Online Privacy Protections Sample Clauses

Online Privacy Protections. At our website, xxx.xxxxxxxxxx.xxx, you may apply for ac- counts and services and you may communicate with us via email. To protect the information you provide us online, we use multiple levels of security. The application information we accept online and our Home Banking service relies on industry standard “Se- cure Sockets Layer” (SSL) encryption to secure your transaction information and communication. Generally, our emails are not se- cure. When you visit our website, you can access site information, without revealing your personal identity. However, in order to help us identify you for future site visits, we use “cookies” to track your visit. A “cookie” is a piece of information that our web server stores on your computer hard drive and retrieves later. The coo- kie will not request, require or collect personal identity information and you remain anonymous. Your member information is not ac- cessed by or stored within a cookie in any way.
AutoNDA by SimpleDocs
Online Privacy Protections. At our website, xxx.xxxxxxxxxx.xxx, you may apply for accounts and services and you may communicate with us via email. To protect the information you provide us online, we use multiple levels of security. The application information we accept online and our Home Banking service relies on industry standardSecure Sockets Layer” (SSL) encryption to secure your transaction information and communication. Generally, our emails are not secure. When you visit our website, you can access site information, without revealing your personal identity. However, in order to help us identify you for future site visits, we use “cookies” to track your visit. A “cookie” is a piece of information that our web server stores on your computer hard drive and retrieves later. The cookie will not request, require or collect personal identity infor- mation and you remain anonymous. Your member information is not accessed by or stored within a cookie in any way.
Online Privacy Protections. At our website, xxx.XxXXXX.xxx, you may apply for accounts and services and you may communicate with us via email. To protect the information you provide us online, we use multiple levels of security. The application information we accept online and our Internet Banking service rely on industry standard "Secure Sockets Layer" (SSL) encryption to secure your transaction information and communication. Generally, emails are not secure. However, if we ask you to email us information other than your name, address, email address, and phone number, it will be obtained using a secure (SSL encryption) email form. When you visit our website, you can access site information without revealing your personal identity. However, in order to help us track Internet Banking session time length, we use temporary cookies. A temporary cookie is a piece of information that our web server places on your computer hard drive while you are logged on to Internet Banking. It is deleted as soon as your Internet Banking session ends. The temporary cookie will not request, require, or collect personally identifiable information and you remain anonymous. Your member information is not accessed by or stored within a temporary cookie in any way.
Online Privacy Protections. At our Web site, xxxxxxxxxxx.xxx, you may apply for accounts and services and you may communicate with us via e-mail. To protect the information you provide us online, we use multiple levels of security. The application information we accept online and our online banking service relies on industry standardSecure Sockets Layer” (SSL) encryption to secure your transaction information and communication. Generally, our e-mails are not secure. However, if we ask you to e-mail us address and phone number, you have the option to submit it to us using a secure (SSL encryption) e-mail form. When you visit our Web site, you can access site information without revealing your personal identity. a. Online Web Links. Our Web site contains links to other sites. Please be aware that Harborstone Credit Union is not responsible for the privacy prac- tices of such other sites. We encourage our users to be aware when they leave our site to read the privacy statements of each and every Web site. This privacy statement applies solely to information collected by this Web site. Some of the links from our site will take you off the Xxxxxxxxxxx.xxx site to a “co-brand- ed” site where you will see the Harborstone logo as well as the logo of another service provider. The following links to sites are co-branded: Intuit, Auto Solution, Turbo Tax, and ShareBuilder. Any informa- tion you provide is collected by the service provider and you are encouraged to read the privacy statement of that provider. We also have links from harborstone. com to “fully branded” service provider sites. As you view information on a fully branded site you will see a change in the URL but the pages appear as Harbor- stone Credit Union’s and the service provider is not identified. All information collected on fully branded sites is used by Harborstone Credit Union only and is not shared or used for any purpose other than pro- cessing your application and providing the requested service. Fully branded sites include online lending applications, online banking applications, and online xxxx payment services. b. Log Files. Log files are used to collect aggre- gate statistics. Web server logs tell which pages are more and less popular in our site and types of Web browsers used. This information does not contain any personally identifiable information. c. Protecting Children’s Information Privacy. Our online financial services are not designed for or directed toward children. We do not knowingly solicit or collect ...

Related to Online Privacy Protections

  • Privacy Protection The Grantee shall comply with all applicable federal and state privacy laws, including Section 631 of the Cable Act and regulations adopted pursuant thereto.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "Accenture Personal Data" means personal data owned, licensed, or otherwise controlled or processed by Accenture including personal data processed by Accenture on behalf of its clients. “Accenture Data” means all information, data and intellectual property of Accenture or its clients or other suppliers, collected, stored, hosted, processed, received and/or generated by Supplier in connection with providing the Deliverables to Accenture, including Accenture Personal Data.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and its respective Subsidiaries may presently have and, after the Effective Time, may gain access to or possession of confidential or proprietary Information of, or personal Information relating to, Third Parties: (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or the other Party’s Subsidiaries, on the other hand, prior to the Effective Time or (ii) that, as between the two parties, was originally collected by the other Party or the other Party’s Subsidiaries and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause its Subsidiaries and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary Information of, or personal Information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or the other Party’s Subsidiaries, on the one hand, and such Third Parties, on the other hand.

  • Applicability of Data Privacy Protections In the event that Personal Information will be Processed by Supplier in connection with the performance under this Agreement (including any SOW), then and only then shall the provisions of this Section ‘Data Protection and Privacy’ be applicable. For the avoidance of doubt, the data security requirements contained in section ‘Information Security’ shall apply regardless of whether Personal Information is Processed under this Agreement or any SOW. All Personal Information obtained from or on behalf of DXC or in connection with performance pursuant to this Agreement shall be Processed and protected pursuant to this Section ‘Data Protection and Privacy’, the Section ‘Information Security’ and any other Sections of this Agreement that address Personal Information.

  • Privacy Act If performance involves design, development or operation of a system of records on individuals, this Agreement incorporates by reference FAR 52.224-1 Privacy Act Notification (Apr 1984) and FAR 52.224-2 Privacy Act (Apr 1984).

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto. 8.2 The Receiving Party warrants that it and its Agents have the appropriate technical and organisational measures in place against unauthorised or unlawful processing of data relating to the Bid and against accidental loss or destruction of, or damage to such data held or processed by them.

  • Freedom of Information and Protection of Privacy Act Any information provided on this contract may be subject to release under the Freedom of Information and Protection of Privacy Act. The Contractor may be consulted prior to release of any information.

  • IDENTIFYING INFORMATION AND PRIVACY NOTIFICATION (a) FEDERAL EMPLOYER IDENTIFICATION NUMBER and/or FEDERAL SOCIAL SECURITY NUMBER. As a condition to NYSERDA’s obligation to pay any invoices submitted by Contractor pursuant to this Agreement, Contractor shall provide to NYSERDA its Federal employer identification number or Federal social security number, or both such numbers when the Contractor has both such numbers. Where the Contractor does not have such number or numbers, the Contractor must give the reason or reasons why the payee does not have such number or numbers.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!