Privacy by design Sample Clauses

Privacy by design. IRIS Connect shall be constructed with privacy-by-design principles at its core.
AutoNDA by SimpleDocs
Privacy by design. To the extent the Processor designs the systems, procedures or processes under which the Processing takes place, the Processor shall design such systems as to comply with the GDPR art. 25.
Privacy by design. Privacy by design aims to integrate privacy and data protection into the design specifications and architecture of information and communication systems and technologies, in order to facilitate compliance with privacy and data protection principles from the outset.
Privacy by design. Of particular importance in terms of privacy by design (PbD) is the nature of technical infrastructure within the HBP. Following the completion of the DGWG’s data policy manual, it is therefore advisable to begin awareness-raising exercises among the HBPs technical staff in terms of this concept. Table 6: Privacy by Design training Sessions Planned What Who involved When Comment Locally based workshops / xxxxx-bag lunches on PbD SP12, external experts on GDPR, and on technical infrastructure, DGWG representation, SPs5-11 Ongoing, ‘roadshow’ approach to maximise exposure Exploiting economies of travel to visit local labs, etc., will allow for wide dissemination of insights Webinars Ongoing These can be arranged at relatively short notice via Doodle poll to ensure maximum turnout
Privacy by design. The Processor takes the requirements of Art. 25 GDPR into account as early as the design and development phase of the product development. This is ensured by proactively involving legal counsel and the data protection officer. Processes and functionalities are set up in such a way that data protection principles such as lawfulness, transparency, purpose limitation, data minimization, etc., as well as the security of processing are taken into account at an early stage.
Privacy by design. The Concessionaire shall design the Communications System in accordance with "Privacy by Design" principles. In accordance with these principles, the Concessionaire shall take into account throughout the design process both (a) MTA Consumers' privacy interests, (b) its Privacy Best Practices Commitment, and (c) the protection of Personally Identifiable Information throughout its lifecycle. For the avoidance of doubt, the Concessionaire’s obligations concerning Privacy by Design shall include designing the Communications System to meet the requirements set out in Section 8 (Privacy).
Privacy by design. A key priority during Y3 of the project has been to ensure that the architecture was fully compliant with the privacy by design approach. WP2 performed a detailed and systematic analysis of potential risks related to personal data protection. The adoption of the General Data Protection Regulation (GDPR) in April 2016 has been carefully analyzed and studied in order to ensure complete compliance. Privacy by design is ensured through concepts of full transparency, prior informed consent, the Right to be Forgotten and anonymity definition.
AutoNDA by SimpleDocs
Privacy by design. XXXX shall implement policies and measures to ensure that managerial, organisational, business practices and technical systems are designed in a manner to anticipate, identify and avoid harm to you; • XXXX shall implement policies and measures to ensure that the technology used in the processing of personal data is in accordance with commercially accepted or certified standards; • XXXX shall implement policies and measures to ensure that the legitimate interest of businesses including any innovation is achieved without compromising privacy interests; • XXXX shall implement policies and measures to ensure that privacy is protected throughout processing from the point of collection to deletion of personal data and processing of personal data is carried out in a transparent manner and the interest of the data provider is accounted for at every stage of processing of personal Data.
Privacy by design. After termination of the license for the tjecco® application, the personal data processed by the licensee in the system will be deleted after 6 months at the latest. The ID data will be kept anonymized at the latest after three months after the end of the license in order to continue anonymous statistical analyses on the use of the software.

Related to Privacy by design

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Access to Protected Health Information 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524.

Time is Money Join Law Insider Premium to draft better contracts faster.