Privacy Management Sample Clauses

Privacy Management. Applications such as “Software as a Service’ used by Us to collect Personal Data must have the URL for Our Privacy Statement embedded into the web page where Personal Data is collected. It is available in all languages. • Where applicable, individuals must be given the opt-in choice to participate prior to providing their Personal Data. Opt-in selection boxes are not pre-selected by default. • Where applicable, the system should have the capability of allowing individuals to accessupdate or delete their Personally Identifiable Information or unsubscribe when requested. This can be an automated or manual process. The process must be clearly explained to theindividual. • System must not transfer Personal Data to other systems or be used for purposes other thanspecified. • System must have appropriate security controls to avoid unauthorized access, disclosure and / or use or modification of individuals’ Personal Data. • The system must adhere to the Federal Trade Commission’s CAN-SPAM Act if it: o Requests input of Personal Data from an individual to complete “Email to a Friend”notifications, or o The system offers online, subscription-based communication services. • Supplier has set up protective devices for ensuring the integrity and the authenticity of Personal Data, especially state-of-the-art protective devices against malware and similar security attacks. • Supplier has implemented measures to prevent Personal Data from undergoing any unwanted degradation or deletion without having a copy immediately usable. • Supplier will keep records concerning its security, and organizational technical measures as well as records on any security incident affecting Personal Data. Such records shall be made available in a standard format immediately exploitable and available for inspection, upon Our request in the course of a security check or in the framework of an audit for up to 1 year.
AutoNDA by SimpleDocs
Privacy Management. Protection of personal information is a core business function that needs to be effectively managed. Privacy management applies common management principles (e.g., planning, directing, controlling, evaluating) to the personal information collected, used, disclosed, retained and destroyed by institutions. It involves establishing and following disciplined and consistent practices for the management of personal information. To be effective, it also requires leadership and a commitment to privacy protection at all levels of your organization. An effective privacy management program will: • Define Roles and Responsibilities: The head of an institution is accountable for compliance with FIPPA. In most institutions, some or all of the powers or duties of a head will have been delegated to an officer or officers (e.g., Delegated Decision- Makers and Coordinators). However, the management of privacy needs to be an institution-wide initiative, engaging staff at all levels. Your staff are accountable for protecting the personal information in their custody and control.
Privacy Management. HERE represents and warrants that it operates a comprehensive privacy program that includes (i) standards and processes intended to demonstrate HERE’s compliance with Data Protection Laws, regulations and contractual obligations; and (ii) effective processes for review- ing HERE standards and practices to ensure compliance. HERE ensures that its personnel and subprocessors engaged in the Processing of Personal Data are informed and have received appropriate training regarding their responsibilities and obligations of confidentiality, which survive the termination of its personnel or a subprocessor’s engagement with HERE. HERE shall ensure that access to your Personal Data is limited to those personnel who require such access to perform the Agreement. HERE’s global privacy and data protection team and Data Protection Officer may be reached via email at xxxxxxx@xxxx.xxx.
Privacy Management. Data protection is achieved by means of regular audits and a constantly updated list of processing activities and service agreements for all employees. These documents can be viewed by every customer. Xxxxxxxx Xxxxxx has been appointed data protection officer.
Privacy Management. Provider represents and warrants that it operates a comprehensive privacy program of at a minimum (i) standards and processes intended to demonstrate that Provider´s products and services comply with applicable privacy laws, regulations and contractual obligations; and (ii) processes for reviewing Provider´s standards and practices on an ongoing basis to ensure that they remain up to date. Provider shall ensure that all persons authorized to process the Personal Data of HERE have committed themselves to confidentiality. Upon request, Provider shall provide evidence to HERE of such commitment.
Privacy Management. WALL PRIVACY allows You to manage Your privacy settings within Your Accounts by showing You how Your information is used by the Account You select, by following this process : • When You choose an Account to inspect, WALL PRIVACY will respond to Your request and review the use of Your data by the selected Account; • WALL PRIVACY then tells You what data is processed by Your Account, where You can find this data and then offers to delete the data You no longer wish to have processed in Your Account; • These are simple suggestions made following Your request to inspect the data processed in Your Account; • WALL PRIVACY proposals are based on what is technically possible to do but no guarantee is given as to the practical application of these requests on Your Account; • You are under no obligation to follow these suggestions, You can either simply read the result of the research or do nothing. While performing Privacy Management, We rely on various third-party providers, such as providers of technical support and information alerts’ providers. In no case We shall bear responsibility on the accuracy of data provided by such third-party providers and shall bear no responsibility on any type of loss and/or damage caused in connection of such data to any party. WALL PRIVACY is not responsible for : • the consequences of Your choices on WALL PRIVACY, for which You are solely responsible for; • the actions taken on Your Account as a result of Your choices made through the WALL PRIVACY; • the respect of Your choices made in Your Account. Only You have the possibility to ensure that the data is no longer processed in accordance with the choices You have made WALL PRIVACY does not interfere with the privacy settings available within Your Accounts, nor does it offer additional privacy settings. We encourage You to review the Terms of Use and privacy statements of Your accounts to understand what is done with Your personal data in Your accounts.
Privacy Management. Applications such as “Software as a Service’ used by McAfee Enterprise to collect Personal Data must have the URL for the McAfee Enterprise Privacy Statement embedded into the web page where Personal Data is collected. It is available in all languages. Where applicable, individuals must be given the opt-in choice to participate prior to providing their Personal Data. Opt-in selection boxes are not pre-selected by default. Where applicable, the system should have the capability of allowing individuals to access update or delete their Personally Identifiable Information or unsubscribe when requested. This can be an automated or manual process. The process must be clearly explained to the individual. System must not transfer Personal Data to other systems or be used for purposes other than specified. System must have appropriate security controls to avoid unauthorized access, disclosure and / or use or modification of individuals’ Personal Data. The system must adhere to the Federal Trade Commission’s CAN-SPAM Act if it: Requests input of Personal Data from an individual to complete “Email to a Friend” notifications, or The system offers online, subscription-based communication services.
AutoNDA by SimpleDocs
Privacy Management. The following measures shall ensure that the technical and organisational measures taken remain effective in the long term. Regular monitoring of the technical and organizational measures taken. Messages and reports on unusual occurrences should be evaluated. Training of employees in the handling of data privacy, confidentiality, IT, and IT security awareness. Data Protection Management The following measures shall ensure that even in case of a breach, the absolute minimum of sensitive data is available. Erasure of data no longer needed. Secure disposal of defective hardware/hardware no longer needed. Secure disposal of documents/file shredder. Employees trained and obliged to maintain confidentiality and data secrecy. Annex 4Approved subcontractors The following companies are approved subcontractors under Section 10: Amazon Web Services, 00 Xxxxxx Xxxx X. Xxxxxxx, L-1855, Luxembourg (data stored in Frankfurt, Germany, AWS region eu-central-1) Datadog, 000 0xx Xxxxxx, 00xx xxxxx, Xxx Xxxx, XX 00000, XXX Mixpanel, Xxx Xxxxx Xxxxxx, Xxxxx 00, Xxx Xxxxxxxxx, XX 00000, XXX Sendgrid, 000 Xxxxx Xxxxxx, 3rd Floor, San Francisco, CA, USA Sentry, 00 Xxxxxxx Xxxxxx, 0xx Xxxxx, Xxx Xxxxxxxxx, XX 00000, XXX Annex 5 – Persons authorised to issue instructions The Customer's persons authorised to issue instructions are NAME ( EMAIL) Next Matter's persons receiving instructions are Johannes (Jan) Hugenroth (xxx.xxxxxxxxx@xxxxxxxxxx.xxx) Tassilo Karunarathna (xxxxxxx.xxxxxxxxxxxx@xxxxxxxxxx.xxx)
Privacy Management. ▪ Applications such as “Software as a Service’ used by McAfee Enterprise to collect Personal Data must have the URL for the McAfee Enterprise Privacy Statement embedded into the web page where Personal Data is collected. It is available in all languages. ▪ Where applicable, individuals must be given the opt-in choice to participate prior to providing their Personal Data. Opt-in selection boxes are not pre-selected by default. ▪ Where applicable, the system should have the capability of allowing individuals to access update or delete their Personally Identifiable Information or unsubscribe when requested. This can be an automated or manual process. The process must be clearly explained to the individual. ▪ System must not transfer Personal Data to other systems or be used for purposes other than specified. ▪ System must have appropriate security controls to avoid unauthorized access, disclosure and / or use or modification of individuals’ Personal Data. ▪ The system must adhere to the Federal Trade Commission’s CAN-SPAM Act if it: • Requests input of Personal Data from an individual to complete “Email to a Friend” notifications, or • The system offers online, subscription-based communication services.

