Storage of Collected Information Sample Clauses

Storage of Collected Information. The security of your personal information is important to us. When you enter sensitive information (such as credit card numbers) on our website, we encrypt that information using secure socket layer technology (SSL). When Credit Card details are collected, we simply pass them on in order to be processed as required. We never permanently store complete Credit Card details. We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it. If you have any questions about security on our Website, you can email us at: xxxxxxxxxxxxxx@xxxxxxxxxxxx.xxx 36 Procurement as a Service (PaaS), End User Licensing Agreement (XXXX), Trial client portal 26 April, 2017
AutoNDA by SimpleDocs
Storage of Collected Information. The security of your personal information is important to us. When you enter sensitive information (such as credit card numbers) on our online payment service, we encrypt that information using secure socket layer technology (SSL). When Credit Card details are collected, we simply pass them on in order to be processed as required. We never permanently store complete Credit Card details. We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it. If you have any questions about security of our online payment service, you can email us at xxx@xxxxxxxxxx.xxx.xx.

Related to Storage of Collected Information

  • Protected Information 5.3.1 In this Section "

  • Requested Information with reasonable promptness, such other data and information relating to the business, operations, affairs, financial condition, assets or properties of the Company or any of its Subsidiaries or relating to the ability of the Company to perform its obligations hereunder and under the Notes as from time to time may be reasonably requested by any such holder of Notes.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Request for Redacted Information In the event of a public records or other disclosure request pursuant to Chapter 119, Florida Statutes, the Florida Constitution or other authority, to which documents that are marked as “Confidential” are responsive, the Department will provide the Contractor- redacted copies to the requestor. If a requestor asserts a right to the Confidential Information, the Department will notify the Contractor such an assertion has been made. It is the Contractor’s responsibility to assert that the information in question is exempt from disclosure under Chapter 119 or other applicable law. If the Department becomes subject to a demand for discovery or disclosure of the Confidential Information of the Contractor under legal process, the Department shall give the Contractor prompt notice of the demand prior to releasing the information labeled “Confidential” (unless otherwise prohibited by applicable law). The Contractor shall be responsible for defending its determination that the redacted portions of its response are confidential, proprietary, trade secret, or otherwise not subject to disclosure.

  • Return or Destruction of Information Upon termination of this Agreement and at the request of ODM, the MCP will return to ODM or destroy all PHI in MCP’s possession stemming from this Agreement as soon as possible but no later than 90 calendar days and will not keep copies of the PHI except as may be requested by ODM or required by law, or as otherwise allowed for under this Agreement. If the MCP, its agent(s), or subcontractor(s) destroy any PHI, then the MCP will provide to ODM documentation evidencing such destruction. Any PHI retained by the MCP will continue to be extended the same protections set forth in this section, HIPAA regulations, and this Agreement for as long as it is maintained.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • User Information Any user or usage data or information collected via Station’s digital properties or related to Station’s digital properties, or any information collected from websites operated by Station’s affiliates under this Agreement, shall be the property of Station and/or such affiliates. Advertiser shall have no rights in such information by virtue of this Agreement.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!