No Privacy Sample Clauses

No Privacy. You will advise Your Representatives that there is no protection of their privacy when using or accessing the ICBC Systems and that by using the ICBC Systems they consent to ICBC and its service providers monitoring and maintaining information relating to their access to and use of the ICBC Systems.
AutoNDA by SimpleDocs
No Privacy. The Technology Systems are exclusively MCOE property and student has no expectation of privacy in the contents of Student email and other student data transmitted through or saved upon the MCOE’s Technology Systems.
No Privacy. The Auburn House Network is not a private means of communication. All data stored, transmitted, processed, or otherwise accessed on the network may be monitored, filtered or recorded without notice to the user. All technology is subject to these rules, even if it is privately owned.
No Privacy. The Auburn House Network is not a private means of communication. All data stored, transmitted, processed, or otherwise accessed on the network may be monitored, filtered or recorded without notice to the user. All technology is subject to these rules, even if it is privately owned. Unacceptable Policy The following acts are unacceptable and forbidden: Damaging or intentionally disrupting the network by altering or deleting files, or introducing any programs or data designed to cause damage by spreading to other networks; Threatening, bullying, or harassing another individual; Promoting a forum for any illegal activity; Making threats; Sharing and/or distributing inappropriate material; Plagiarism; Copyright infringement Using bullying, insulting, racial or sexist language, or derogatory or offensive comment, as is any practice which is at odds with the school’s values and practices. Nothing should take place online which might bring the school into disrepute. Using the Auburn House computer network for distributing copyrighted materials, illegal, inappropriate, threatening or obscene purposes, or in support of such activities: Inappropriate use shall be defined as a violation of the intended use of the computer network. Obscene activities shall be defined as a violation of the generally accepted social standards for use of a publicly owned and operated communication vehicle. Using an account other than your own and any attempt to gain unauthorised access to accounts on the network. Attempting to obtain access to restricted sites, servers, files, databases, etc. and/or attempting to gain unauthorised access to other systems (e.g. ‘hacking’). Using personal computer equipment to access the network without prior permission. Installing personal software or uninstalling Auburn House software without prior permission. Using Internet resources and communication tools (such as games, IM, chat, etc.) not related to core curriculum or other school purposes. Using the Internet for commercial purposes, financial gain, personal business, product advertisement, or use of religious or political lobbying. Attempting vandalism. Vandalism is defined as willful or malicious destruction and any intent to harm or destroy data of another user, another agency or network that is connected to the Internet. Vandalism includes, but is not limited to, the uploading, downloading, or creation of computer viruses. Degrading or disrupting network equipment, software, or system performan...
No Privacy. I do not expect my use of Company computers, or the Company’s computer network, to be private. I acknowledge that the Company may monitor Company computer and network use and view data stored on Company computers or transmitted using the network without notice to me. I also do not expect that any Company Confidential Information, or any communications involving Company matters, including, without limitation, text messages, electronic mails, contact information, or documentation, stored on any personal communication device I may own to be private as against the Company. I acknowledge and agree that the Company can review any such Confidential Information stored on any personal communication device I may own and that I will delete all such Confidential Information from any personal communication device I may own at the Company’s request.
No Privacy. Customer acknowledges that Messages will be transmitted over the TrueDialog Platform in an unencrypted format. Customer agrees that communications and content transmitted and stored through the Services shall not be deemed confidential, TrueDialog shall have no obligation to maintain the confidentiality of your messages, and the Services should not be utilized to transmit or store sensitive personal information. To the extent permitted by law, TrueDialog may intercept and disclose any Messages transmitted over the TrueDialog Platform to the extent reasonably necessary to protect TrueDialog’s rights or property, including without limitation, to protect the operation of the TrueDialog’s Platform, or to comply with any legal, regulatory, governmental, or Network Operator inquiries or requirements. Customer agrees that communications and content transmitted through the Services shall not be deemed confidential and TrueDialog shall have no obligation to maintain the confidentiality of your messages.

Related to No Privacy

  • Family Educational Rights and Privacy Act The Charter School is subject to all provisions of the Federal Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g. In the event the Charter School closes, it shall transmit all official student records in the manner prescribed by the State Board.

  • Children’s Privacy The Site and the Service are not directed to anyone under the age of 13. The Site does not knowingly collect or solicit information from anyone under the age of 13, or allow anyone under the age of 13 to sign up for the Service. In the event that we learn that we have gathered personal information from anyone under the age of 13 without the consent of a parent or guardian, we will delete that information as soon as possible. If you believe we have collected such information, please contact us at xxxxxxx@xxxxxxxxxx.xxx.

  • Your Privacy Protecting your privacy is very important to us. Please review our Privacy Policy in order to better understand our commitment to maintaining your privacy, as well as our use and disclosure of your information.

