Personal Identifiers Sample Clauses

Personal Identifiers. If NC STATE provides the Craft Instructor with personal identifiers as listed in N.C.G.S. §132-1.10 and in N.C.G.S. §14-113.20(b) or any other legally confidential information, Craft Instructor hereby certifies that collection of this information from NC STATE is necessary for the performance of Craft Instructor’s duties and responsibilities on behalf of NC STATE under this Contract. Craft Instructor further certifies that it shall maintain the confidential and exempt status of any social security number information, as required by N.C.G.S. §132-1.10(c)(1), and that it shall not re-disclose personally identifiable information as directed by State and Federal laws. Failure to abide by legally applicable security measures and disclosure restrictions may result in the interruption, suspension and/or termination of the relationship with Craft Instructor for a period of at least five (5) years from date of violation. If Craft Instructor experiences a security breach, as defined in N.C.G.S. §75.61(14), relating to this information, in addition to the Craft Instructor’s responsibilities under the NC Identity Theft Protection Act, Craft Instructor shall immediately notify NC STATE with the information listed in N.C.G.S. §75-65(d)(1-4) and shall fully cooperate with NC STATE. Craft Instructor shall indemnify NC STATE for any breach of confidentiality or failure of its responsibilities to protect confidential information. Specifically, these costs may include, but are not limited to, the cost of notification of affected persons as a result of its unauthorized release of NC STATE data provided to Craft Instructor pursuant to the Contract.
AutoNDA by SimpleDocs
Personal Identifiers. 1) The Researcher shall remove personal identifiers from the Health Information and replace them with a study code to protect the confidentiality of the Study Participant. 2) The Researcher will ensure that the master list linking the study code to the Study Participant is: a) Securely retained in a location separate from the de-identified study materials or database e.g. locked file cabinet, encrypted computer, secure network computer drive; and b) Only accessible to the Research Associates. 3) The Researcher shall keep and/or securely transmit master lists linking personal identifiers of the Study Participant to study codes separately from the database or paper records containing de-identified information. 4) The Researcher shall use the AHS Non-Identifiable Health Information Standard to help determine if the information is potentially identifiable. Data Matching If AHS or the Researcher are required to data match for research purposes, the following conditions apply: 1) AHS or the Researcher shall data match the information from the sources in Schedule “A” in accordance with the REB approval letter. 2) AHS shall provide information in accordance with the following privacy principles: least amount of information, highest degree of anonymity and on a need-to-know basis.
Personal Identifiers. Mother’s First Name Mother’s Last Name Mother’s Date of Birth Mother’s SSN Mother’s Address Mother’s Zip Code Mother’s Phone number Step 6: Review LinkPlus Matched data: Accept as true match if A: Matched by SSN and DOB plus 3 more Identifier B: Matched by SSN, DOB, Address and Zip Code C: Matched by SSN or DOB and 3 other identifiers D: Matched by SSN and 2 other identifiers and match score is over 25 E: Matched by XXX and 2 other identifiers with match score over 30 D: All remaining should be reviewed at individual level to determine true match Step 7: Combining Results of Both Matching Processes and get Case number: Get the final list of VS/Enrollment linked moms by combine matched files from Step 2 and Step 6. Once list of linked moms identified get all Case Numbers associated with each mom.
Personal Identifiers. Personal identifiers are a means through which Company provides and invoices you for Service, and they include telephone numbers, e-mail addresses and other personal identifiers which are assigned to you by Company at Company's discretion. It is not Company's policy to change arbitrarily personal identifiers; however, Company may be required by a governmental authority, regulation, or otherwise to change or transfer personal identifiers, which do not belong to you and are not considered to be your property. (For example, in the case of an area code split, a state utility commission may require that Company change your area code.) Company may change personal identifiers upon reasonable notice to you, including notice of any associated transfer charges or fees.
Personal Identifiers. Examples of Data Collected Name, address, email address, telephone number, identifiers assigned to you for our internal use, signature, publically available images Why Do We Collect This Data? Account opening, communicating with you, providing products and services to you, carrying out operational and administrative functions, marketing, meeting our regulatory and compliance obligations and preventing financial crime Where Do We Collect Data From? You, your authorized representatives and agents, internally generated information, third party vendors that provide information to assist with marketing, meeting our regulatory and compliance obligations and preventing financial crime Who Do We Share Data With GS affiliates, non-affiliated companies that perform support services for your account or process your transactions with us or our affiliates, vendors who assist with preventing financial crime, GS lawyers, auditors, accountants and others providing professional advice, regulators and law enforcement authorities, your authorized agents and representatives to whom you instruct or authorize us to disclose your data, any person or entity to whom GS is obliged by applicable law to disclose your data and any other party where we have first obtained your prior consent Category: Device and Online Identifiers and Related Information Examples of Data Collected Internet Protocol (“IP”) address, account user name / log-in, device information, device type Why Do We Collect This Data Providing products and services to you, communicating with you, carrying out operational and administrative functions, identifying products that may be of interest to you, helping us improve our products, services and operations, preventing financial crime Where Do We Collect Data From? You, your device, data we collect by placing a cookie on your browser or application
Personal Identifiers. 1. The Researcher shall remove personal identifiers from the Health Information and replace them with a study code to protect the confidentiality of the Study Participant. 2. The Researcher will ensure that the master list linking the study code to the Study Participant is: a. Securely retained in a location separate from the de-identified study materials or database e.g. locked file cabinet, encrypted computer, secure network computer drive; and b. Only accessible to the Research Associates. 3. The Researcher shall keep and/or securely transmit master lists linking personal identifiers of the Study Participant to study codes separately from the database or paper records containing de-identified information. 4. The Researcher shall use the AHS Non-Identifiable Health Information Standard to help determine if the information is potentially identifiable. Data Matching If AHS or the Researcher are required to data match for research purposes, the following
Personal Identifiers. The System will provide the capability to search, collect, update and display ethnicity, national origin, religion, known SRG affiliation, scars, tattoos, body marking descriptions, primary language, place of birth and date of birth and note if the offender is one from a multiple birth.
AutoNDA by SimpleDocs
Personal Identifiers. The System will allow the designated CTDOC staff to search the offender database using a variety of search fields, including but not limited to, offender ID, name, alias, FBI numbers, Social Security Number, date of birth, driver’s license number.

