Collection and Use of Your Information You acknowledge that when you download, install, or use the Application, Company may use automatic means (including, for example, cookies and web beacons) to collect information about your Mobile Device and about your use of the Application. You also may be required to provide certain information about yourself as a condition to downloading, installing, or using the Application or certain of its features or functionality, and the Application may provide you with opportunities to share information about yourself with others. All information we collect through or in connection with this Application is subject to our Privacy Policy. By downloading, installing, using, and providing information to or through this Application, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.
Employee Access to Personnel File An employee shall have the right to read and review his/her personnel file on reasonable notice and by written request to the Human Resources Manager. An employee may request and shall receive a copy of any record or document contained in the employee’s personnel file.
Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.
CENTURYLINK OSS INFORMATION 57.1 Subject to the provisions of this Agreement and Applicable Law, CLEC shall have a limited, revocable, non-transferable, non-exclusive right to use CenturyLink OSS Information during the term of this Agreement, for CLEC’s internal use for the provision of Telecommunications Services to CLEC End Users in the State.
Providing Information As a condition of using the Stripe Issuing Services, Stripe may require you to provide User Information, information regarding Authorised Users (including name, address, birthdate, and government-issued identification documents), and information about your activities and intended use of the Stripe Issuing Services. This information may be separate from or in addition to information you may have previously provided to Stripe in connection with other Services. You must promptly provide all additional financial and other information Stripe requests from time to time.
INFORMATION AND SERVICES TO BE FURNISHED BY THE LPA The information and services to be furnished by the LPA are set out in Appendix "B” which is herein attached to and made an integral part of this Contract.
Information Provided You have not provided and will not provide to the purchasers of Shares any written or oral information regarding the business of the Company, including any representations regarding the Company’s financial condition or financial prospects, other than such information as is contained in the Prospectus. You further covenant that, in connection with the Offering you will use your best efforts to comply with such purchaser suitability requirements
Processing of Company Personal Data 2.1 Processor shall:
Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.
Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.