Personal Identifiable Information Sample Clauses

Personal Identifiable Information. Unless otherwise set forth in the applicable CribMaster Order Form, you represent and warrant to CribMaster that the Products or Software contemplated hereunder do not in any way involve CribMaster’s handling of, access or exposure to information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual (“PII”). In the event that the Products or Software will involve PII in any way, you shall provide CribMaster with fifteen (15) days’ prior written notice. If PII is provided to CribMaster, CribMaster will deal with such PII in accordance with CribMaster’s then effective Written Information Security Program and Privacy Policy and in compliance with applicable law and regulations. CribMaster will maintain commercially reasonable physical, technical, and administrative safe guards designed to protect PII in its possession or control from unauthorized use, control, access, interruption, modification, or corruption. CribMaster will produce, correct, or delete any PII at your request and will dispose of all PII when and as appropriate, in each case at your sole cost and expense. CribMaster will take appropriate actions to address incidents of unauthorized access to PII, including notifying CribMaster as soon as possible following any such incident. In the event of an incident of unauthorized access, CribMaster will allow you to determine whether any reports are required to be made or notices given (to public officials, data subjects, or any other person) and CribMaster will assist you with filing any such reports and giving any such notices.
AutoNDA by SimpleDocs
Personal Identifiable Information. The Personal Identifiable Information is requested to process the results of the Contest (for example, identifying entries, etc.), declare and inform the winners of the Contest. Save and except for the Winners of the Contest, Personal Identifiable Information is not retained by SPN and its agencies under any circumstances and is deleted from all of our records within forty five (45) days of completion of the Contest, declaration and disbursement of gratification of the Contest. It is clarified that SPN does not use the Personal Identifiable Information for any purpose except for processing the results of the Contest, declare and inform the Winners of the Contest.
Personal Identifiable Information. Section 4.16(j) of the Disclosure Schedule identifies all categories of Personally Identifiable Information collected, stored, used, transferred, transmitted, or processed by any of the Group Companies or any Company Product from end users or customers of the Company Products or any other Persons (other than Personally Identifiable Information from Contributors). Each Group Company has not disclosed, licensed, sold or otherwise provided Personally Identifiable Information to any other Person in a manner that violates in any material respect any of such Group Company’s applicable privacy policies. Each Group Company has complied, in all material respects, with all applicable Laws, contractual obligations, and such Group Company’s applicable privacy policies, rules and procedures relating to their collection, storage, use, transfer, transmission, and processing of any Personally Identifiable Information. To the Knowledge of Warrantors, other Persons having authorized access to Personally Identifiable Information maintained on behalf of the Group Companies have collected, stored, used, transferred, transmitted, and processed such information in accordance with applicable Law. Copies of all current and prior privacy policies of the Group Companies that apply to the Business have been provided to Purchaser.
Personal Identifiable Information. The Contractor agrees to be bound by the confidentiality provisions regarding Personal Identifiable Information (PII) as set forth in the Subrecipient Agreement between PRDOH and FPR, and thus shall take reasonable measures to safeguard protected personal identifiable information, as defined in 2 CFR 200.82, and other information FPR, PRDOH or HUD designates as sensitive, consistent with applicable federal, state, and local laws regarding privacy and obligations of confidentiality.
Personal Identifiable Information. Notwithstanding anything to the contrary in Section 8, (a) Consultant will not disclose to any third party nor use any protected health information, personal identifiable data, or Exhibit 10.1 biological samples of subjects enrolled in clinical studies that are the subject of services, or any other information that could be used to identify an individual (collectively, “Personal Data”) except as expressly required in the Agreement and as long as such disclosure and use is in compliance with applicable law; and (b) such restrictions on the disclosure and use of Personal Data will remain in place for as long as such restrictions are required under applicable law. Deciphera’s use and disclosure of Personal Data will be in accordance with applicable Laws and regulations and the relevant consent documents.
Personal Identifiable Information. Unless otherwise set forth in the applicable CribMaster Order Form, Customer represents and warrants to CribMaster that the Products and/or Services contemplated hereunder do not in any way involve CribMaster’s handling of, access or exposure to information that can be used to distinguish or trace an individual's identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual (“PII”). In the event that the Products and/or Services or Deliverables involve PII in any way, Customer shall provide CribMaster with fifteen (15) days’ prior written notice. Pursuant to Exhibit D to this Agreement, the parties will then decide if Standard Contractual Clauses or other documentation is necessary under relevant privacy laws. Any such required documentation shall be in effect prior to CribMaster’s receipt of PII. The terms of Exhibit D shall apply to any PII received by CribMaster.
