Automatically Collected Information Sample Clauses

Automatically Collected Information. Every time you visit a website, some information is automatically collected from you. For example, this information may include some or all of the following items: your computer’s internet protocol (ip) address and/or domain; type and version of internet browser software and operating system you use; date, time, and duration of your website access; specific pages, buttons, images, videos, links, or forms that you access while visiting the website; and demographic information concerning the country of origin of your computer and the language(s) used by it.
AutoNDA by SimpleDocs
Automatically Collected Information. In addition, the Application may collect certain information automatically, including, but not limited to, the type of mobile device you use, Your mobile devices unique device ID, the IP address of Your mobile device, Your mobile operating system, the type of mobile Internet browsers you use, and information about the way you use the Application.
Automatically Collected Information. We automatically gather information whenever you visit, log in, or otherwise interact with the Services, including when you receive electronic messages delivered via the Services. We use relevant tools to gather this information to enhance and operate the Services in several ways, such as to:  Store user preferences;  Maintain session activity and sessions;  Validate users;  Enable support and security features; and  Conduct performance analysis of the Services. When you interact with the Services, we collect information about the software running on the computer, mobile phone, or tablet (each, a "Device") you use to interact with the Services, including the Device type, operating system and browser type. We collect information about you and your Devices through cookies, web beacons, and similar technologies. A "cookie" is a small data file sent from a website and stored on your Device to identify your Device in the future and allow for an enhanced personalised user experience based on your previous activity on the website. A "session cookie" disappears after you close your web browser, or may expire after a fixed period of time. A "persistent cookie" remains after you close your web browser and may be accessed every time you use the Services. We may use both session and persistent cookies on the Services. You should consult your web browser to modify your cookie settings. Please note that if you delete or choose not to accept cookies from us, you may not be able to use certain features of the Services. Some of our technology partners may deploy similar technologies directly on the Services. These third parties may collect information over time about your use of services provided by them facilitated through the Services, as well as your online activities across other websites or online services accessed through them. Use of Information We may use the information we collect for the following purposes:  Providing the Services and related support;  Developing new functionality and features;  Obtaining feedback from you;  Sharing content in the manner permitted by your User Agreement;  Performance analysis for the Services;  Safeguarding and protecting the Services, the information we collect, and the rights of us, our users or third parties, and in response to legal process;  Any other purpose described in this Statement or your User Agreement; or  As otherwise permitted by you. Permitted Sharing via the Services The Services can be used to facil...
Automatically Collected Information. Similar to other websites, we may collect some information automatically and store it in log files through the use of “cookies” and other tracking mechanisms. This information is non‐personal and does not identify you. The information collected may include, but is not limited to: your IP address, browser type and language, referring and exit pages and URLs, search engine used, other browser history, platform type, number of clicks, landing pages, cookie information, the pages you requested and viewed, the amount of time spent on particular pages, and the date and time of your visit. We collect this non‐personally identifiable information in order to help diagnose problems with our servers and to administer the Site. Your IP address is also used to help identify you and to gather broad demographic information. We may also use cookies, Clear GIFs, and log file information to: (a) store information so that you will not have to re‐enter it during your visit or the next time you visit the Site; (b) monitor aggregate metrics such as total number of visitors, pages viewed, etc.; and (c) track entries, submissions and status in any interactive portions of the Site.
Automatically Collected Information. With regard to each of your visits to our Site we will automatically collect the following information: • Technical Data: technical information, including the Internet protocol (IP) address used to connect your computer to the Internet, your login information, browser type and version, time zone setting, browser plug-in types and versions, operating system and platform, how often you use the application and other performance data;] and
Automatically Collected Information. We automatically gather information whenever you visit, log in, or otherwise interact with the Services, including when you receive electronic messages delivered via the Services. We use relevant tools to gather this information to enhance and operate the Services in several ways, such as to: • Store user preferences; • Maintain session activity and sessions; • Validate users; • Enable support and security features; and • Conduct performance analysis of the Services. When you interact with the Services, we collect information about the software running on the computer, mobile phone, or tablet (each, a "Device") you use to interact with the Services, including the Device type, operating system and browser type. We may also collect information about you should you interact with the Services, even if you do not register to use the Services. We collect information about you and your Devices through cookies, web beacons, and similar technologies. A "cookie" is a small data file sent from a website and stored on your Device to identify your Device in the future and allow for an enhanced personalised user experience based on your previous activity on the website. A "session cookie" disappears after you close your web browser, or may expire after a fixed period of time. A "persistent cookie" remains after you close your web browser and may be accessed every time you use the Services. We may use both session and persistent cookies on the Services. You should consult your web browser to modify your cookie settings. Please note that if you delete or choose not to accept cookies from us, you may not be able to use certain features of the Services. Some of our technology partners may deploy similar technologies directly on the Services. These third parties may collect information over time about your use of services provided by them facilitated through the Services, as well as your online activities across other websites or online services accessed through them. Use of Information We may use the information we collect for the following purposes: • Providing the Services and related support; • Developing new functionality and features; • Obtaining feedback from you; • Sharing content in the manner permitted by your User Agreement; • Performance analysis for the Services; • Safeguarding and protecting the Services, the information we collect, and the rights of us, our users or third parties, and in response to legal process; • Any other purpose described in this Statemen...
Automatically Collected Information. Some information is collected automatically from your browser when you enter Glimmer’s website (xxxxxxxxx.xxx). This information includes your IP address, your browser type and language, access times, the content of any undeleted cookies that your browser previously accepted from us (see "Cookies" below), and the referring website address.
AutoNDA by SimpleDocs