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "

  • INFORMATION AND PRIVACY You understand and agree that in conjunction with employee training, quality control and the provision of services, we may monitor and/or electronically record cellular transmissions related to the Services, as well as conversations with you or others. Further, you understand that privacy cannot be guaranteed on telephone, cellular network and computer systems, and we shall not be liable to you for any claims, loss, damages or costs which may result from a lack of privacy experienced. You consent to us (i) using information about you and your location (collectively, “information’) to administer services, offer you new products or services, enforce the terms of this Agreement, prevent fraud and respond to regulatory and legal requirements, (ii) response to a subpoena or other such legal process, and (iii) using and sharing aggregate Subscriber information and statistics that do not include information that identifies you personally.

  • Privacy 11.1.0 In accordance with applicable privacy legislation, the Trust Plan Administrator shall limit the collection, use and disclosure of personal information to information that is necessary for the purpose of providing benefits administration services. The Trust Plan Administrator’s policy shall be based on the Personal Information Protection and Electronic Documents Act (PIPEDA).

  • Export and Privacy Red Hat may supply Client with technical data that is subject to export control restrictions. Red Hat will not be responsible for compliance by Client with applicable export obligations or requirements for this technical data. Client agrees to comply with all applicable export control restrictions. If Client breaches this Section 13.6 or the export provisions of an applicable end user license agreement for the Software, or any provision referencing these sections, Red Hat may terminate this Agreement and/or the applicable Order Form and its obligations thereunder without liability to Client. Client acknowledges and agrees that to provide the Services, it may be necessary for Client Information to be transferred between Red Hat, its Affiliates, Business Partners and/or subcontractors, which may be located worldwide.

  • Data and Privacy 22.1 In making a booking we will ask for personal information such as your name, postal address, email address, telephone number and payment details. We could use the data to inform you about news and information we think may be of interest to you. We will not pass your information onto any third parties for the purposes of administration. Contractors will not be allowed to use your personal information for any other purpose that that which Pebble House may have instructed. By booking with us you are deemed to have consented to the use of personal information for these purposes. If you decide that you would prefer that your information is not used in this way or that you do not wish to receive such information, please contact us in writing or by email to hello@ xxxxxxxxxxxxxxxxxxx.xx.xx.

  • Data Privacy Participant hereby explicitly and unambiguously consents to the collection, use and transfer, in electronic or other form, of Participant’s personal data as described in this Award Agreement and any other Restricted Stock Unit grant materials by and among, as applicable, the Employer, the Company and any Parent or Subsidiary for the exclusive purpose of implementing, administering and managing Participant’s participation in the Plan. Participant understands that the Company and the Employer may hold certain personal information about Participant, including, but not limited to, Participant’s name, home address and telephone number, date of birth, social insurance number or other identification number, salary, nationality, job title, any Shares or directorships held in the Company, details of all Restricted Stock Units or any other entitlement to Shares awarded, canceled, exercised, vested, unvested or outstanding in Participant’s favor (“Data”), for the exclusive purpose of implementing, administering and managing the Plan. Participant understands that Data will be transferred to a stock plan service provider as may be selected by the Company in the future, which is assisting the Company with the implementation, administration and management of the Plan. Participant understands that the recipients of the Data may be located in the United States or elsewhere, and that the recipients’ country of operation (e.g., the United States) may have different data privacy laws and protections than Participant’s country. Participant understands that if he or she resides outside the United States, he or she may request a list with the names and addresses of any potential recipients of the Data by contacting his or her local human resources representative. Participant authorizes the Company, any stock plan service provider selected by the Company and any other possible recipients which may assist the Company (presently or in the future) with implementing, administering and managing the Plan to receive, possess, use, retain and transfer the Data, in electronic or other form, for the sole purpose of implementing, administering and managing his or her participation in the Plan. Participant understands that Data will be held only as long as is necessary to implement, administer and manage Participant’s participation in the Plan. Participant understands if he or she resides outside the United States, he or she may, at any time, view Data, request additional information about the storage and processing of Data, require any necessary amendments to Data or refuse or withdraw the consents herein, in any case without cost, by contacting in writing his or her local human resources representative. Further, Participant understands that he or she is providing the consents herein on a purely voluntary basis. If Participant does not consent, or if Participant later seeks to revoke his or her consent, his or her status as a Service Provider and career with the Employer will not be adversely affected; the only adverse consequence of refusing or withdrawing Participant’s consent is that the Company would not be able to grant Participant Restricted Stock Units or other equity awards or administer or maintain such awards. Therefore, Participant understands that refusing or withdrawing his or her consent may affect Participant’s ability to participate in the Plan. For more information on the consequences of Participant’s refusal to consent or withdrawal of consent, Participant understands that he or she may contact his or her local human resources representative.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!