Compliance with Privacy Code The Corporation acknowledges that the Warrant Agent may, in the course of providing services hereunder, collect or receive financial and other personal information about such parties and/or their representatives, as individuals, or about other individuals related to the subject matter hereof, and use such information for the following purposes: (a) to provide the services required under this Indenture and other services that may be requested from time to time; (b) to help the Warrant Agent manage its servicing relationships with such individuals; (c) to meet the Warrant Agent’s legal and regulatory requirements; and (d) if Social Insurance Numbers are collected by the Warrant Agent, to perform tax reporting and to assist in verification of an individual’s identity for security purposes. The Corporation acknowledges and agrees that the Warrant Agent may receive, collect, use and disclose personal information provided to it or acquired by it in the course of its acting as agent hereunder for the purposes described above and, generally, in the manner and on the terms described in its privacy code, which the Warrant Agent shall make available on its website or upon request, including revisions thereto. Further, the Corporation agrees that it shall not provide or cause to be provided to the Warrant Agent any personal information relating to an individual who is not a party to this Indenture unless the Corporation has assured itself that such individual understands and has consented to the aforementioned uses and disclosures.
Compliance with Illinois Privacy Laws In performing its obligations under the Agreement, the Provider shall comply with all Illinois laws and regulations pertaining to student data privacy, confidentiality, and maintenance, including but not limited to the Illinois School Student Records Act ("ISSRA"), 105 ILCS 10/, Mental Health and Developmental Disabilities Confidentiality Act ("MHDDCA"), 740 ILCS 110/, Student Online Personal Protection Act ("SOPPA"), 105 ILCS 85/, Identity Protection Act ("IPA"), 5 ILCS 179/, and Personal Information Protection Act ("PIPA"), 815 ILCS 530/, and Local Records Act (“LRA”), 50 ILCS 205/.
Compliance with Existing Laws Xxxxxxx, agrees to comply with all federal, state, and municipal laws, rules, and regulations in the performance of this Agreement that are generally applicable to the activities in which the Grantee is engaged in the performance of said contracts.
Compliance with Privacy Laws NCPS represents and warrants that its collection, access, use, storage, disposal and disclosure of Personal Data does and will comply with all applicable federal and state privacy and data protection laws, as well as all other applicable regulations. Without limiting the foregoing, NCPS shall implement administrative, physical and technical safeguards to protect Personal Data that are no less rigorous than accepted industry, and shall ensure that all such safeguards, including the manner in which Personal Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with applicable data protection and privacy laws, as well as the terms and conditions of this Escrow Agreement. NCPS shall use and disclose Personal Data solely and exclusively for the purposes for which the Personal Data, or access to it, is provided pursuant to the terms and conditions of this Escrow Agreement, and not use, sell, rent, transfer, distribute, or otherwise disclose or make available Personal Data for NCPS’s own purposes or for the benefit of any party other than Issuer. For purposes of this section, “Personal Data” shall mean information provided to NCPS by or at the direction of the Issuer, or to which access was provided to NCPS by or at the direction of the Issuer, in the course of NCPS’s performance under this Escrow Agreement that: (i) identifies or can be used to identify an individual (also known as a “data subject”) (including, without limitation, names, signatures, addresses, telephone numbers, e-mail addresses and other unique identifiers); or (ii) can be used to authenticate an individual (including, without limitation, employee identification numbers, government-issued identification numbers, passwords or PINs, financial account numbers, credit report information, biometric or health data, answers to security questions and other personal identifiers), including the identifying information on individuals described in Section 12.