Personal Data Protection Practices Sample Clauses

Personal Data Protection Practices. The information security practices used with respect to all Private Information maintained at any time by or on behalf of the Company or the Subsidiaries conform, and at all times have conformed in all material respects with, applicable Legal Requirements.
AutoNDA by SimpleDocs
Personal Data Protection Practices. The information security practices used with respect to all Personal Data maintained by or, to the Knowledge of Holdings, on behalf of, the Company conform in all material respects to all applicable Privacy and Security Policies and Privacy Laws. The Company has used commercially reasonable efforts consistent with Applicable Law and Applicable Requirements relating to privacy, and consistent with its own Privacy and Security Policies, to store and secure all Personal Data, which are designed to protect against unauthorized access to and use of the Personal Data. The Company contractually requires all third parties providing services to it who have access to or receive Personal Data from the Company to use commercially reasonable efforts, consistent with Applicable Law, to store and secure all Personal Data to protect against unauthorized access to and use of such Personal Data. Except as set forth on Schedule 3.3(aa) of the Disclosure Schedule, to the Knowledge of Holdings, there has been no unauthorized or illegal use, processing, or disclosure of or access to, any Personal Data stored or secured by or for the Company, including with respect to any of its databases. Except as set forth on Schedule 3.3(aa) of the Disclosure Schedule, to the Knowledge of Holdings, there have been no material breaches of the Company’s security procedures or any material attempted or successful unauthorized incidents of access, use, disclosure, modification or destruction of information or interference with systems operations in all or any portion of its IT systems, including any such breach or incident that requires notice to any Person.
Personal Data Protection Practices. DERMAdoctor has made available: (i) a description of the complaints process, and an accurate and complete list of all written complaints or claims received by DERMAdoctor or any other Person in respect of the Personal Data collected, used or disclosed by DERMAdoctor or such other Person (in each case, to the extent relating to activities by or for DERMAdoctor); (ii) a description of the access and security safeguards in place in respect of the Personal Data maintained by or for DERMAdoctor, including computer security, password protection and physical security and employee training programs with respect to compliance with Privacy Legal Requirements and Personal Data retention and disposal programs; (iii) a description of the process, protocols and/or technologies used to comply with Do Not Track signals, with consumer opt-outs related to self-regulatory programs, and with other consumer preferences; (iv) a description of the process used to ensure the anonymization, privacy and deletion of Personal Data; (v) a description of the identifiers and other information stored in HTTP cookies and HTML5 local storage; and (vi) an accurate and complete list of the individuals currently designated as responsible for overseeing DERMAdoctor Privacy Policies and ensuring compliance with Privacy Legal Requirements. During the past three (3) years, DERMAdoctor has at all times made all disclosures to, and obtained any necessary consents from users, consumers, customers, employees, contractors, and other applicable Persons required by Privacy Legal Requirements and has filed required registrations with the applicable data protection authority. To the Knowledge of DERMAdoctor, neither DERMAdoctor nor any Person performing services for DERMAdoctor, has attempted to reverse engineer Personal Data in a manner intended to reidentify anonymized data.
Personal Data Protection Practices. (i) The Group Companies have maintained appropriate safeguards to protect Personal Data in accordance with Privacy Legal Requirements. The Group Companies have at all times made all disclosures to, and obtained any necessary consents (unless the Company relies on an alternative legal ground) from, customers, employees, contractors, and other applicable Persons required by Privacy Legal Requirements and has filed any required registrations with the applicable data protection authority. (ii) Each Group Company conducts and operates its businesses, including the operation of the Company Products and its distribution to and use by customers, in material compliance with the Privacy Legal Requirements. Where a Group Company uses a Person to process Personal Data on its behalf, there is in existence a written Contract between such Group Company and each such Person that complies in all material respects with the requirements of all Privacy Legal Requirements. The Group Companies have Made Available to Parent true, correct and complete copies of all such Contracts. To the Knowledge of the Company, such Persons have not breached any such Contracts in any material respect in connection with their processing of Personal Data. The Company has not transferred or authorized the transfer of Personal Data outside of European Union, except where such transfers have complied with the requirements of Privacy Legal Requirements or where lack of compliance thereof has not resulted in a material adverse effect. No Group Company knowingly collects any Personal Data from any person under the age of 13 for use in or as part of any Company Products. (iii) The Company did not Sell Personal Data, as such term is defined under the CCPA.
Personal Data Protection Practices. Section 2.2(w)(ii) of the Disclosure Schedule sets out a copy or summary of the Company’s Privacy and Security Policies, including (without limitation) all the forms of consent (including a description of how such consent is obtained) used by Company in respect of the collection, use or disclosure of Personal Data. The information security practices used with respect to all Personal Data maintained by or on behalf of the Company conform, and at all times have conformed, to all Privacy and Security Policies and Privacy Laws. The Company has used commercially reasonable efforts consistent with standard industry practices, applicable Law, self-governing rules and policies relating to privacy and its own Privacy and Security Policies to store and secure all Personal Data to protect against unauthorized access to or use of the Personal Data. To the knowledge of the Company and/or Shareholder, there has been no unauthorized or illegal use, processing, or disclosure of or access to, any Personal Data stored or secured by or for the Company, including with respect to any of its databases. The Company maintains reasonable administrative, physical and technical security controls for its computer systems in an effort to safeguard such systems against the risk of business disruption arising from attacks (including virus, trojan horse, worm and denial-of-service attacks), unauthorized activities of any employee or contractor of the Company, hackers or any other Person. To the knowledge of the Company and/or Shareholder, there have been no material breaches of the Company’s security procedures or any material attempted or successful unauthorized incidents of access, use, disclosure, modification or destruction of information or interference with systems operations in all or any portion of its computer systems, including any such breach or incident that requires notice to any Person.
Personal Data Protection Practices. Section 2.15(q) of the Disclosure Schedule sets out (i) a copy of all the forms of consent used by the Company or any Subsidiary in respect of the collection, use or disclosure of Personal Data, (ii) a description of the complaints process, and a list of all complaints or Claims received by the Company or any Subsidiary in respect of the Personal Data collected, used or disclosed by the Company or any Subsidiary, (iii) a description of the access and security safeguards in place in respect of the Personal Data, including computer security, password protection and physical security, employee training programs with respect to compliance with Privacy Legal Requirement and Personal Data retention and disposal programs, and (iv) a list of the individuals who were designated as responsible for overseeing the Company’s Privacy Policies and compliance with Privacy Legal Requirement.

