Use and Management by GiSC of Your Data Sample Clauses

Use and Management by GiSC of Your Data. GiSC’s use and management of Your Data is determined by the following two categories: GROWER INFORMATION SERVICES COOPERATIVE Protected Informa�on: For the purposes of this Membership Agreement, Protected Informa�on is any and all data/informa�on in Your Data that contains Personally Iden�fiable Informa�on. Personally Iden�fiable Informa�on is any data/informa�on that contains: (i) informa�on about an individual and/or an individual’s family member(s), which a reasonable person would consider sensi�ve and/or private, including informa�on such as, but not limited to, educa�on, financial transac�ons, medical history, criminal or employment history, etc.; and/or (ii) informa�on which can be used to dis�nguish or trace an individual's iden�ty, such as name, social security number, address, phone number, email address, date and place of birth, mother's maiden name, biometric records, etc.; and
AutoNDA by SimpleDocs
Use and Management by GiSC of Your Data. GiSC’s use and management of Your Data is determined by the following two categories: Protected Information: For the purposes of this Membership Agreement, Protected Information is any and all data/information in Your Data that contains Personally Identifiable Information. Personally Identifiable Information is any data/information that contains: (i) information about an individual and/or an individual’s family member(s), which a reasonable person would consider sensitive and/or private, including information such as, but not limited to, education, financial transactions, medical history, criminal or employment history, etc.; and/or (ii) information which can be used to distinguish or trace an individual's identity, such as name, social security number, address, phone number, email address, date and place of birth, mother's maiden name, biometric records, etc.; and

Related to Use and Management by GiSC of Your Data

  • Protection of Your Data We will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Your Data, as described in the Documentation. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Your Data by Our personnel except (a) to provide the Purchased Services and prevent or address service or technical problems, (b) as compelled by law in accordance with Section 8.3 (Compelled Disclosure) below, or (c) as You expressly permit in writing.

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html.

  • Information Handling Implement new/improved system; update incoming publications; circulate publications; identify information source(s) inside and outside the organisation. Grade 5 - Communication: Obtain data from external sources; produce reports; identify need for documents and/or research. Grade 5 - Enterprise: Assist with the development of options for future strategies; assist with planning to match future requirements with resource allocation.

  • Your Data Subject to the limited rights granted by You hereunder, We acquire no right, title or interest from You or Your licensors under this Agreement in or to Your Data, including any intellectual property rights therein.

  • Services and Third Party Materials A. The tvOS Software may enable access to Apple’s iTunes Store, App Store, Game Center, iCloud and other Apple and third party services, and web sites (collectively and individually, “Services”). Such Services may not be available in all languages or in all countries. Use of these Services requires Internet access and use of certain Services may require an Apple ID, may require you to accept additional terms and may be subject to additional fees. By using this software in connection with an Apple ID, or other Apple Service, you agree to the applicable terms of service for that Service, such as the latest iTunes Store Terms and Conditions, which you may access and review at xxxx://xxx.xxxxx.xxx/legal/itunes/ ww/.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment.

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Information Management Information and Records

Time is Money Join Law Insider Premium to draft better contracts faster.