Related to Automatically Collected Information

  • Protected Information 5.3.1 In this Section "

  • Requested Information with reasonable promptness, such other data and information relating to the business, operations, affairs, financial condition, assets or properties of the Company or any of its Subsidiaries or relating to the ability of the Company to perform its obligations hereunder and under the Notes as from time to time may be reasonably requested by any such holder of Notes.

  • Excluded Information For purposes of this Agreement, the term “confidential and proprietary information” shall not include (i) information already known or independently developed by the recipient without the use of any confidential and proprietary information, or (ii) information known to the public through no wrongful act of the recipient.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Request for Redacted Information In the event of a public records or other disclosure request pursuant to Chapter 119, Florida Statutes, the Florida Constitution or other authority, to which documents that are marked as “Confidential” are responsive, the Department will provide the Contractor- redacted copies to the requestor. If a requestor asserts a right to the Confidential Information, the Department will notify the Contractor such an assertion has been made. It is the Contractor’s responsibility to assert that the information in question is exempt from disclosure under Chapter 119 or other applicable law. If the Department becomes subject to a demand for discovery or disclosure of the Confidential Information of the Contractor under legal process, the Department shall give the Contractor prompt notice of the demand prior to releasing the information labeled “Confidential” (unless otherwise prohibited by applicable law). The Contractor shall be responsible for defending its determination that the redacted portions of its response are confidential, proprietary, trade secret, or otherwise not subject to disclosure.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Excluded Confidential Information The obligations of the Receiving Party pursuant to the provisions of this Agreement shall not apply to any Confidential Information that:

  • Confidential Information Definition Grantee acknowledges it and its employees or agents may, in the course of performing its responsibilities, be exposed to or acquire information that is: (i) confidential to Agency or Project participants or (ii) the disclosure of which is restricted under federal or state law, including without limitation: (a) personal information, as that term is used in ORS 646A.602(12), (b) social security numbers, and (c) information protected by the federal Family Educational Rights and Privacy Act under 20 USC § 1232g (items (i) and (ii) separately and collectively “Confidential Information”).

  • Confidential Information Defined For the purposes of this ARR Agreement, “Confidential Information” means nonpublic proprietary information of a Party (the “Disclosing Party”) that is disclosed to another Party (each such Party, a “Receiving Party”), including but not limited to: (i) business or technical processes, formulae, source codes, object code, product designs, sales, cost and other unpublished financial information, customer information, product and business plans, projections, marketing data or strategies, trade secrets, intellectual property rights, know-how, expertise, methods and procedures for operation, information about employees, customer names, business or technical proposals, and any other information which is or should reasonably be understood to be confidential or proprietary to the Disclosing Party; and (ii) PII (as defined in Section 7.03 of this ARR Agreement). The foregoing definition of Confidential Information applies to: (i) all such information, whether tangible or intangible and regardless of the medium in which it is stored or presented; and (ii) all copies of such information, as well as all memoranda, notes, summaries, analyses, computer records, and other materials prepared by the Receiving Party or any of its employees, agents, advisors, directors, officers, and subcontractors (collectively “Representatives”) that contain or reflect the Confidential Information.

  • Your Information You must provide updated information to any person to whom you claimed to be an exempt payee if you are no longer an exempt payee and anticipate receiving reportable payments in the future from this person. For example, you may need to provide updated information if you are a C corporation that elects to be an S corporation, or if you no longer are tax exempt. In addition, you must furnish a new Form W-9 if the name or TIN changes for the account; for example, if the grantor of a grantor trust dies. Penalties Failure to furnish TIN. If you fail to furnish your correct TIN to a requester, you are subject to a penalty of $50 for each such failure unless your failure is due to reasonable cause and not to willful neglect. Civil penalty for false information with respect to withholding. If you make a false statement with no reasonable basis that results in no backup withholding, you are subject to a $500 penalty. Criminal penalty for falsifying information. Willfully falsifying certifications or affirmations may subject you to criminal penalties including fines and/or imprisonment.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!