Person-identifiable information Sample Clauses

Person-identifiable information. This is information that contains the means to identify a person, e.g. name, address, postcode, date of birth, NHS number, etc.4
AutoNDA by SimpleDocs
Person-identifiable information. The main thread running through the Caldicott Principles is that person-identifiable information is only transferred for justified purposes and that only the minimum necessary information is transferred in each case. A practical action in support of this is to test information flows against the principles and to see whether action to minimise risks of breach of confidentiality is necessary. Key items of information which could be used to establish a person’s identity are: ▪ Name ▪ Address ▪ Postcode ▪ Date of birthOther Dates (i.e. death, diagnosis) ▪ Sex ▪ Ethnic groupNHS number ▪ Local Identifier (i.e. hospital or GP Practice Number, personal reference number (Social Services) or unique pupil number (Education Department) ▪ Diagnosis/treatment ▪ Occupation ▪ National Insurance Number Other items of information may, in exceptional circumstances, be combined to identify an individual, but for most routine purposes these are the items which needed to be safeguarded. However, items of information fall within a spectrum of identifiability based on the nature of the item and the context. Name and address are very strong identifiers, particularly when both are available, and the presence of either in data set should be thoroughly justified when the business function is not the direct provision or administration of the Supporting People programme. The other items of information are individually not capable of identifying a specific person in all but the most exceptional circumstances, but when combined with other items of information the likelihood may increase significantly. A test of reasonableness should be imposed when considering whether access to particular items of information is likely to result in an individual’s identity becoming apparent. Staff should not without the authorisation of the organisational guardian have access to information which relates to a living individual: - who can be identified from that information ( or from that and any other information in his possession) by any means likely to be available to them: or - whom the staff are likely to identify from information likely to be provided to them by any other person. Appendix 2 Application of key legislation and common law to information covered by this protocol Any disclosure of personal data must have regard to both statute and common law. In addition, guidance such as the Caldicott Principles for the protection of patient- identifiable information must be followed. There is no ...

Related to Person-identifiable information

  • Personally Identifiable Information By submitting any of your personally identifiable information, such as your name, address, email address, phone number or fax number, to us, you consent to our privacy policy located at xxx.xxxxxxxx.xxx/xxxxx.

  • Personally Identifiable Information (PII); Security a. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee must provide for the security of such PII, in a form acceptable to Florida Housing, without limitation, non-disclosure, use of appropriate technology, security practices, computer access security, data access security, data storage encryption, data transmission encryption, security inspections and audits. Grantee shall take full responsibility for the security of all data in its possession or in the possession of its subcontractors and shall hold Florida Housing harmless for any damages or liabilities resulting from the unauthorized disclosure of loss thereof. b. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee shall provide Florida Housing with insurance information for stand-alone cyber liability coverage, including the limits available and retention levels. If Grantee does not carry stand-alone cyber liability coverage, Grantee agrees to indemnify costs related to notification, legal fees, judgments, settlements, forensic experts, public relations efforts, and loss of any business income related to this Agreement. c. Grantee agrees to maintain written policies and procedures for PII and/or data classification. This plan must include disciplinary processes for employees that violate these guidelines. d. Grantee agrees at all times to maintain reasonable network security that, at a minimum, includes a network firewall. e. Grantee agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up to date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) Grantee agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules. f. Grantee agrees that any and all transmission or exchange of system application data with Florida Housing and/or any other parties shall take place via secure Advanced Encryption Standards (AES), e.g. HTTPS, FTPS, SFTP or equivalent means. All data stored as a part of backup and recovery processes shall be encrypted, using AES. g. If Grantee reasonably suspects that a cybersecurity event or breach of security has occurred, they must notify Florida Housing’s Contract Administrator within 48 hours. h. In the event of a breach of PII or other sensitive data, Grantee must abide by provisions set forth in Section 501.171, Fla. Stat. Additionally, Grantee must immediately notify Florida Housing in writing of the breach and any actions taken in response to such a breach. As the information becomes available the statement must include, at a minimum, the date(s) and number of records affected by unauthorized access, distribution, use, modification or disclosure of PII; Grantee’s corrective action plan; and the timelines associated with the corrective action plan.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • Available Information The Company is subject to the periodic reporting requirements of the Exchange Act and, accordingly, is required to file or furnish certain reports with the Commission. These reports can be retrieved from the Commission's website (wxx.xxx.xxx) and can be inspected and copied at the public reference facilities maintained by the Commission located (as of the date of the Deposit Agreement) at 100 X Xxxxxx, X.X., Xxxxxxxxxx X.X. 00000.

  • De-identified Information De-identified Information may be used by the Operator only for the purposes of development, product improvement, to demonstrate or market product effectiveness, or research as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Operator agrees not to attempt to re-identify De-identified Information and not to transfer De-identified Information to any party unless (a) that party agrees in writing not to attempt re- identification, and (b) prior written notice has been given to LEA who has provided prior written consent for such transfer. Operator shall not copy, reproduce or transmit any De-identified Information or other Data obtained under the Service Agreement except as necessary to fulfill the Service Agreement.

  • Safeguards for Personal Information Supplier agrees to develop, implement, maintain, and use administrative, technical, and physical safeguards, as deemed appropriate by DXC, to preserve the security, integrity and confidentiality of, and to prevent intentional or unintentional non-permitted or violating use or disclosure of, and to protect against unauthorized access to or accidental or unlawful destruction, loss, or alteration of, the Personal Information Processed, created for or received from or on behalf of DXC in connection with the Services, functions or transactions to be provided under or contemplated by this Agreement. Such safeguards shall meet all applicable legal standards (including any encryption requirements imposed by law) and shall meet or exceed accepted security standards in the industry, such as ISO 27001/27002. Supplier agrees to document and keep these safeguards current and shall make the documentation available to DXC upon request. Supplier shall ensure that only Supplier’s employees or representatives who may be required to assist Supplier in meeting its obligations under this Agreement shall have access to the Personal Information.

  • Mobile Subscriber Information You authorize your wireless carrier to disclose information about your account, such as subscriber status, payment method and device details, if available, to support identity verification, fraud avoidance and other uses in support of transactions for the duration of your business relationship with us. This information may also be shared with other companies to support your transactions with us and for identity verification and fraud avoidance purposes.

  • Corporate Information Promptly upon, and in any event within five (5) Business Days after, becoming aware of any additional corporate or limited liability company information or division information of the type delivered pursuant to Section 6.01(f), or of any change to such information delivered on or prior to the Closing Date or pursuant to this Section 8.01 or otherwise under the Credit Documents, a certificate, certified to the extent of any change from a prior certification, from the secretary, assistant secretary, managing member or general partner of such Credit Party notifying the Administrative Agent of such information or change and attaching thereto any relevant documentation in connection therewith.

  • Buyer Information True and complete copies of all documents listed in the Buyer Disclosure Schedule have been made available or provided to Seller. The books of account, stock record books and other financial and corporate records of Buyer and the Buyer Subsidiaries, all of which have been made available to Seller, are complete and correct in all material respects.

  • Seller Information The Company may require each seller of Registrable Securities as to which any registration is being effected to furnish, and such seller shall furnish, to the Company such information regarding the distribution of such securities as the Company may from time to time reasonably request in writing.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!