Use of Mobile Subscriber Details and Device Data Sample Clauses

Use of Mobile Subscriber Details and Device Data. In addition to any other information collection and sharing provisions in this Agreement, you acknowledge that we or Zelle may use information on file with your wireless operator to further verify your identity and to protect against or prevent actual or potential fraud or unauthorized use of any applicable Service. By using the Zelle Payment Service, any other P2P Service, or the External Transfer Serviceyou authorizeyour wireless operator (AT&T, Sprint, T-Mobile, US Cellular, Verizon, or any other branded wireless operator) to use or disclose information related to your wireless subscriber account (such as your mobile number, name, address, email, network status, customer type, mobile device identifiers and other device and subscriber status information), to us or our service providers which we or they may use for the duration of our business relationship, solely to verify your identity and help prevent fraud. See Xxxxx’x Privacy Policy at xxxxx://xxx.xxxxxxxx.xxx/privacy -policy for information about how Zelle treats your data. You may view the Regions Privacy Pledge at xxxxx://xxx.xxxxxxx.xxx/about- regions/privacy-security/privacy-pledge.
AutoNDA by SimpleDocs
Use of Mobile Subscriber Details and Device Data. In addition to any other information collection and sharing provisions in this Agreement, you acknowledge that we or Zelle® may use information on file with your wireless operator to further verify your identity and to protect against or prevent actual or potential fraud or unauthorized use of any applicable Service. By using the Zelle® Payment Service, any other P2P Service, or the External Transfer Service you authorize your wireless operator (AT&T, Sprint, T-Mobile, US Cellular, Verizon, or any other branded wireless operator) to disclose your mobile number, name, address, email, network status, customer type, customer role, billing type, mobile device identifiers (IMSI and IMEI) and other subscriber status and device details, if available, to us or our service providers solely to allow verification of your identity and to compare information you have provided to us or to Zelle® with your wireless operator account profile information for the duration of our business relationship. See Zelle®’s Privacy Policy at xxxxx://xxx.xxxxxxxx.xxx/privacy-policy for information about how Zelle® treats your data. You may view the Regions Privacy Pledge at xxxxx://xxx.xxxxxxx.xxx/about-regions/privacy- security/privacy-pledge.

Related to Use of Mobile Subscriber Details and Device Data

  • Mobile Subscriber Information You authorize your wireless carrier to disclose information about your account, such as subscriber status, payment method and device details, if available, to support identity verification, fraud avoidance and other uses in support of transactions for the duration of your business relationship with us. This information may also be shared with other companies to support your transactions with us and for identity verification and fraud avoidance purposes.

  • Subscriber Data Subscriber will timely supply Netgateway, in a form acceptable to Netgateway, with all data necessary for Netgateway to perform the ongoing services to be provided hereunder. It is the sole responsibility of Subscriber to insure the completeness and accuracy of such data.

  • Subscriber Network The trunk and feeder signal distribution network over which video, audio, text and data signals are transmitted to Subscribers.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • - PROTECTION OF SUBSCRIBER PRIVACY (a) The Licensee shall respect the rights of privacy of every Subscriber and/or User of the Cable Television System and shall not violate such rights through the use of any device or Signal associated with the Cable Television System, and as hereafter provided.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Subscriber Information Please print your individual or entity name and address. Joint subscribers should provide their respective names. Your name and address will be recorded exactly as printed below.

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Time is Money Join Law Insider Premium to draft better contracts faster.