Kept securely Sample Clauses

Kept securely. 8.3 The Council and the Person shall use the Personal Data to provide the Care in accordance with this IPA and the Services Agreement.
AutoNDA by SimpleDocs
Kept securely. 2. The kind of information we hold about you We may collect, store, and use the following categories of personal information about you:  Your name  Initials  Occupation, function  Employer  E-mail address  Address  Date of birth  Signature  ISOPA driver training programme card number and validity period  Test score of driver training programme  Attendance of driver training, date and locationOther data you shared with us
Kept securely. 8.3 The Commissioner and the Person shall use the Personal Data to provide the Care in accordance with this IPA and the Services Agreement.

Related to Kept securely

  • RECYCLED BOND PAPER Consistent with the Board of Supervisors’ policy to reduce the amount of solid waste deposited at the County landfills, the Contractor agrees to use recycled-content paper to the maximum extent possible on this Contract.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • Mobile Deposit Security You will complete each deposit promptly. If you are unable to complete your deposit promptly, you will ensure that your mobile device remains securely in your possession until the deposit has been completed. It is your responsibility to establish and maintain procedures to safeguard against unauthorized deposits. You will notify us immediately by telephone with written confirmation if you learn of any loss or theft of original checks. You will ensure the safety and integrity of original checks from the time of receipt until the time of destruction. If warranted in our reasonable judgment, we may audit and monitor you, and you agree to cooperate with us to permit such monitoring, to confirm that you have satisfied your obligations under this Agreement.

  • Recipient Obligations 2.1 The Recipient agrees to support the Project in accordance with this Agreement.

  • Recycled Paper 23.1 The Contractor shall ensure that all paper used in the production of reports, documents and other materials arising out of the performance by the Contractor of their duties under this Contract consists of a minimum of sixty-per-cent recycled content of which seventy-five per cent is post-consumer waste.

  • Client Obligations 3.1 The Client shall:

  • MANAGEMENT SECURITY Section 1. The Federation hereby accepts liability for any damage to or loss of state property that is the proximate cause of action by striking employees of this bargaining unit, provided however, that liability under this section shall be restricted to include any alleged loss of revenue or other incidental or punitive damage sought by the Employer.

  • Accessing the Website and Account Security We reserve the right to withdraw or amend this Website and any service or material we provide on the Website in our sole discretion without notice. We will not be liable if for any reason all or any part of the Website is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the Website, or the entire Website, to users, including registered users. To access the Website or some of the resources it offers, you may be asked to provide certain registration details or other information. It is a condition of your use of the Website and any resources downloaded from the Website that all the information you provide on the Website is correct, current, and complete. You agree that all information you provide to register with this Website or otherwise, including but not limited to through the use of any interactive features on the Website, is governed by our Privacy Policy, and you consent to all actions we take with respect to your information consistent with our Privacy Policy. If you choose, or are provided with, a user name, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any other person or entity. You also acknowledge that your account is personal to you and agree not to provide any other person with access to this Website or portions of it using your user name, password or other security information. You agree to notify us immediately of any unauthorized access to or use of your user name or password or any other breach of security. You also agree to ensure that you exit from your account at the end of each session. You should use particular caution when accessing your account from a public or shared computer so that others are not able to view or record your password or other personal information. We have the right to disable any user name, password or other identifier, whether chosen by you or provided by us, at any time in our sole discretion for any or no reason, including if, in our opinion, you have violated any provision of these Terms of Use.

  • Account Security User agrees and acknowledges that to the extent applicable, it will: (i) maintain strict confidentiality of all names, passwords, or other credentials of User’s Authorized End Users; (ii) instructing its Authorized End Users not to allow others to obtain or use their credentials or to access the Software. User is responsible for any costs or damages incurred due to unauthorized use or access through User’s Authorized End Users’ account credentials or systems.

  • Subprocessor Security Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!