Personal Data Protection Practices Sample Clauses

Personal Data Protection Practices. The information security practices used with respect to all Private Information maintained at any time by or on behalf of the Company or the Subsidiaries conform, and at all times have conformed in all material respects with, applicable Legal Requirements.
AutoNDA by SimpleDocs
Personal Data Protection Practices. The information security practices used with respect to all Personal Data maintained by or, to the Knowledge of Holdings, on behalf of, the Company conform in all material respects to all applicable Privacy and Security Policies and Privacy Laws. The Company has used commercially reasonable efforts consistent with Applicable Law and Applicable Requirements relating to privacy, and consistent with its own Privacy and Security Policies, to store and secure all Personal Data, which are designed to protect against unauthorized access to and use of the Personal Data. The Company contractually requires all third parties providing services to it who have access to or receive Personal Data from the Company to use commercially reasonable efforts, consistent with Applicable Law, to store and secure all Personal Data to protect against unauthorized access to and use of such Personal Data. Except as set forth on Schedule 3.3(aa) of the Disclosure Schedule, to the Knowledge of Holdings, there has been no unauthorized or illegal use, processing, or disclosure of or access to, any Personal Data stored or secured by or for the Company, including with respect to any of its databases. Except as set forth on Schedule 3.3(aa) of the Disclosure Schedule, to the Knowledge of Holdings, there have been no material breaches of the Company’s security procedures or any material attempted or successful unauthorized incidents of access, use, disclosure, modification or destruction of information or interference with systems operations in all or any portion of its IT systems, including any such breach or incident that requires notice to any Person.
Personal Data Protection Practices. Section 2.2(w)(ii) of the Disclosure Schedule sets out a copy or summary of the Company’s Privacy and Security Policies, including (without limitation) all the forms of consent (including a description of how such consent is obtained) used by Company in respect of the collection, use or disclosure of Personal Data. The information security practices used with respect to all Personal Data maintained by or on behalf of the Company conform, and at all times have conformed, to all Privacy and Security Policies and Privacy Laws. The Company has used commercially reasonable efforts consistent with standard industry practices, applicable Law, self-governing rules and policies relating to privacy and its own Privacy and Security Policies to store and secure all Personal Data to protect against unauthorized access to or use of the Personal Data. To the knowledge of the Company and/or Shareholder, there has been no unauthorized or illegal use, processing, or disclosure of or access to, any Personal Data stored or secured by or for the Company, including with respect to any of its databases. The Company maintains reasonable administrative, physical and technical security controls for its computer systems in an effort to safeguard such systems against the risk of business disruption arising from attacks (including virus, trojan horse, worm and denial-of-service attacks), unauthorized activities of any employee or contractor of the Company, hackers or any other Person. To the knowledge of the Company and/or Shareholder, there have been no material breaches of the Company’s security procedures or any material attempted or successful unauthorized incidents of access, use, disclosure, modification or destruction of information or interference with systems operations in all or any portion of its computer systems, including any such breach or incident that requires notice to any Person.
Personal Data Protection Practices. Section 2.15(q) of the Disclosure Schedule sets out (i) a copy of all the forms of consent used by the Company or any Subsidiary in respect of the collection, use or disclosure of Personal Data, (ii) a description of the complaints process, and a list of all complaints or Claims received by the Company or any Subsidiary in respect of the Personal Data collected, used or disclosed by the Company or any Subsidiary, (iii) a description of the access and security safeguards in place in respect of the Personal Data, including computer security, password protection and physical security, employee training programs with respect to compliance with Privacy Legal Requirement and Personal Data retention and disposal programs, and (iv) a list of the individuals who were designated as responsible for overseeing the Company’s Privacy Policies and compliance with Privacy Legal Requirement.
Personal Data Protection Practices. DERMAdoctor has made available: (i) a description of the complaints process, and an accurate and complete list of all written complaints or claims received by DERMAdoctor or any other Person in respect of the Personal Data collected, used or disclosed by DERMAdoctor or such other Person (in each case, to the extent relating to activities by or for DERMAdoctor); (ii) a description of the access and security safeguards in place in respect of the Personal Data maintained by or for DERMAdoctor, including computer security, password protection and physical security and employee training programs with respect to compliance with Privacy Legal Requirements and Personal Data retention and disposal programs; (iii) a description of the process, protocols and/or technologies used to comply with Do Not Track signals, with consumer opt-outs related to self-regulatory programs, and with other consumer preferences; (iv) a description of the process used to ensure the anonymization, privacy and deletion of Personal Data; (v) a description of the identifiers and other information stored in HTTP cookies and HTML5 local storage; and (vi) an accurate and complete list of the individuals currently designated as responsible for overseeing DERMAdoctor Privacy Policies and ensuring compliance with Privacy Legal Requirements. During the past three (3) years, DERMAdoctor has at all times made all disclosures to, and obtained any necessary consents from users, consumers, customers, employees, contractors, and other applicable Persons required by Privacy Legal Requirements and has filed required registrations with the applicable data protection authority. To the Knowledge of DERMAdoctor, neither DERMAdoctor nor any Person performing services for DERMAdoctor, has attempted to reverse engineer Personal Data in a manner intended to reidentify anonymized data.
Personal Data Protection Practices. (i) The Group Companies have maintained appropriate safeguards to protect Personal Data in accordance with Privacy Legal Requirements. The Group Companies have at all times made all disclosures to, and obtained any necessary consents (unless the Company relies on an alternative legal ground) from, customers, employees, contractors, and other applicable Persons required by Privacy Legal Requirements and has filed any required registrations with the applicable data protection authority.

