss and damage as a result of your failure to comply with the same. We will only retain your personal data for as long as necessary for the fulfilment of the specified purposes or as legislated

  • Data Protection Legislation the UK Data Protection Legislation and any other European Union legislation relating to personal data and all other legislation and regulatory requirements in force from time to time which apply to a party relating to the use of Personal Data (including, without limitation, the privacy of electronic communications) and the guidance and codes of practice issued by the Information Commissioner or relevant government department in relation to such legislation.

  • Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position:

Time is Money Join Law Insider Premium to draft better contracts faster.