Personal Identifiers Sample Clauses

Personal Identifiers. If NC STATE provides the Craft Instructor with personal identifiers as listed in N.C.G.S. §132-1.10 and in N.C.G.S. §14-113.20(b) or any other legally confidential information, Craft Instructor hereby certifies that collection of this information from NC STATE is necessary for the performance of Craft Instructor’s duties and responsibilities on behalf of NC STATE under this Contract. Craft Instructor further certifies that it shall maintain the confidential and exempt status of any social security number information, as required by N.C.G.S. §132-1.10(c)(1), and that it shall not re-disclose personally identifiable information as directed by State and Federal laws. Failure to abide by legally applicable security measures and disclosure restrictions may result in the interruption, suspension and/or termination of the relationship with Craft Instructor for a period of at least five (5) years from date of violation. If Craft Instructor experiences a security breach, as defined in N.C.G.S. §75.61(14), relating to this information, in addition to the Craft Instructor’s responsibilities under the NC Identity Theft Protection Act, Craft Instructor shall immediately notify NC STATE with the information listed in N.C.G.S. §75-65(d)(1-4) and shall fully cooperate with NC STATE. Craft Instructor shall indemnify NC STATE for any breach of confidentiality or failure of its responsibilities to protect confidential information. Specifically, these costs may include, but are not limited to, the cost of notification of affected persons as a result of its unauthorized release of NC STATE data provided to Craft Instructor pursuant to the Contract.
Personal Identifiers. Examples of Data Collected Name, address, email address, telephone number, identifiers assigned to you for our internal use, signature, publically available images Why Do We Collect This Data? Account opening, communicating with you, providing products and services to you, carrying out operational and administrative functions, marketing, meeting our regulatory and compliance obligations and preventing financial crime Where Do We Collect Data From? You, your authorized representatives and agents, internally generated information, third party vendors that provide information to assist with marketing, meeting our regulatory and compliance obligations and preventing financial crime Who Do We Share Data With GS affiliates, non-affiliated companies that perform support services for your account or process your transactions with us or our affiliates, vendors who assist with preventing financial crime, GS lawyers, auditors, accountants and others providing professional advice, regulators and law enforcement authorities, your authorized agents and representatives to whom you instruct or authorize us to disclose your data, any person or entity to whom GS is obliged by applicable law to disclose your data and any other party where we have first obtained your prior consent Category: Device and Online Identifiers and Related Information Examples of Data Collected Internet Protocol (“IP”) address, account user name / log-in, device information, device type Why Do We Collect This Data Providing products and services to you, communicating with you, carrying out operational and administrative functions, identifying products that may be of interest to you, helping us improve our products, services and operations, preventing financial crime Where Do We Collect Data From? You, your device, data we collect by placing a cookie on your browser or application
Personal Identifiers. The System will allow the designated CTDOC staff to search the offender database using a variety of search fields, including but not limited to, offender ID, name, alias, FBI numbers, Social Security Number, date of birth, driver’s license number.
Personal Identifiers. Personal identifiers are a means through which Company provides and invoices you for Service, and they include telephone numbers, e-mail addresses and other personal identifiers which are assigned to you by Company at Company's discretion. It is not Company's policy to change arbitrarily personal identifiers; however, Company may be required by a governmental authority, regulation, or otherwise to change or transfer personal identifiers, which do not belong to you and are not considered to be your property. (For example, in the case of an area code split, a state utility commission may require that Company change your area code.) Company may change personal identifiers upon reasonable notice to you, including notice of any associated transfer charges or fees.
Personal Identifiers. 1. The Researcher shall remove personal identifiers from the Health Information and replace them with a study code to protect the confidentiality of the Study Participant. 2. The Researcher will ensure that the master list linking the study code to the Study Participant is: a. Securely retained in a location separate from the de-identified study materials or database e.g. locked file cabinet, encrypted computer, secure network computer drive; and b. Only accessible to the Research Associates. 3. The Researcher shall keep and/or securely transmit master lists linking personal identifiers of the Study Participant to study codes separately from the database or paper records containing de-identified information. 4. The Researcher shall use the AHS Non-Identifiable Health Information Standard to help determine if the information is potentially identifiable. Data Matching If AHS or the Researcher are required to data match for research purposes, the following

Related to Personal Identifiers

  • Indirect Identifiers Any information that, either alone or in aggregate, would allow a reasonable person to be able to identify a student to a reasonable certainty Information in the Student’s Educational Record Information in the Student’s Email Provider: For purposes of the DPA, the term “Provider” means provider of digital educational software or services, including cloud-based services, for the digital storage, management, and retrieval of pupil records.

  • Personal Information Each party shall comply with their respective obligations under applicable data protection legislation. HPE does not intend to have access to personally identifiable information (“PII”) of Customer in providing services. To the extent HPE has access to Customer PII stored on a system or device of Customer, such access will likely be incidental and Customer will remain the data controller of Customer PII at all times. HPE will use any PII to which it has access strictly for purposes of delivering the services ordered.

  • Personal Items In accordance with Departmental policy, employees will be reimbursed for personal items required on the job that are lost, damaged or destroyed in the line of duty. Reimbursement will be up to an amount of $100 per occurrence, excluding prescription eyewear.

  • Customer Identification Program (A) To assist the Fund in complying with requirements regarding a customer identification program in accordance with applicable regulations promulgated by U.S. Department of Treasury under Section 326 of the USA PATRIOT Act (“CIP Regulations”), BNYM will do the following:

  • Personal Identification Number We will issue you a Personal Identification Number (PIN) for use with your Card at VISA NET automatic teller machines (ATM’s). These numbers are issued to you for your security purposes. These numbers are confidential and should not e disclosed to third parties. You are responsible for safekeeping your PIN. You agree not to disclose or otherwise make available your PIN to anyone not authorized to sign on your Accounts. To keep your Account secure, please do not write your PIN on your Card or keep it in the same place as your Card.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Consistent with this requirement, PFPC Trust may request (or may have already requested) the Fund's name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party's date of birth. PFPC Trust may also ask (and may have already asked) for additional identifying information, and PFPC Trust may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Personally Identifiable Information (PII); Security a. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee must provide for the security of such PII, in a form acceptable to Florida Housing, without limitation, non-disclosure, use of appropriate technology, security practices, computer access security, data access security, data storage encryption, data transmission encryption, security inspections and audits. Grantee shall take full responsibility for the security of all data in its possession or in the possession of its subcontractors and shall hold Florida Housing harmless for any damages or liabilities resulting from the unauthorized disclosure of loss thereof.

  • Personal Illness Employees may use accumulated sick leave for hours off due to personal illness. The employee may be required to furnish a medical certificate from a qualified physician as evidence of illness or physical disability in order to qualify for paid sick leave as per District practice. Accumulated sick leave may also be granted for such time as is actually necessary for office visits to a doctor, dentist, optometrist, etc.