Secondary Use of Logged Personal Data and Enterprise Security Personal Data Sample Clauses

Secondary Use of Logged Personal Data and Enterprise Security Personal Data. Customer acknowledges and agrees that Akamai uses Logged Personal Data and the log files that are part of the Enterprise Security Data for traffic analytic, security analytic, reporting, service improvement and billing purposes. Akamai determines the means and purposes of the secondary use of the Logged Personal Data and the log files that are part of the Enterprise Security Data. Respectively Akamai acts as a data controller when processing such data for its secondary use case. Akamai is describing the details of its secondary use case of such data in the Akamai Privacy Statement, available at: xxxxx://xxx.xxxxxx.xxx/content/dam/site/en/documents/akamai/akamai-privacy-statement.pdf as well as in the “Overview of Processing Activities and Roles”, available in Akamai’s Privacy Trust Center at: xxxxx://xxx.xxxxxx.xxx/content/dam/site/en/documents/akamai/overview-of-akamai-personal-data- processing-activities-and-role.pdf. In accordance with Section 2.1 above, Akamai complies with its obligations under Data Protection Laws when processing the Logged Personal Data and the log files that are part of the Enterprise Security Data for traffic analytic, security analytic, reporting, service improvement and billing purposes. _ _ Schedule 1 of the Data Processing Agreement: Details of Akamai’s Processing Activities
AutoNDA by SimpleDocs

Related to Secondary Use of Logged Personal Data and Enterprise Security Personal Data

  • Processing of Customer Personal Data 3.1 UKG will:

  • Your Personal Data 17.1. PFS is a registered Data Controller with the Information Commissioners Office in the UK under registration number Z1821175 xxxxx://xxx.xxx.xx/ESDWebPages/Entry/Z1821175

  • Shared Personal Data This clause sets out the framework for the sharing of personal data between the parties as data controllers. Each party acknowledges that one party (the Data Discloser) will regularly disclose to the other party (the Data Recipient) Shared Personal Data collected by the Data Discloser for the Agreed Purposes.

  • Processing Personal Data 40.1. The Company is the data controller in the relevant jurisdiction. You hereby acknowledge and agree to the collection and processing of personal data provided by you in connection with the opening of a trading account for the purpose of performing our obligations under these Terms and Conditions and for administering the relationship between you and us.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • PERSONAL DATA PROTECTION 7.1 By accessing ESZAM AUCTIONEER SDN BHD website, the E-Bidders acknowledge and agree that ESZAM AUCTIONEER SDN BHD website may collect, retain, or disclose the E-Bidder’s information or any information by the e-bidders for the effectiveness of services, and the collected, retained or disclosed information shall comply with Personal Data Protection Act 2010 and any regulations, laws or rules applicable from time to time.

  • Customer’s Processing of Personal Data Customer shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations. For the avoidance of doubt, Customer’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Customer shall have sole responsibility for the means by which Customer acquired Personal Data.

  • Processing of Company Personal Data 2.1 Processor shall:

  • Personal Data Processing 2.1 The Processor shall process Personal Data only on the basis of corresponding recorded orders from the Controller.

  • Personal Data, Confidentiality, Recording of Telephone Calls and Records 22.1. The Company may collect client information directly from the Client (in his completed Account Opening Application Form or otherwise) or from other persons including, for example, the credit reference agencies, fraud prevention agencies, banks, other financial institutions, third authentication service providers and the providers of public registers.

Time is Money Join Law Insider Premium to draft better contracts faster.