Incident Management and Personal Information Breach Notification Sample Clauses

Incident Management and Personal Information Breach Notification. 10.1 Oracle promptly evaluates and responds to incidents that create suspicion of or indicate unauthorized access to or Processing of Personal Information (“Incident”).
AutoNDA by SimpleDocs
Incident Management and Personal Information Breach Notification. 11.1 Oracle promptly evaluates and responds to incidents that create suspicion of or indicate unauthorized access to or Processing of Personal Information (“Incident”).
Incident Management and Personal Information Breach Notification. 10.1 Alwajeez Tech promptly evaluates and responds to incidents that create suspicion of or indicate unauthorized access to or Processing of Personal Information (“Incident”).

Related to Incident Management and Personal Information Breach Notification

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Processing of Personal Information We treat your personal information confidentially and in accordance with applicable legislation. When you purchase insurance from us, we gather information in connection with enrolment, filing a claim and use of our digital platforms, e.g. civil registration number, telephone number, e-mail address, membership of Sygeforsikringen ”danmark”, industry, employment, marital status and any health information. This information is used to create and administer the insurance policy for use in case of a claim and in the ongoing case processing to ensure the best possible service and as part of sales management, product development, quality assurance, advice and determination of general user behaviour. We retain the gathered information for as long as neces- sary and in accordance with the applicable legislation. You can always contact us if you want to know which personal information we have registered about you. You are entitled to change incorrect information. On our website, xx-xxxxxxx.xx, you can read more about data security and how we handle your personal information. In some cases, we pass personal information about you to the suppliers with whom we cooperate.

  • Privacy and Personal Information (a) This clause 14 applies where this agreement amounts to a “service arrangement” under the Information Privacy Act 2009 (Qld).

  • Collection of Personal Information 10.1 The Subscriber acknowledges and consents to the fact that the Company is collecting the Subscriber's personal information for the purpose of fulfilling this Subscription Agreement and completing the Offering. The Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) may be disclosed by the Company to (a) stock exchanges or securities regulatory authorities, (b) the Company's registrar and transfer agent, (c) Canadian tax authorities, (d) authorities pursuant to the Proceeds of Crime (Money Laundering) and Terrorist Financing Act (Canada) and (e) any of the other parties involved in the Offering, including legal counsel, and may be included in record books in connection with the Offering. By executing this Subscription Agreement, the Subscriber is deemed to be consenting to the foregoing collection, use and disclosure of the Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) and to the retention of such personal information for as long as permitted or required by law or business practice. Notwithstanding that the Subscriber may be purchasing Shares as agent on behalf of an undisclosed principal, the Subscriber agrees to provide, on request, particulars as to the identity of such undisclosed principal as may be required by the Company in order to comply with the foregoing.

  • Handling of Personal Information The Organiser may use the personal information of individuals from exhibition related parties for any communications necessary for the holding of the Exhibition. In addition, the Organiser may send electronic mails or other advertising materials to exhibition related parties for promoting the Exhibition or other exhibitions to be organised by the Organiser. Exhibition related parties give their consent to the Organiser to provide their personal information to its designated partner company or a trade publication that gathers or features information related to the Exhibition whenever the Organiser deems such a provision necessary. Governing Law and Jurisdiction The Exhibition Rules and Regulations shall be governed by and construed in accordance with the laws of Japan. The Tokyo District Court shall have the exclusive jurisdiction over any dispute arising in connection with the Exhibition Rules and Regulations as the court of the first instance. Xxxx Exhibitions Japan Ltd. 18F Shinjuku-Nomura Bldg., 1-26-2 Nishishinjuku, Shinjuku-ku, Tokyo 000-0000, Japan TEL: +00-0-0000-0000 FAX: +00-0-0000-0000 A division of Xxxx Business Registered in England, Number 678540 AUTHORISED SIGNATURE

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Security Breach Notifications Notice must be given by the Subrecipient to anyone whose PSCI could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.

  • Personal Information Protection Each party represents and warrants that procedures compatible with relevant personal information and data protection laws and regulations will be employed so that processing and transfer of such information and data identifiers will not be impeded. d.

Time is Money Join Law Insider Premium to draft better contracts faster.