Source of the data Sample Clauses

Source of the data. The data of the interested parties may be provided to SegurCaixa Adeslas by the interested parties themsel- ves or the policyholders at any time during the rela- tionship (pre-contractual and contractual) with Segur- Caixa Adeslas for the purposes described in section
AutoNDA by SimpleDocs
Source of the data. Q4.2 Identify the source of the data. • A fully executed sponsored project agreement. • A collaborator with whom there is no funding and/or executed agreement/contract • A commercial entity. • A publicly available source. (Provide link) • A pending award. (Indicate expected start date below) • Controlled access data set (Identify below) • Other (Describe below)
Source of the data. The data of the interested parties may be provid- ed to SegurCaixa Adeslas by the interested parties themselves or the policyholders at any time during the relationship (pre-contractual and contractual) with SegurCaixa Adeslas for the purposes described in section 2. “Purpose of the personal data process- ing”. Also, within the context of the management of the formalised policies and, if required, to deal with losses, personal data may be received from policyhold- ers, insured parties and third parties, including through service provider companies subject to the coverage of the policies (healthcare centres and professionals, ve- hicle repair workshops, domestic repair professionals or companies, experts or other similar professionals). Interested parties shall be responsible for the accura- cy and veracity of the personal data provided to Se- gurCaixa Adeslas, which reserves the right to rectify or delete false or incorrect data, without prejudice to its right to take other relevant legal actions in each case. When the data provided relate to a third par- ty, the interested parties must inform and obtain the consent of the third party concerning the processing described in this text. As we have already indicated, data from public sourc- es from official bodies are also processed, in order to complement the information provided by interested parties during the insurance contracting process. As we have already indicated, data made public by the interested parties may also be processed in order to adopt the measures required to prevent fraudulent conduct relating to insurance. In particular, Segur- Caixa Adeslas may process data obtained from public profiles on social media about the interested parties for this purpose.
Source of the data. The data for the dependent variable comes from a lawsuit filed against the Secretary of State in September of 2016 by the Lawyers’ Committee for Civil Rights Under Law (Lawyers’ Committee), Project Vote, Campaign Legal Center, and the Voting Rights Institute of the Georgetown University School of Law, along with the New York City office of Xxxxxx Xxxxxxx and Xxxx LLP and Atlanta-based firm of Xxxxxx Xxxx LLP, acting as pro xxxx counsel, on behalf of the Georgia State Conference of the NAACP (GA NAACP), Georgia Coalition for the Peoples’ Agenda (GCPA), and Asian Americans Advancing Justice Atlanta. The suit claimed that the exact match system used to verify a voter’s identity against the Social Security Database (SSD) and the Department of Drivers’ Services (DDS) disproportionately affected black, Latino and Asian American applicants. The plaintiffs subpoenaed the data as part of the litigation, and a member of counsel from the Lawyers’ Committee sent it to me after I contacted her requesting it. The data include information on all 646,287 registration applicants that were rejected between July 2013 and July 2016. For reference, during the November 2014 elections there were 6,036,491 registered voters in Georgia, meaning that the number of rejected applicants represents more than 10% of the entire electorate (SOS “Voter Registration Figures”). In the data set, each entry includes the following identifiers: name, address, county, race, gender, year of birth, reason for rejection and date of rejection. Out of the pool of 646,287, the lawsuit focused on the 34,874 applicants who were canceled due to being “Not Verified,” which comprised 5% of the whole set. Based on an interview with a representative from the Secretary of State’s office, “Not Verified” means that the application was entered and sent for verification with DDS, as all paper applications are, and DDS could not match all of the fields from the form with its system, and after the county did not hear from the individual in 40 days, the application was canceled (Xxxxxxx 2017). Further explanation of the verification process proceeds in the next section, as well as explanations on the different reasons for rejection, but it is important to note that as a result of the lawsuit the Secretary of State’s office stopped using the exact match system.3 In other words, the suit was successful in demonstrating that this particular reason and method for verification was affecting minorities disproportionately. ...
Source of the data. All Data in TIS/OBI is provided by the IMs, RUs and terminals. The Data which can be retrieved by the TIS-User for reporting purposes is based on the signed TIS User Agreement and TIS Data Sharing Declarations and assigned to the company the TIS-User is linked to.

Related to Source of the data

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • MOBILE DATA COMPUTERS 23 1. As part of the law enforcement services to be provided to CITY, COUNTY 24 has provided, or will provide, mobile data computers (hereinafter called 25 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 26 designated by COUNTY for use within CITY limits.

  • Information Systems 5.1. The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

Time is Money Join Law Insider Premium to draft better contracts faster.