Monitoring and Collection of Data Sample Clauses

Monitoring and Collection of Data. WOW! and its equipment suppliers (including eero), vendors, partners and licensors (sometimes referred to as “WiFi Suppliers”) may collect and use certain information about you when you use WOW! WBWF. We use this information to register your subscription to WOW! WBWF and authenticate you as a valid WOW! Internet and WiFi subscriber authorized to access WOW! WBWF, which may include without limitation name, phone number, email address and password, the configuration of your WiFi- enabled device and the unique device identifier (“Device ID”) associated with your device (such as a serial number and/or MAC address), and IP address associated with your Internet service. Once you are registered and authenticated, your information will be stored by WOW! and/or its WiFi Suppliers to allow you to auto- connect to WOW! WBWF without having to authenticate each time you access the WOW! WBWF. Periodically you will be required to re-authenticate. WOW! and/or its WiFi Suppliers may track and store IP addresses and the MAC address of your device accessing WOW! WBWF, as well as usage data associated with the MAC addresses of each device. We also may collect usage data relating to your use of WOW! WBWF, which data will be collected in the aggregate and linked only to your Device ID. You further acknowledge and agree that WOW! and/or its WiFi Suppliers: (i) has the right to electronically monitor your use of WOW! WBWF to operate the WiFi Equipment properly, to protect itself or its subscribers, to enhance or develop WOW! services offered to you, to disclose any information as necessary to satisfy any law, regulation or other governmental request (such as a subpoena or court order), or to protect our rights, network, users or property; and (ii) monitor the traffic for network management and security purposes, such as identifying malware, bandwidth consumption, location of the access points, session start and end time, types of protocols and applications used, and illegal content such as child pornography; and (iii) may also collect additional personal information from you, as part of a registration process or otherwise. We may use that information for marketing and other purposes. More information about the collection of data is available in the WOW! Privacy Policy located at xxxxx://xxx.xxxxxx.xxx/docs/wow/documents-terms-and-conditions/privacy-policy.pdf, and the eero privacy policy located at xxxxx://xxxx.xxx/legal/privacy. YOU HEREBY AGREE AND CONSENT TO OUR AND OUR WIFI S...
AutoNDA by SimpleDocs
Monitoring and Collection of Data. All monitoring and data collection under Exhibit A is a joint responsibility of DWR and the Participating Districts, as follows:

Related to Monitoring and Collection of Data

  • Collection of Data The Insured acknowledges being informed that the Insurer processes his personal data in accordance with regulations relative to the protection of personal data in effect and that, moreover: - the answers to the questions asked are mandatory and that in the event of false declarations or omissions, the consequences for him may be invalidity of the subscription to the contract (article L 113-8 of the Insurance Code) or the reduction of indemnities (article L 113-9 of the Insurance Code), • The processing of personal data is necessary for acceptance and execution of its contract and its guarantees, for the management of commercial and contractual relationships, and for the execution of legal, regulatory or administrative provisions in effect. • The data collected and processed is kept for the period necessary for execution of the contract or the legal obligation. This data is then archived in accordance with the durations specified by the provisions relative to time limits. • The recipients of the data concerning him are, within the limits of their powers, the services of the Insurer in charge of signature, management and execution of the Insurance Contract and guarantees, its delegates, agents, partners, subcontractors and reinsurers, within the framework of their duties. It can also be sent, if necessary, to professional bodies as well as to all persons involved in the contract such as lawyers, experts, court officials and ministerial officers, trustees, guardians or investigators. Information concerning him may also be transmitted to the Underwriter, as well as to all persons authorized as Authorized Third Parties (courts, arbitrators, mediators, relevant ministries, supervisory and regulatory authorities and all public bodies authorized to receive it as well as departments in charge of control such as statutory auditors, auditors as well as departments in charge of internal control). • In its capacity as a financial organization, the Insurer is subject to the legal obligations resulting mainly from the Monetary and Financial Code with regard to money laundering and against the financing of terrorism and, as such, it monitors contracts, which may result in the drafting of a declaration of suspicion or a measure of freezing of assets. The data and documents concerning the Insured are kept for a period of five (5) years from the end of the contract or termination of the relationship. • His personal information will also be able to be used within the framework of processing to fight against insurance fraud, which may lead, if applicable, to placement on a list of persons presenting a risk of fraud. This registration may have the effect of extending examination of his case, or even the reduction or refusal of the benefit of a right, benefit, contract or service offered. In this context, personal data concerning him (or concerning persons or parties who are interested in the contract may be processed by any authorized persons working within the entities of the Insurer Group in the context of the fight against fraud. This data may also be intended for the authorized personnel of organizations directly concerned by fraud (other insurance organizations or intermediaries; judicial authorities, mediators, arbitrators, court officials, legal officers; third-party organizations authorized by a legal provision and, if applicable, victims of acts of fraud or their representatives). In the event of a fraud alert, the data is kept for a maximum of six (6) months to qualify the alert and then deleted, unless the alert is relevant. In the event of a relevant alert, the data is kept for up to five (5) years following closure of the fraud case, or until the end of the legal proceedings and the applicable limitation periods. For people registered on a list of suspected fraudsters, their data is deleted after 5 years from the date of placement on this list. • In its capacity as insurer, it is founded in carrying out the processing of data relative to violations, condemnations and measures of security, either at the time of subscription of the insurance contract, or during the period of execution, or within the framework of the handling of legal action. • Personal data may be used by the Insurer within the framework of processing implemented by the insurer, the purpose of which is research and development to improve the quality or relevance of its future insurance or assistance products and service offers • Personal data concerning him may be accessible to some of the Insurer's employees or service providers established in countries outside the European Union. • By proving his identity, the Insured has a right of access, rectification, deletion and opposition concerning the data processed. He also has the right to ask to limit the use of his data when it is no longer necessary, or to recover, in a structured format, the data that he has provided when it was necessary for the contract or when he consented to the use of this data. He has the right to provide instructions relative to the fate of his personal data after his death. These instructions, general or specific, concern the storage, removal and communication of his data after his death. These rights can be exercised with the Insurer's Data Protection Representative: - by email: sent to XXXX@XXXXXXXX.xx or - by postal mail: by writing to the following address: Délégué représentant à la protection des données – MUTUAIDE ASSISTANCE – 000, xxx xx xx Xxxxxx – 93196 Noisy le Grand. After having made a request to the Data Protection Representative without having received satisfaction, he has the possibility of contacting the CNIL (Commission Nationale de l'informatique et des Libertés).

  • Data Collection and Reporting 1. Grantee shall develop and use a local reporting unit that will provide an assigned location for all clients served within the Hospital. This information shall also be entered into Client Assignment and Registration (CARE)when reporting on beds utilized at the Hospital.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

Time is Money Join Law Insider Premium to draft better contracts faster.