Privacy Breach Protocol definition

Privacy Breach Protocol means the OBI Privacy Breach Protocol, as amended from time to time, that forms part of the Governance Policy.
Privacy Breach Protocol means the OBI Privacy Breach Protocol, as amended from time to time, that forms part of the Governance Policy and which can be found on OBI’s website at https://www.braincode.ca/content/about-brain-code.
Privacy Breach Protocol means the OBI Privacy Breach Protocol, as amended from time to time, that forms part of the Governance Policy and which can be found on OBI’s website at http://www.braininstitute.ca/Brain-CODE-governance.

Examples of Privacy Breach Protocol in a sentence

  • In June 2014, City Council adopted a Privacy Breach Protocol to provide a comprehensive and transparent process to respond to privacy breaches involving personal information in the custody or control of the City.

  • Follow Steps 2 through 6 of the Privacy Breach Protocol At this point, all of the steps required for a self-identified or suspected privacy breach are the same as described in the previous template.

  • They report every year on the partnership of the EIP and the accomplishments from the year before.

  • In addition to following the Privacy Breach Protocol, Parties to this agreement may choose to also report directly to the BC government central privacy office if the privacy breach occurs at their institution.

  • The Contractor must deliver a Privacy Breach Protocol within three (3) months of Contract award that is approved by the Technical Authority as part of their incident management processes for the handling of any privacy related incidents.

  • Execute the Board’s Privacy Breach Protocol (Appendix C) ensuring that all five steps of the response protocol are implemented.

  • This national program, the Transcentury Green Plan, designated three river basins (Hai, Huai, and Liao) and three lakes (Chao, Dianchi, and Tai) for intensive planning and project implementation to alleviate serious environmental problems affecting water quality and contiguous urban populations.

  • Very rarely during the consultation, the HP may identify that the claimant appears to have a significant undiagnosed medical condition - for example an apparently unrecognised depressive illness.

  • The prevailing party in any such arbitration shall be entitled to recover, in addition to all other appropriate relief, the cost and expenses incurred by that party (including reasonable counsel fees) in connection with obtaining or enforcing the arbitration award.

  • In accordance with the Privacy Breach Protocol, City Clerks Services staff, with assistance from Legal Services, Finance Services, Tax and Revenue Services and Printing Services, investigated the alleged breach.

Related to Privacy Breach Protocol

  • Privacy Breach means a common law breach of confidence, infringement, or violation of any rights to privacy, including but not limited to breach of the Insured’s privacy statement, breach of a person’s right of publicity, false light, intrusion upon a person’s seclusion, public disclosure of a person’s privacy information, or misappropriation of a person’s picture or name for commercial gain.

  • Data Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise processed.

  • Data Breaches Party shall report to AHS, though its Chief Information Officer (CIO), any impermissible use or disclosure that compromises the security, confidentiality or privacy of any form of protected personal information identified above within 24 hours of the discovery of the breach. Party shall in addition comply with any other data breach notification requirements required under federal or state law.

  • Privacy Standards means the standards of the privacy of individually identifiable health information, as pursuant to HIPAA.

  • Privacy Shield means the European Union (EU) -U.S. and Switzerland – U.S. Privacy Shield frameworks.

  • Privacy Statement means any and all of the Company's privacy policies published on its web site or otherwise provided to users of the Company's products and services or the Company's data subjects regarding the collection, use and distribution of personal information from visitors to its web site, consumers of its products and services and/or the Company's data subjects, as applicable;

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Privacy Policies means all published, posted and written internal policies, procedures, agreements and notices with respect to the Company’s collection, use, storage, disclosure, or cross-border transfer of Personal Data.

  • Personal Data Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed;

  • Privacy Notice means Sage’s privacy notice posted on xxx.xxxx.xxx (or such other URL as Sage may notify to you) and which may be amended by Sage from time to time.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Privacy Incident means a violation or imminent threat of violation of security policies, acceptable use policies, or standard security practices, involving the breach of Personally Identifiable Information (PII), whether in electronic or paper format.

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Patient Information means information (however recorded) which—

  • Privacy Policy means the terms which set out how we will deal with confidential and personal information received from you via the Website;

  • Customer Data means any content, materials, data and information that Authorized Users enter into the production system of a Cloud Service or that Customer derives from its use of and stores in the Cloud Service (e.g. Customer-specific reports). Customer Data and its derivatives will not include SAP’s Confidential Information.

  • Summary Health Information means information (a) that summarizes the claims history, claims expenses, or type of claims experienced by individuals for whom a plan sponsor had provided health benefits under a health plan; and (b) from which the information described at 42 CFR Section 164.514(b)(2)(i) has been deleted, except that the geographic information described in 42 CFR Section 164.514(b)(2)(i)(B) need only be aggregated to the level of a five-digit ZIP code.

  • Serious Breach means any breach defined as a Serious Breach in the Agreement or any breach or breaches which adversely, materially or substantially affect the performance or delivery of the Services or compliance with the terms and conditions of the Agreement or the provision of a safe, healthy and supportive learning environment or a breach of security that adversely affects the Personal Data or privacy of an individual. Failure to comply with Law, or actions or omissions by the Provider that endanger the Health or Safety of Learners, Provider Personnel, and all other persons including members of the public would constitute a Serious Breach;

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Contractor Sensitive Information means any information provided by the Contractor to the Authority (disregarding any protective marking or assertion of confidentiality) which: is specified as Contractor Sensitive Information in Schedule 7 and has not lost its sensitivity according to the justifications and durations set out in that Schedule; and is exempt information pursuant to sections 33(1) or 36, 38 or 39 of FOISA (having regard for that purpose to the public interest there might be in disclosing such information as referred to in section 2(1)(b) of FOISA).

  • Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.

  • Serious traffic violation means a conviction when operating a commercial motor vehicle of:

  • Serious assault means an act that constitutes a felony violation of chapter XI of the Michigan penal code, 1931 PA 328, MCL 750.81 to 750.90h, or that constitutes an assault and infliction of serious or aggravated injury under section 81a of the Michigan penal code, 1931 PA 328, MCL 750.81a.

  • Individually Identifiable Health Information means information that is a subset of health information, including demographic information collected from an individual, and: (a) is created or received by a health care provider, health plan, employer, or health care clearinghouse; (b) relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual; and (c) that identifies the individual or with respect to which there is a reasonable basis to believe the information can be used to identify the individual.

  • Privacy Act means the Privacy Act 1988 (Cth).