Related to Privacy Management

  • Information Management Information and Records

  • Traffic Management The Customer will not utilize the Services in a manner which, in the view of the Centre Operator, significantly distorts traffic balance on the Centre Operator’s circuits which are shared with other users. If, in the reasonable view of the Centre Operator, the Customer’s traffic patterns cause or may cause such distortion, the Customer should have a dedicated circuit capability. If the Customer declines to do so then the Centre Operator may suspend the Services while the matter is being resolved. If there is no resolution within 5 business days then either party may terminate the Agreement.

  • Emergency Management The plan shall also address the assumption of operations of the program or facility by Department in the event of Contractor's bankruptcy or financial insolvency or if Contractor is unable to operate the facility.

  • Monitoring and Management Information C10.1 The Contractor shall comply with the monitoring arrangements set out in the Monitoring Schedule including, but not limited to, providing such data and information as the Contractor may be required to produce under the Contract.

  • Records Management Records the Provider must keep

  • Management Information To be Supplied to CCS no later than the 7th of each month without fail. Report are to be submitted via MISO CCS Review 100% Failure to submit will fall in line with FA KPI CONTRACT CHARGES FROM THE FOLLOWING, PLEASE SELECT AND OUTLINE YOUR CHARGING MECHANISM FOR THIS SOW. WHERE A CHARGING MECHANISM IS NOT REQUIRED, PLEASE REMOVE TEXT AND REPLACE WITH “UNUSED”.

  • Labor Management Conferences The Union and the Employer mutually agree that in the interest of efficient management and harmonious employee relations, meetings shall be held between Union and Employer representatives when appropriate. Such meetings shall be scheduled within one week of either party submitting an agenda to the other, or at a time mutually agreed upon by the parties, and shall be limited to:

  • Change Management BellSouth provides a collaborative process for change management of the electronic interfaces through the Change Control Process (CCP). Guidelines for this process are set forth in the CCP document as amended from time to time during this Agreement. The CCP document may be accessed via the Internet at xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

Time is Money Join Law Insider Premium to draft better contracts faster.