Protection of PII Sample Clauses

Protection of PII. Personally identifiable information (“PII”) shall be defined as information that identifies a Cardholder or identifies a Card, which is disclosed to MasterCard pursuant to this Agreement, along with the Transaction information directly associated with such Cardholder. PII includes, but is not limited to, Cardholder Card information or information that can identify an individual or be used to authenticate an individual. MasterCard will keep and maintain all PII in strict confidence, using such degree of care as is appropriate to avoid unauthorized access, use, or disclosure. MasterCard acknowledges and agrees that its access, use, storage, disposal, or disclosure of PII complies with federal and state privacy and data security laws. MasterCard is responsible for any unauthorized collection, access, use, storage, disposal, or disclosure of PII by its employees, agents, Affiliates or subcontractors.
AutoNDA by SimpleDocs
Protection of PII. The parties agree - PII compiled for purposes of this Data Sharing Agreement will be stored on one or more of the following media and protected as described:
Protection of PII. Handbook 755.1 shall state (such as in Section 1-5) that all personally identifiable information (PII) will be protected as required under law, government-wide regulations, and government-wide policies.
Protection of PII. We employ the following data security tools to protect Personally Identifiable Information: secure server with Secure Socket Layer (SSL). Unfortunately, even with these measures, we cannot guarantee the security of PII. By using our Website, you acknowledge and agree that we make no such guarantee, and that you use our Website at your own risk.
Protection of PII. The parties agree that PII compiled for purposes of this Data Sharing Agreement will be stored on one or more of the following media and protected as described: Workstation Hard disk drives may have PII stored on local workstation hard disks. Access to the PII will be restricted to authorized users by requiring logon to the local workstation using a unique user ID and complex password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. The hard drive must be encrypted to protect PARTNER PII in the event the device is lost or stolen. Network server disks may have PII stored on hard disks mounted on third party network servers and made available through shared folders. Access to the PII will be restricted to authorized users through the use of access control lists which will grant access only after the authorized user has authenticated to the network using a unique user ID and complex password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. PII will be hosted in SSAE 16 accredited datacenters. Data is backed up daily to a primary datacenter and mirrored in real time to multiple storage locations. All PII at rest will be encrypted using AES 256-bit encryption. PII transmissions are secured using either Transport Layer Security (TLS) or a Secure Sockets Layer (SSL) with up to 128-bit encryption. Designated LCCC employees with access to PII have a unique login and password. PII storage on portable devices or media. PARTNER PII shall not be stored on portable devices or media unless specifically, explicitly authorized in writing by THE PARTNER Agreement Administrator or Technical Administrator. If so authorized, the PII shall be given the following protections: Encrypt the PII with a key length of at least 128 bits. Control access to devices with a unique user ID and complex password or stronger authentication method such as a physical token or biometrics. Manually lock devices whenever they are left unattended and set devices to lock automatically after a period of inactivity, if this feature is available. Maximum period of inactivity is 20 minutes. Physically protect the portable device(s) and/or media by: Keeping them in locked storage when not in use; Using check-in/check-out procedures when they are shared; and Taking frequent inventories. When being transported outside of a secure area, portable devices and media with confidential PII m...

Related to Protection of PII

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of PFPC Trust PFPC Trust shall be indemnified by the Fund and without liability for any action PFPC Trust takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC Trust receives from or on behalf of the Fund or from counsel and which PFPC Trust believes, in good faith, to be consistent with those directions or advice or Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC Trust (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of Privacy Act You acknowledge that all or part of the information you are required to keep, may be information deemed to be under the control of the LDB and may be subject to the provisions of Freedom of Information and Protection of Privacy Act if a request is made to the LDB for such information.

  • Protection of Personal Data 25.1 The Parties agree that they may obtain and have access to personal data for the duration of the Agreement for the fulfilment of the rights and obligations contained herein. In performing the obligations as set out in this Agreement, the Parties shall at all times ensure that:

  • Protection of Private Information If this Agreement requires City to disclose “Private Information” to Contractor within the meaning of San Francisco Administrative Code Chapter 12M, Contractor and subcontractor shall use such information only in accordance with the restrictions stated in Chapter 12M and in this Agreement and only as necessary in performing the Services. Contractor is subject to the enforcement and penalty provisions in Chapter 12M.

  • PROTECTION OF TEACHERS A. The Board recognizes its responsibility to give all reasonable support and assistance to teachers with respect to the maintenance of control and discipline in the classroom.

  • Freedom of Information and Protection of Privacy Act ‌ The Supplier acknowledges that the City is subject to the Freedom of Information and Protection of Privacy Act (British Columbia), which imposes significant obligations on the City’s contractors to protect all personal information acquired from the City in the course of providing any service to the City.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Protection of Trade Secrets The Executive agrees to maintain in strict confidence and, except as necessary to perform his duties for the Employer, the Executive agrees not to use or disclose any Trade Secrets of the Employer during or after his employment. “Trade Secret” means information, including a formula, pattern, compilation, program, device, method, technique, process, drawing, cost data or customer list, that: (i) derives economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

  • Protection of Rights Licensee shall not copy, translate, disassemble, decompile, nor reverse engineer the Software or other SAP Materials. Licensee shall not create or attempt to create the source code from the object code of the Software or other SAP Materials. Licensee is permitted to back up data in accordance with good information technology practice and for this purpose to create the necessary backup copies of the Software. Backup copies on transportable discs or other data media must be marked as backup copies and bear the same copyright and authorship notice as the original discs or other data media, unless technically infeasible. Licensee must not change or remove SAP’s copyright and authorship notices.

Time is Money Join Law Insider Premium to draft better contracts faster.