Related to Personal Data Protection Practices

  • Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01

  • PERSONAL DATA PROTECTION ACT 7.1. PAH is committed to protecting the privacy, confidentiality and security of all personal data to which it is entrusted. It has been our policy to ensure your personal information are protected. With the introduction of the Malaysian Personal Data Protection Act 2010 ("PDPA"), we are even committed to ensure the privacy and confidentiality and security of all personal data are protected in line with the PDPA. We process personal data which you have provided to us voluntarily through our website upon your registration and this includes personal data such as your name, address, NRIC and contact details. In this regards, you have expressly consent to our processing of your personal data. If you give us personal data or information about another person, you must first confirm that he/she has appointed you to act for him/her, to consent to the processing of his/her personal data and to receive on his/her behalf any data protection notices. We may request your assistance to procure the consent of such persons whose personal data is provided by you to us and you agree to do so. You shall indemnify us in the event we suffer loss and damage as a result of your failure to comply with the same. We will only retain your personal data for as long as necessary for the fulfilment of the specified purposes or as legislated 7.2. E-Bidders shall be responsible for the confidentiality and use of password and not to reveal the password to anyone at any time and under any circumstances whether intentionally or unintentionally. 7.3. E-Bidders agree to comply with all the security measures related to safety of the password or generally in respect of the use of the service. In the event that the password is compromised, the E-Bidders shall immediately notify PAH.

  • Collection Practices The collection practices used by the Servicer with respect to each Mortgage Note and Mortgage have been in all respects legal, proper and prudent in the mortgage servicing business;

  • PERSONAL DATA PROTECTION 7.1 By accessing ESZAM AUCTIONEER SDN BHD website, the E-Bidders acknowledge and agree that ESZAM AUCTIONEER SDN BHD website may collect, retain, or disclose the E-Bidder’s information or any information by the e-bidders for the effectiveness of services, and the collected, retained or disclosed information shall comply with Personal Data Protection Act 2010 and any regulations, laws or rules applicable from time to time. 7.2 ESZAM AUCTIONEER SDN BHD will process E-bidder personal data such as name, address, NRIC and contact number for registration and E-bidding purposes. E-bidders shall be responsible for the username and password of eZ2Bid and not to reveal the password to anyone. 7.3 E-bidders agree to accept all associated risks when using the service in the ESZAM AUCTIONEER SDN BHD website and shall not make any claim for any unauthorized access or any consequential loss or damages suffered. 7.4 E-bidders shall be responsible for the confidentiality and the use of password and not to reveal the password to anyone at any time and under any circumstances, whether intentionally or unintentionally. 7.5 E-bidders agree to comply with all the security measures related to safety of the password or generally in respect of the use of the service. 7.6 E-bidders accept the responsibility that in any event that the password is in the possession of any other person whether intentionally or unintentionally, the E-Bidders shall take precautionary steps for the disclosure, discovery, or the Bidders shall immediately notify ESZAM AUCTIONEER SDN BHD

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Unfair Labor Practices The Grantee shall comply with the Employers Engaging in Unfair Labor Practices Act, 1980 PA 278, as amended, MCL 423.321 et seq.