Personal Identifiable Information. If the University provides the Contractor with personal identifiers as listed in N.C.G.S. §132-1.10 and in N.C.G.S. §14- 133.20(b) or any other legally confidential information including “personally identifiable information” from student education records as defined by the Family Educational Rights and Privacy Act (FERPA), 34 CFR §99.3, Contractor hereby certifies that collection of this information from University is necessary for the performance of Contractor’s duties and responsibilities on behalf of the University under this Contract. Contractor further certifies that it shall maintain the confidential and exempt status of any social security number information, as required by N.C.G.S. §132-1.10(c)(1), and that it shall not redisclose personally identifiable information as directed by FERPA, 34 CFR §99.33, or by other State and Federal laws. Failure to abide by legally applicable security measures and disclosure restrictions may result in the interruption, suspension and/or termination of the relationship with Contractor for a period of at least five (5) years from date of violation. If Contractor experiences a security breach, as defined in N.C.G.S. §75.61(14), relating to this information, in addition to the Contractor’s responsibilities under the NC Identity Theft Protection Act, Contractor shall immediately notify the University with the information listed in N.C.G.S. §75-65(d)(1-4) and shall fully cooperate with the University. Contractor shall indemnify University for any breach of confidentiality or failure of its responsibilities to protect confidential information. Specifically, with regard to, but not limited to, the cost of notification of affected persons as a result of its accidental or negligent release of university data provided to Contractor pursuant to the Contract.
AutoNDA by SimpleDocs
Personal Identifiable Information. Personal identifiable information (PII) is information that can identify you, such as your name, email address, address, and telephone number. When you provide this information to access My LSPI, you are no longer anonymous for that activity. LSPI is committed to protect personally identifiable information that you provide through My LSPI. LSPI does not intend to sell or otherwise disseminate your personal identifiable information to third parties. LSPI uses reasonable precautions to protect personal identifiable information, including technical, administrative, and physical procedures.
Personal Identifiable Information. Which of the following requirements are implemented concerning sensitive information? ☐ No sensitive data is shared with third parties unless it is a necessary MEDIUM Mobile-ASVS-02.03.0 part of the architecture. ☐ The keyboard cache is disabled on text inputs that process sensitive MEDIUM Mobile-ASVS-02.04.0 data. ☐ The clipboard is deactivated on text fields that may contain sensitive MEDIUM Mobile-ASVS-02.05.0 data. ☐ No sensitive data is exposed via IPC mechanisms. MEDIUM Mobile-ASVS-02.06.0 ☐ No sensitive data, such as passwords or pins, is exposed through the user interface. ☐ No sensitive data is included in backups generated by the mobile operating system. MEDIUM Mobile-ASVS-02.07.0 HIGH Mobile-ASVS-02.08.0 ☐ The app removes sensitive data from views when backgrounded. HIGH Mobile-ASVS-02.09.0 ☐ The app doesn't rely on a single insecure communication channel (email or SMS) for critical operations, such as enrollments and account HIGH Mobile-ASVS-05.05.0 recover ☐ The app educates the user about the types of personally identifiable information processed, as well as security best practices the user should follow in using the app. ☐ System credential storage facilities are used appropriately to store sensitive data, such as user credentials or cryptographic keys. HIGH Mobile-ASVS-02.12.0 MEDIUM Mobile-ASVS-02.01.0 ☐ No sensitive data is written to application logs. MEDIUM Mobile-ASVS-02.02.0 ☐ The app does not hold sensitive data in memory longer than necessary, and memory is cleared explicitly after use. ☐ Data is encrypted on the network using TLS. The secure channel is used consistently throughout the app. ☐ The TLS settings are in line with current best practices, or as close as possible if the mobile operating system does not support the recommended standards. ☐ The app verifies the X.509 certificate of the remote endpoint when HIGH Mobile-ASVS-02.10.0 MEDIUM Mobile-ASVS-05.01.0 MEDIUM Mobile-ASVS-05.02.0 the secure channel is established. Only certificates signed by a trusted MEDIUM Mobile-ASVS-05.03.0 CA are accepted. ☐ The app either uses its own certificate store, or pins the endpoint certificate or public key, and subsequently does not establish connections with endpoints that offer a different certificate or key, even if signed by a trusted CA. HIGH Mobile-ASVS-05.04.0
Personal Identifiable Information. Except as otherwise set forth under this Agreement, including with respect to Third Party Services, iCreate does not share any personal identifiable information contained in Your Data with any third party. You are solely responsible for the management of Your Data, and to comply with all applicable laws and regulations, including to comply with any request by a data subject as required by applicable law. You may not include sensitive information in Your Data.. Company disclaims any and all liability for Your disclosure of personal identifiable information You submit through the Services.
Time is Money Join Law Insider Premium to draft better contracts faster.