Online Privacy Protections Sample Clauses

Online Privacy Protections. At our website, xxx.xxxxxxxxxxxxxxxx.xxx, you may apply for accounts and services and you may communicate with us via e-mail. To protect the information you provide us online, we use multiple levels of security. The application information we accept online and our Online Banking service relies on industry standardSecure Sockets Layer” (SSL) encryption to secure your transaction information and communication. Generally, our e-mails are not secure. When you visit our website, you can access site information, without revealing your personal identity. However, in order to help us identify you for future site visits, we use “cookies” to track your visit. A “cookie” is a piece of information that our web server stores on your computer hard drive and retrieves later. The cookie will not request, require or collect personal identity information and you remain anonymous. Your member information is not accessed by or stored within a cookie in any way.
AutoNDA by SimpleDocs
Online Privacy Protections. At our website, xxx.xxxxxxxxxx.xxx, you may apply for accounts and services and you may communicate with us via email. To protect the information you provide us online, we use multiple levels of security. The application information we accept online and our Home Banking service relies on industry standardSecure Sockets Layer” (SSL) encryption to secure your transaction information and communication. Generally, our emails are not secure. When you visit our website, you can access site information, without revealing your personal identity. However, in order to help us identify you for future site visits, we use “cookies” to track your visit. A “cookie” is a piece of information that our web server stores on your computer hard drive and retrieves later. The cookie will not request, require or collect personal identity infor- mation and you remain anonymous. Your member information is not accessed by or stored within a cookie in any way.
Online Privacy Protections. At our Web site, xxxxxxxxxxx.xxx, you may apply for accounts and services and you may communicate with us via e-mail. To protect the information you provide us online, we use multiple levels of security. The application information we accept online and our online banking service relies on industry standardSecure Sockets Layer” (SSL) encryption to secure your transaction information and communication. Generally, our e-mails are not secure. However, if we ask you to e-mail us address and phone number, you have the option to submit it to us using a secure (SSL encryption) e-mail form. When you visit our Web site, you can access site information without revealing your personal identity.
Online Privacy Protections. At our website, xxx.XxXXXX.xxx, you may apply for accounts and services and you may communicate with us via email. To protect the information you provide us online, we use multiple levels of security. The application information we accept online and our Internet Banking service rely on industry standard "Secure Sockets Layer" (SSL) encryption to secure your transaction information and communication. Generally, emails are not secure. However, if we ask you to email us information other than your name, address, email address, and phone number, it will be obtained using a secure (SSL encryption) email form. When you visit our website, you can access site information without revealing your personal identity. However, in order to help us track Internet Banking session time length, we use temporary cookies. A temporary cookie is a piece of information that our web server places on your computer hard drive while you are logged on to Internet Banking. It is deleted as soon as your Internet Banking session ends. The temporary cookie will not request, require, or collect personally identifiable information and you remain anonymous. Your member information is not accessed by or stored within a temporary cookie in any way.

Related to Online Privacy Protections

  • Privacy Protection Each of the Corporation and the Subsidiaries have security measures and safeguards in place to protect personal information it collects from registered patients and customers and other parties from illegal or unauthorized access or use by its personnel or third parties or access or use by its personnel or third parties in a manner that violates the privacy rights of third parties. The Corporation and the Subsidiaries have complied, in all material respects, with all applicable privacy and consumer protection legislation and neither has collected, received, stored, disclosed, transferred, used, misused or permitted unauthorized access to any information protected by privacy laws, whether collected directly or from third parties, in an unlawful manner. The Corporation and the Subsidiaries have taken all reasonable steps to protect personal information against loss or theft and against unauthorized access, copying, use, modification, disclosure or other misuse.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "

  • Applicability of Data Privacy Protections In the event that Personal Information will be Processed by Supplier in connection with the performance under this Agreement (including any SOW), then and only then shall the provisions of this Section ‘Data Protection and Privacy’ be applicable. For the avoidance of doubt, the data security requirements contained in section ‘Information Security’ shall apply regardless of whether Personal Information is Processed under this Agreement or any SOW. All Personal Information obtained from or on behalf of DXC or in connection with performance pursuant to this Agreement shall be Processed and protected pursuant to this Section ‘Data Protection and Privacy’, the Section ‘Information Security’ and any other Sections of this Agreement that address Personal Information.

  • Personal Information Protection Each party represents and warrants that procedures compatible with relevant personal information and data protection laws and regulations will be employed so that processing and transfer of such information and data identifiers will not be impeded. d.

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • Privacy Act If performance involves design, development or operation of a system of records on individuals, this Agreement incorporates by reference FAR 52.224-1 Privacy Act Notification (Apr 1984) and FAR 52.224-2 Privacy Act (Apr 1984).

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Password Protection Contractor agrees that any portable or laptop computer that has access to the Eligible Users or State of Utah networks, or stores any Public Data is equipped with strong and secure password protection.

  • Freedom of Information and Protection of Privacy Act ‌ The Supplier acknowledges that the City is subject to the Freedom of Information and Protection of Privacy Act (British Columbia), which imposes significant obligations on the City’s contractors to protect all personal information acquired from the City in the course of providing any service to the City.

Time is Money Join Law Insider Premium to draft better contracts faster.