Related to Personal Identifiers

  • Indirect Identifiers Any information that, either alone or in aggregate, would allow a reasonable person to be able to identify a student to a reasonable certainty Information in the Student’s Educational Record Information in the Student’s Email Provider: For purposes of the DPA, the term “Provider” means provider of digital educational software or services, including cloud-based services, for the digital storage, management, and retrieval of pupil records.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Personal Information 23.1 Subject to any applicable laws, the Licensee authorises XXXXX to:

  • Personal Items In accordance with Departmental policy, employees will be reimbursed for personal items required on the job that are lost, damaged or destroyed in the line of duty. Reimbursement will be up to an amount of $100 per occurrence, excluding prescription eyewear.

  • Customer Identification Program (A) To assist the Fund in complying with requirements regarding a customer identification program in accordance with applicable regulations promulgated by U.S. Department of Treasury under Section 326 of the USA PATRIOT Act (“CIP Regulations”), BNYM will do the following:

  • Personal Identification Number We will issue you a Personal Identification Number (PIN) for use with your Card at VISA NET automatic teller machines (ATM’s). These numbers are issued to you for your security purposes. These numbers are confidential and should not e disclosed to third parties. You are responsible for safekeeping your PIN. You agree not to disclose or otherwise make available your PIN to anyone not authorized to sign on your Accounts. To keep your Account secure, please do not write your PIN on your Card or keep it in the same place as your Card.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Privacy and Personal Information The American Express Privacy Policy Statement sets out policies on management of personal information. In accordance with the Privacy Act, you can access personal information about you held by us, and advise if you think it is inaccurate, incomplete or out-of-date. To arrange access to personal information about you, request a copy of the American Express Privacy Policy Statement or enquire generally about privacy matters, write to – The Privacy Officer, American Express Australia Limited, GPO Box 1582, Sydney NSW 2001. In this section ‘personal information’ means information about you, including your financial circumstances and the use and administration of the program. You agree that, subject to the Privacy Act, we and our agents may do the following:

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

Time is Money Join Law Insider Premium to draft better contracts faster.