Data Use and Protection Sample Clauses

Data Use and Protection. Section 14 is hereby deleted and replaced with the following:
AutoNDA by SimpleDocs
Data Use and Protection. The following text is hereby added at the end of Section 14: “As used in the paragraphs relating to Hong Kong below, “personal data” has the same meaning ascribed to it in Section 2 of the Personal Data (Privacy) Ordinance (Cap 486) (“PDPO”). Client further warrants that in respect of any personal data of any individual transferred to UPS Customer Solutions and the Supported Carriers through the ShipExec Solution: (i) the consent of such individual has been obtained for the collection, use and disclosure of his/her personal data by UPS Customer Solutions and Supported Carriers in accordance with the terms of this Agreement and the provisions of the the PDPO; and (ii) the transfer of such personal data shall not be in breach of any laws or regulations relating to data privacy and protection in Hong Kong, including but not limited to the provisions of the PDPO.” Where UPS Carrier Information is comprised of personal data, Client further undertakes that it shall comply with the provisions of the PDPO in respect of the collection, use, and disclosure of such personal data.” HUNGARY
Data Use and Protection. The following text is hereby added at the end of Section 14: “As used in Section 14, the term “Data Protection Legislation” includes the Personal Data Protection Act 2012 (No. 26 of 2012) of the Statutes of the Republic of Singapore (“PDPA”). As used in the paragraphs relating to Singapore below, the term “personal data” has the same meaning ascribed to it in Section 2(1) of the PDPA. Client further warrants that in respect of any personal data of any individual transferred to UPS Customer Solutions and the Supported Carriers through the ShipExec Solution: (i) the consent of such individual has been obtained for the collection, use and disclosure of his/her personal data by UPS Customer Solutions and Supported Carriers in accordance with the terms of this Agreement and the provisions of the PDPA; and (ii) the transfer of such personal data shall not be in breach of any laws or regulations relating to data privacy and protection in Singapore, including but not limited to the provisions of the PDPA. Where UPS Carrier Information is comprised of personal data, Client further undertakes that it shall comply with the provisions of the PDPA in respect of the collection, use, and disclosure of such personal data.” SOUTH KOREA
Data Use and Protection. Party B hereby authorizes Party A to store or transfer any of Party B’s family or personal information which is collected by Party A to other related company or any third party service provider for the business management purpose of Party A. Dated this 1 day of May, 2007. ___________________________________________ Party A: Ningbo Keyuan Plastic Co., Ltd. ___________________________________________
Data Use and Protection. Use of one or more of the Software and/or Subscription Services may include collection and processing of Media Individual and those located in the Media Individual’s residence (“Users”), information or material provided, submitted or otherwise transmitted by Media Individual and Users from the Media Individual’s residence or Users (collectively, “Media Individual Data” or “Customer Data”) as described in Calix published product and/or user documentation for the applicable Software and/or Subscription Service and applicable Calix privacy policies.
Data Use and Protection. 7.1. Unless otherwise provided in an Order Document, all User accounts are maintained on servers hosted by a third-party identity provider in the United States of America and authenticated before accessing the Service. You have obtained the required consent and agree to such storage and authentication.
Data Use and Protection 
AutoNDA by SimpleDocs

Related to Data Use and Protection

  • Ownership and Protection of Proprietary Information (i) As used herein, the term “

  • Authorizations and Protections As agent for Company hereunder, Agent:

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Right to Perform, Preserve and Protect If any Credit Party fails to perform any obligation hereunder or under any other Financing Document, Agent itself may, but shall not be obligated to, cause such obligation to be performed at Borrowers’ expense. Agent is further authorized by Borrowers and the Lenders to make expenditures from time to time which Agent, in its reasonable business judgment, deems necessary or desirable to (a) preserve or protect the business conducted by Borrowers, the Collateral, or any portion thereof, and/or (b) enhance the likelihood of, or maximize the amount of, repayment of the Loan and other Obligations. Each Borrower hereby agrees to reimburse Agent on demand for any and all costs, liabilities and obligations incurred by Agent pursuant to this Section 11.14. Each Lender hereby agrees to indemnify Agent upon demand for any and all costs, liabilities and obligations incurred by Agent pursuant to this Section 11.14, in accordance with the provisions of Section 11.6.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • PATENT PROTECTION The vendor agrees to indemnify and defend the State of New Hampshire from alleged and actual patent infringements and further agrees to hold the State of New Hampshire harmless from any liability arising under RSA 382- A:2-312(3). (Uniform Commercial Code).

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

Time is Money Join Law Insider Premium to draft better contracts faster.