  • Data Protection Act 7.1 With respect to the parties' rights and obligations under this Contract, the parties agree that the Department is the Data Controller and that the Contractor is the Data Processor. 7.2 The Contractor shall: 7.2.1 Process the Personal Data only in accordance with instructions from the Department (which may be specific instructions or instructions of a general nature as set out in this Contract or as otherwise notified by the Department to the Contractor during the Term); 7.2.2 Process the Personal Data only to the extent, and in such manner, as is necessary for the provision of the Services or as is required by Law or any Regulatory Body; 7.2.3 The Contractor shall employ appropriate organisational, operational and technological processes and procedures to keep the Personal Data safe from unauthorised use or access, loss, destruction, theft or disclosure. The organisational, operational and technological processes and procedures adopted are required to comply with the requirements of ISO/IEC 27001 as appropriate to the services being provided to the Department; 7.2.4 Take reasonable steps to ensure the reliability of any Contractor Personnel who have access to the Personal Data; 7.2.5 Obtain prior written consent from the Department in order to transfer the Personal Data to any Sub-contractors or Affiliates for the provision of the Services; 7.2.6 Ensure that all Contractor Personnel required to access the Personal Data are informed of the confidential nature of the Personal Data and comply with the obligations set out in this clause 7; 7.2.7 Ensure that none of Contractor Personnel publish, disclose or divulge any of the Personal Data to any third party unless directed in writing to do so by the Department; 7.2.8 Notify the Department within five Working Days if it receives: a request from a Data Subject to have access to that person's Personal Data; or a complaint or request relating to the Department's obligations under the Data Protection Legislation; 7.2.9 Provide the Department with full cooperation and assistance in relation to any complaint or request made, including by: - providing the Department with full details of the complaint or request; - complying with a data access request within the relevant timescales set out in the Data Protection Legislation and in accordance with the Department's instructions; - providing the Department with any Personal Data it holds in relation to a Data Subject (within the timescales required by the Department); and - providing the Department with any information requested by the Department; 7.2.10 Permit the Department or the Department’s Representative (subject to reasonable and appropriate confidentiality undertakings), to inspect and audit the Contractor's data Processing activities (and/or those of its agents, subsidiaries and Sub-contractors) and comply with all reasonable requests or directions by the Department to enable the Department to verify and/or procure that the Contractor is in full compliance with its obligations under this Contract; 7.2.11 Provide a written description of the technical and organisational methods employed by the Contractor for processing Personal Data (within the timescales required by the Department) to be used solely for the purposes of this contract and provided that to do so would not be in breach of the Intellectual Property Rights (including Copyright) of a third party; and 7.2.12 Not process Personal Data outside the European Economic Area without the prior written consent of the Department and, where the Department consents to a transfer, to comply with: - the obligations of a Data Controller under the Eighth Data Protection Principle set out in Schedule 1 of the Data Protection Act 1998 by providing -an adequate level of protection to any Personal Data that is transferred; and - any reasonable instructions notified to it by the Department. 7.3 The Contractor shall comply at all times with the Data Protection Legislation and shall not perform its obligations under this Contract in such a way as to cause the Department to breach any of its applicable obligations under the Data Protection Legislation.

  • Credit Reporting; Gramm-Leach-Bliley Act (a) With respect to each Mortgage Loan, each Sexxxxxx xxxxxx xx xully furnish, in accordance with the Fair Credit Reporting Act and its implementing regulations, accurate and complete information (e.g., favorable and unfavorable) on its borrower credit files to Equifax, Experian and TransUnion Credit Information Company (three of the credit repositories), on a monthly basis. (b) Each Servicer shall comply with Title V of the Gramm-Leach-Bliley Act of 1999 and all applicable regulations promulgatxx xxxxxxxxxx, xxxating to the Mortgage Loans required to be serviced by it and the related borrowers and shall provide all required notices thereunder.

  • Credit Reporting For each Mortgage Loan, the Company shall accurately and fully furnish, in accordance with the Fair Credit Reporting Act and its implementing regulations, accurate and complete information on its borrower credit files to each of the following credit repositories: Equifax Credit Information Services, Inc., TransUnion, LLC and Experian Information Solution, Inc. on a monthly basis.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!