Security Cookies Sample Clauses

Security Cookies. We use Security Cookies for security purposes. Use of Data TCS uses the collected data for various purposes: • To provide and maintain the Service • To notify you about changes to our Service • To allow you to participate in interactive features of our Service when you choose to do so • To provide customer care and support • To provide analysis or valuable information so that we can improve the Service • To monitor the usage of the Service • To detect, prevent and address technical issues Transfer Of Data Your information, including Personal Data, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction. If you are located outside United States and choose to provide information to us, please note that we transfer the data, including Personal Data, to United States and process it there. Your use of the Service followed by your submission of such information represents your agreement to that transfer. TCS will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information. Disclosure Of Data Legal Requirements TCS may disclose your Personal Data in the good faith belief that such action is necessary to: • To comply with a legal obligation • To protect and defend the rights or property of TCS • To prevent or investigate possible wrongdoing in connection with the Service • To protect the personal safety of users of the Service or the public • To protect against legal liability Security Of Data The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While TCS uses Industry Standard and Commercially acceptable means to protect your Personal Data (multi-layered security, encrypted storage, DR restoration and recovery plans as well as routine monitoring for intrusion) we cannot guarantee its absolute security. Service Providers We may employ third party companies and individuals to facilitate our Service ("Service Providers"), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used. These...
AutoNDA by SimpleDocs
Security Cookies. We use Security Cookies for security purposes.
Security Cookies. We use Security Cookies for security purposes. Use of Data Time Lock Documentation, LLC uses the collected data for various purposes: ● To provide and maintain our Service ● To notify you about changes to our Service ● To allow you to participate in interactive features of our Service when you choose to do so ● To provide customer support ● To gather analysis or valuable information so that we can improve our Service ● To monitor the usage of our Service ● To detect, prevent and address technical issues ● To provide you with news, special offers and general information about other goods, services and events which we offer that are similar to those that you have already purchased or enquired about unless you have opted not to receive such information Transfer of Data Your information, including Personal Data, may be transferred to - and maintained on - computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ from those of your jurisdiction. If you are located outside United States and choose to provide information to us, please note that we transfer the data, including Personal Data, to United States and process it there. Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer. Time Lock Documentation, LLC will take all the steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

Related to Security Cookies

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Cookies We and Our partners may use various technologies to collect and store information when You use this Website, and this may include using cookies and similar tracking technologies, such as pixels and web beacons. These web beacons track certain behavior such as whether the email sent through the Website was delivered and opened and whether links within the email were clicked. They also allow Us to collect information such as the recipient’s: • IP address, browser, email client type and other similar details; • Tracking Website usage and traffic; • Reports are available to Us when We send email to You, so We may collect and review that information. These cookies do not read Your hard drive but may be stored on Your hard drive to enable Our Website to recognise You when You return to the same. Mailing Lists If at any time You are on a mailing list of Ours then You may request to be removed from the same and We will comply with Your request if there is no unsubscribe button provided then please contact Us with Your request using the “Contact Us” section of this Website.

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Security Coordinator Provider shall provide the name and contact information of Provider’s Security Coordinator for the Student Data received pursuant to the DPA.

  • Security Compliance Apple will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Apple shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.

  • Network Etiquette You are expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

Time is Money Join Law Insider Premium to draft better contracts faster.