Related to Personal Data Protection Practices

  • Certain Practices 13 SECTION 2.12

  • Origination Practices The origination practices used by the Seller and the collection and servicing practices used by the Servicer with respect to each Mortgage Loan have been in all respects legal and customary in the mortgage origination and servicing industry and the collection and servicing practices used by the Servicer have been consistent with Customary Servicing Procedures.

  • Collection Practices The collection practices used by the Servicer with respect to each Mortgage Note and Mortgage have been in all respects legal, proper and prudent in the mortgage servicing business;

  • Data Protection The Administrator shall implement and maintain a comprehensive written information security program that contains appropriate security measures to safeguard the personal information of the Trust’s shareholders, employees, directors and/or officers that the Administrator receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Credit Reporting; Gramm-Leach-Bliley Act (a) With respect to each Mortgage Loan, each Sexxxxxx xxxxxx xx xully furnish, in accordance with the Fair Credit Reporting Act and its implementing regulations, accurate and complete information (e.g., favorable and unfavorable) on its borrower credit files to Equifax, Experian and TransUnion Credit Information Company (three of the credit repositories), on a monthly basis.

  • Credit Reporting For each Mortgage Loan, the Company shall accurately and fully furnish, in accordance with the Fair Credit Reporting Act and its implementing regulations, accurate and complete information on its borrower credit files to each of the following credit repositories: Equifax Credit Information Services, Inc., TransUnion, LLC and Experian Information Solution, Inc. on a monthly basis.

  • Employment Practices Except as set forth on SCHEDULE 4.22 hereto, neither the Company nor any of its Subsidiaries are a party to or in the process of negotiating any collective bargaining or labor agreement or union contract. Except as set forth on Schedule 4.22, there is no (i) charge, complaint or suit pending or, to the knowledge of the Company, threatened against the Company or any of its Subsidiaries respecting employment, hiring for employment, terminating from employment, employment practices, employment discrimination, sexual harassment or other forms of discriminatory harassment terms and conditions of employment, safety, wrongful termination, or wages and hours, (ii) unfair labor practice charge or complaint pending or, to the knowledge of the Company, threatened against, or decision or order in effect and binding on, the Company or any of its Subsidiaries before or of the National Labor Relations Board, (iii) grievance or arbitration proceeding arising out of or under collective bargaining agreements pending or, to the knowledge of the Company, threatened against the Company or any of its Subsidiaries, (iv) strike, labor dispute, slow-down, work stoppage or other interference with work pending or, to the knowledge of the Company, threatened against the Company or any of its Subsidiaries, or (v) to the knowledge of the Company, union organizing activities or union representation question threatened or existing with respect to any groups of employees of the Company or any of its Subsidiaries.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Time is Money Join Law Insider Premium to draft better contracts faster.