Collection of data to activate FleetView Sample Clauses

Collection of data to activate FleetView. WIRTGEN collects and processes data like customer number, customer, address, zip code, country, name, first name, phone, e-mail address, language and WIRTGEN GROUP subsidiaries and authorized dealers´ in- formation. Further details are provided in the WITOS FleetView Privacy Notice #WG-6 (EEA), #WG-7 (Rest of World).
AutoNDA by SimpleDocs

Related to Collection of data to activate FleetView

  • Collection of Data The Insured acknowledges being informed that the Insurer processes his personal data in accordance with regulations relative to the protection of personal data in effect and that, moreover: - the answers to the questions asked are mandatory and that in the event of false declarations or omissions, the consequences for him may be invalidity of the subscription to the contract (article L 113-8 of the Insurance Code) or the reduction of indemnities (article L 113-9 of the Insurance Code), • The processing of personal data is necessary for acceptance and execution of its contract and its guarantees, for the management of commercial and contractual relationships, and for the execution of legal, regulatory or administrative provisions in effect. • The data collected and processed is kept for the period necessary for execution of the contract or the legal obligation. This data is then archived in accordance with the durations specified by the provisions relative to time limits. • The recipients of the data concerning him are, within the limits of their powers, the services of the Insurer in charge of signature, management and execution of the Insurance Contract and guarantees, its delegates, agents, partners, subcontractors and reinsurers, within the framework of their duties. It can also be sent, if necessary, to professional bodies as well as to all persons involved in the contract such as lawyers, experts, court officials and ministerial officers, trustees, guardians or investigators. Information concerning him may also be transmitted to the Underwriter, as well as to all persons authorized as Authorized Third Parties (courts, arbitrators, mediators, relevant ministries, supervisory and regulatory authorities and all public bodies authorized to receive it as well as departments in charge of control such as statutory auditors, auditors as well as departments in charge of internal control). • In its capacity as a financial organization, the Insurer is subject to the legal obligations resulting mainly from the Monetary and Financial Code with regard to money laundering and against the financing of terrorism and, as such, it monitors contracts, which may result in the drafting of a declaration of suspicion or a measure of freezing of assets. The data and documents concerning the Insured are kept for a period of five (5) years from the end of the contract or termination of the relationship. • His personal information will also be able to be used within the framework of processing to fight against insurance fraud, which may lead, if applicable, to placement on a list of persons presenting a risk of fraud. This registration may have the effect of extending examination of his case, or even the reduction or refusal of the benefit of a right, benefit, contract or service offered. In this context, personal data concerning him (or concerning persons or parties who are interested in the contract may be processed by any authorized persons working within the entities of the Insurer Group in the context of the fight against fraud. This data may also be intended for the authorized personnel of organizations directly concerned by fraud (other insurance organizations or intermediaries; judicial authorities, mediators, arbitrators, court officials, legal officers; third-party organizations authorized by a legal provision and, if applicable, victims of acts of fraud or their representatives). In the event of a fraud alert, the data is kept for a maximum of six (6) months to qualify the alert and then deleted, unless the alert is relevant. In the event of a relevant alert, the data is kept for up to five (5) years following closure of the fraud case, or until the end of the legal proceedings and the applicable limitation periods. For people registered on a list of suspected fraudsters, their data is deleted after 5 years from the date of placement on this list. • In its capacity as insurer, it is founded in carrying out the processing of data relative to violations, condemnations and measures of security, either at the time of subscription of the insurance contract, or during the period of execution, or within the framework of the handling of legal action. • Personal data may be used by the Insurer within the framework of processing implemented by the insurer, the purpose of which is research and development to improve the quality or relevance of its future insurance or assistance products and service offers • Personal data concerning him may be accessible to some of the Insurer's employees or service providers established in countries outside the European Union. • By proving his identity, the Insured has a right of access, rectification, deletion and opposition concerning the data processed. He also has the right to ask to limit the use of his data when it is no longer necessary, or to recover, in a structured format, the data that he has provided when it was necessary for the contract or when he consented to the use of this data. He has the right to provide instructions relative to the fate of his personal data after his death. These instructions, general or specific, concern the storage, removal and communication of his data after his death. These rights can be exercised with the Insurer's Data Protection Representative: - by email: sent to XXXX@XXXXXXXX.xx or - by postal mail: by writing to the following address: Délégué représentant à la protection des données – MUTUAIDE ASSISTANCE – 000, xxx xx xx Xxxxxx – 93196 Noisy le Grand. After having made a request to the Data Protection Representative without having received satisfaction, he has the possibility of contacting the CNIL (Commission Nationale de l'informatique et des Libertés).

  • Collection of Dues (a) Upon receipt of a “Payroll Deduction Authorization” from an employee, in the form attached hereto as Exhibit I, AT&T will initiate deductions for amounts equal to Union Dues (and, if authorized, an Initiation Fee) from such Article 7 employee’s salary or wages, sickness or disability payments, or other benefit payments or vacation payments.

  • Voice Information Service Traffic 5.1 For purposes of this Section 5, (a) Voice Information Service means a service that provides [i] recorded voice announcement information or [ii] a vocal discussion program open to the public, and (b) Voice Information Service Traffic means intraLATA switched voice traffic, delivered to a Voice Information Service. Voice Information Service Traffic does not include any form of Internet Traffic. Voice Information Service Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information Service Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment.

  • FORMAT AND CONTENT FOR REGISTRY OPERATOR MONTHLY REPORTING Registry Operator shall provide one set of monthly reports per gTLD, using the API described in draft-­‐xxxxxx-­‐icann-­‐registry-­‐interfaces, see Specification 2, Part A, Section 9, reference 5, with the following content. ICANN may request in the future that the reports be delivered by other means and using other formats. ICANN will use reasonable commercial efforts to preserve the confidentiality of the information reported until three (3) months after the end of the month to which the reports relate. Unless set forth in this Specification 3, any reference to a specific time refers to Coordinated Universal Time (UTC). Monthly reports shall consist of data that reflects the state of the registry at the end of the month (UTC).

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit B.

  • Diagnostic and Usage Data If you opt in to diagnostic and usage collection, you agree that Apple and its subsidiaries and agents may collect, maintain, process and use diagnostic, technical, usage and related information, including but not limited to information about your computer, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services to you (if any) related to the Apple Software, and to verify compliance with the terms of this License. Apple may use this information, as long as it is collected in a form that does not personally identify you, to provide and improve Apple’s products and services. To enable Apple’s partners and third party developers to improve their software, hardware and services designed for use with Apple products, Apple may also provide any such partner or third party developer with a subset of diagnostic information that is relevant to that partner’s or developer’s software, hardware and/or services, as long as the diagnostic information is in a form that does not personally identify you.

  • Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA.

  • Jointly Provided Switched Access Services 7.5.1 Jointly Provided Switched Access Service is described and governed by the FCC and state access Tariffs, Multiple Exchange Carrier Access Billing (MECAB) and Multiple Exchange Carrier Ordering and Design (MECOD) Guidelines and based on LERG routing, and is not modified by any provisions of this Agreement. Both Parties agree to comply with such guidelines. CenturyLink and CLEC agree that the originating, intermediate, and terminating LECs for switched access will cooperatively determine the Jointly Provided Switched Access arrangements in which all parties concur.

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, e-Tel must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!