Closed systems Sample Clauses

Closed systems. For the purposes of this discussion, a closed system is one in which all components that process, transmit or store personal information, as well as all users and operators with access to personal information can be trusted or held accountable for respecting applicable laws and regulations concerning the use of the private information. An example is a corporate network, where personal data is processed, transmitted and stored exclusively by data processing hardware and software owned and operated by the corporation, and all users and operators with access to personal information are employees. Implementing the ‘right to be forgotten’ in such a network is technically feasible, though not without its challenges. For instance, when the owner of an item of personal information exercises her right to be forgotten, finding and removing all copies of the information and any derived information (including cached copies stored on the local disks of employee computers, backup copies stored on archival storage media, etc.) can be technically challenging and require substantial operational overhead. A more complex type of closed system is an industry that shares personal information and is regulated by the government regarding the use of this information. For instance, the United States health care industry (health providers, insurance companies, and health care billing companies) as well as employers share patient records, and are jointly responsible for handling this information in accordance with Title II of the US Health Insurance Portability and Accountability Act (HIPAA). Participating companies and organizations are trusted and held accountable for their appropriate use of personal information. The system is closed because all parties with access to the personal information are held accountable for their compliance with the law, and all personal information remains with the jurisdiction of the USA. In principle, the “right to be forgotten” can be implemented in such a system. In practice, however, privacy breaches in the healthcare sector are not uncommon, nor are losses of credit card information in the banking industry. This suggests that enforcing the right to be forgotten may be challenging even in closed systems. Even in closed systems, all users with access to personal information must be trusted to respect applicable privacy laws, because it is very difficult to ensure compliance by technical means alone. For instance, it would be difficult to prevent an...
AutoNDA by SimpleDocs

Related to Closed systems

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.

  • Trunk Group Connections and Ordering 5.2.1 For both One-Way and Two-Way Interconnection Trunks, if Onvoy wishes to use a technically feasible interface other than a DS1 or a DS3 facility at the POI, the Parties shall negotiate reasonable terms and conditions (including, without limitation, rates and implementation timeframes) for such arrangement; and, if the Parties cannot agree to such terms and conditions (including, without limitation, rates and implementation timeframes), either Party may utilize the Agreement’s dispute resolution procedures. 5.2.2 When One-Way or Two-Way Interconnection Trunks are provisioned using a DS3 interface facility, if Onvoy orders the multiplexed DS3 facilities to a Frontier Central Office that is not designated in the NECA 4 Tariff as the appropriate Intermediate Hub location (i.e., the Intermediate Hub location in the appropriate Tandem subtending area based on the LERG), and the provision of such facilities to the subject Central Office is technically feasible, the Parties shall negotiate in good faith reasonable terms and conditions (including, without limitation, rates and implementation timeframes) for such arrangement; and, if the Parties cannot agree to such terms and conditions (including, without limitation, rates and implementation timeframes), either Party may utilize the Agreement’s dispute resolution procedures. 5.2.3 Each Party will identify its Carrier Identification Code, a three or four digit numeric code obtained from Telcordia, to the other Party when ordering a trunk group. 5.2.4 For multi-frequency (MF) signaling each Party will out pulse ten (10) digits to the other Party, unless the Parties mutually agree otherwise. 5.2.5 Each Party will use commercially reasonable efforts to monitor trunk groups under its control and to augment those groups using generally accepted trunk- engineering standards so as to not exceed blocking objectives. Each Party agrees to use modular trunk-engineering techniques for trunks subject to this Attachment.

  • The Business The parties acknowledge that the Company is engaged in the development, marketing and sale of certain proprietary technologies, processes and related products in the areas of chemical detection, technical processes, and technical/business services, and that the Company may also from time to time become or may intend to become engaged in other business endeavors (individually and collectively, the "BUSINESS"). The Company shall be deemed to intend to become engaged in a business endeavor if it has devoted or expended any significant resources, either financial or human resources, towards the proposed endeavor, either in planning or implementing the undertaking of such planned endeavor.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Outside Businesses Subject to the provisions of Section 6.3, any Covered Person, the Sponsor, the Delaware Trustee and the Property Trustee may engage in or possess an interest in other business ventures of any nature or description, independently or with others, similar or dissimilar to the activities of the Trust, and the Trust and the Holders of Securities shall have no rights by virtue of this Trust Agreement in and to such independent ventures or the income or profits derived therefrom, and the pursuit of any such venture, even if competitive with the activities of the Trust, shall not be deemed wrongful or improper. No Covered Person, the Sponsor, the Delaware Trustee or the Property Trustee shall be obligated to present any particular investment or other opportunity to the Trust even if such opportunity is of a character that, if presented to the Trust, could be taken by the Trust, and any Covered Person, the Sponsor, the Delaware Trustee and the Property Trustee shall have the right to take for its own account (individually or as a partner or fiduciary) or to recommend to others any such particular investment or other opportunity. Any Covered Person, the Delaware Trustee and the Property Trustee may engage or be interested in any financial or other transaction with the Sponsor or any Affiliate of the Sponsor, or may act as depositary for, trustee or agent for, or act on any committee or body of holders of, securities or other obligations of the Sponsor or its Affiliates.

  • DISADVANTAGED BUSINESS ENTERPRISE OR HISTORICALLY UNDERUTILIZED BUSINESS REQUIREMENTS The Engineer agrees to comply with the requirements set forth in Attachment H, Disadvantaged Business Enterprise or Historically Underutilized Business Subcontracting Plan Requirements with an assigned goal or a zero goal, as determined by the State.

  • Assumed Business Names Borrower has filed or recorded all documents or filings required by law relating to all assumed business names used by Borrower. Excluding the name of Borrower, the following is a complete list of all assumed business names under which Borrower does business: None.

  • Interconnection Service Interconnection Service allows the Interconnection Customer to connect the Large Generating Facility to the Participating TO’s Transmission System and be eligible to deliver the Large Generating Facility’s output using the available capacity of the CAISO Controlled Grid. To the extent the Interconnection Customer wants to receive Interconnection Service, the Participating TO shall construct facilities identified in Appendices A and C that the Participating TO is responsible to construct.

  • Certification as Small Contractor or Minority Business Enterprise This paragraph was intentionally left blank.

  • Non-Company Business Except with the prior written consent of the Board, Executive will not during the term of Executive’s employment with the Company undertake or engage in any other employment, occupation or business enterprise, other than ones in which Executive is a passive investor. Executive may engage in civic and not-for-profit activities so long as such activities do not materially interfere with the performance of Executive’s duties hereunder.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!