INFORMATION, PASSWORDS AND DATA PROTECTION Sample Clauses

INFORMATION, PASSWORDS AND DATA PROTECTION a. After you have ordered Services from us, in order to access the Services, we may provide you with a user identity (User ID) and/or a unique password. You are responsible for the security and proper use of all User IDs and passwords and must keep them confidential and not disclose them to any third party without first obtaining written authorisation from us.
AutoNDA by SimpleDocs
INFORMATION, PASSWORDS AND DATA PROTECTION. In order to access the Services, we may provide you with a user identity (User ID) and/or a unique password. You are responsible for the security and proper use of all User IDs and passwords and must keep them confidential and not disclose them to any third party. You must inform us immediately if: You suspect that any password in relation to the Services has or may have become known to someone who is not authorised to use it and/or You forget a password. Providing that you satisfy any security checks as may be reasonably required by us, we will issue you with a new password. If we reasonably suspect that there has been or is likely to be a breach of security or a misuse of the Services, we may change your password and we will notify you accordingly. You are required to promptly and accurately give us all the information that we reasonably request so that we can perform our obligations under this Agreement. We may at any time, subject to the relevant legal and statutory provisions, use any information that you have provided to us, together with any other relevant information, for the purposes of administration, credit scoring, consumer services, training, marketing, tracking use of our Services (including processing call usage, billing, viewing and interactive data), profiling your usage and purchasing preferences and providing you with Services. We may disclose your personal information to any group or otherwise connected company of ours and our sub-contractors, agents and partners for the above-mentioned purposes. You have a right to ask in writing for a copy of your information (for which we may charge a small fee for information not accessible through our website) and to require us to correct any inaccuracies. From time to time, we, or a third party acting on our behalf, may contact you by mail, telephone, email or other method with information about our Products and Services (including discounts and special offers). If you do not wish to receive marketing or promotional information from us, you must confirm this to us in writing. We will only discuss your account with you or an authorised user that you have notified us of in writing. We may record or monitor telephone calls to help us to improve our services. You acknowledge that we may co-operate with any court, tribunal, regulatory body, police authority or other Competent Authority in any investigations or proceedings concerning you or your use of the Services. This may include disclosing communica...

Related to INFORMATION, PASSWORDS AND DATA PROTECTION

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Personal Information Protection Each party represents and warrants that procedures compatible with relevant personal information and data protection laws and regulations will be employed so that processing and transfer of such information and data identifiers will not be impeded. d.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Information and Data 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Confidentiality and Data Protection 12.1 Buyer undertakes that it shall not at any time disclose to any person any confidential information concerning (i) the business, affairs, customers, clients or suppliers of Seller or any of its affiliates and (ii) the operations, processes, product information, recipes and formulae, know-how, designs, trade secrets of Seller or any of its affiliates, except as permitted by Condition 12.2 (“Confidential Information”).

  • DATA PROTECTION AND FREEDOM OF INFORMATION 7.1. Each party will:-

  • Other Data Protection Rights You may have the following data protection rights:

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

Time is Money Join Law Insider Premium to draft better contracts faster.