Information Authorization Your enrollment in the applicable Service may not be fulfilled if we cannot verify your identity or other necessary information. Through your enrollment in or use of each Service, you agree that we reserve the right to request a review of your credit rating at our own expense through an authorized bureau. In addition, and in accordance with our Privacy Policy, you agree that we reserve the right to obtain personal information about you, including without limitation, financial information and transaction history regarding your Eligible Transaction Account. You further understand and agree that we reserve the right to use personal information about you for our and our Service Providers’ everyday business purposes, such as to maintain your ability to access the Service, to authenticate you when you log in, to send you information about the Service, to perform fraud screening, to verify your identity, to determine your transaction limits, to perform collections, to comply with laws, regulations, court orders and lawful instructions from government agencies, to protect the personal safety of subscribers or the public, to defend claims, to resolve disputes, to troubleshoot problems, to enforce this Agreement, to protect our rights and property, and to customize, measure, and improve the Service and the content and layout of the Site. Additionally, we and our Service Providers may use your information for risk management purposes and may use, store and disclose your information acquired in connection with this Agreement as permitted by law, including (without limitation) any use to effect, administer or enforce a transaction or to protect against or prevent actual or potential fraud, unauthorized transactions, claims or other liability. We and our Service Providers shall have the right to retain such data even after termination or expiration of this Agreement for risk management, regulatory compliance, or audit reasons, and as permitted by applicable law for everyday business purposes. In addition, we and our Service Providers may use, store and disclose such information acquired in connection with the Service in statistical form for pattern recognition, modeling, enhancement and improvement, system analysis and to analyze the performance of the Service. The following provisions in this Section apply to certain Services:
Organization; Authorization The Holder is duly organized, validly existing and in good standing under the laws of its state of formation and has the requisite organizational power and authority to enter into and perform its obligations under this Agreement.
Corporation Authorization The execution, delivery and performance by Parent of this Agreement and the consummation by Parent of the transactions contemplated hereby are within the corporate powers of Parent and have been duly authorized by all necessary corporate action. This Agreement constitutes a valid and binding agreement of Parent.
Due Organization, Authorization Power and Authority. Borrower and each of its Subsidiaries is duly existing and in good standing as a Registered Organization in its jurisdictions of organization or formation and Borrower and each of its Subsidiaries is qualified and licensed to do business and is in good standing in any jurisdiction in which the conduct of its businesses or its ownership of property requires that it be qualified except where the failure to do so could not reasonably be expected to have a Material Adverse Change. In connection with this Agreement, Borrower and each of its Subsidiaries has delivered to Collateral Agent a completed perfection certificate signed by an officer of Borrower or such Subsidiary (each a “Perfection Certificate” and collectively, the “Perfection Certificates”). Borrower represents and warrants that (a) Borrower and each of its Subsidiaries’ exact legal name is that which is indicated on its respective Perfection Certificate and on the signature page of each Loan Document to which it is a party; (b) Borrower and each of its Subsidiaries is an organization of the type and is organized in the jurisdiction set forth on its respective Perfection Certificate; (c) each Perfection Certificate accurately sets forth each of Borrower’s and its Subsidiaries’ organizational identification number or accurately states that Borrower or such Subsidiary has none; (d) each Perfection Certificate accurately sets forth Borrower’s and each of its Subsidiaries’ place of business, or, if more than one, its chief executive office as well as Borrower’s and each of its Subsidiaries’ mailing address (if different than its chief executive office); (e) Borrower and each of its Subsidiaries (and each of its respective predecessors) have not, in the past five (5) years, changed its jurisdiction of organization, organizational structure or type, or any organizational number assigned by its jurisdiction; and (f) all other information set forth on the Perfection Certificates pertaining to Borrower and each of its Subsidiaries, is accurate and complete (it being understood and agreed that Borrower and each of its Subsidiaries may from time to time update certain information in the Perfection Certificates (including the information set forth in clause (d) above) after the Effective Date to the extent permitted by one or more specific provisions in this Agreement); such updated Perfection Certificates subject to the review and approval of Collateral Agent. If Borrower or any of its Subsidiaries is not now a Registered Organization but later becomes one, Borrower shall notify Collateral Agent of such occurrence and provide Collateral Agent with such Person’s organizational identification number within five (5) Business Days of receiving such organizational identification number. The execution, delivery and performance by Borrower and each of its Subsidiaries of the Loan Documents to which it is a party have been duly authorized, and do not (i) conflict with any of Borrower’s or such Subsidiaries’ organizational documents, including its respective Operating Documents, (ii) contravene, conflict with, constitute a default under or violate any material Requirement of Law applicable thereto, (iii) contravene, conflict or violate any applicable order, writ, judgment, injunction, decree, determination or award of any Governmental Authority by which Borrower or such Subsidiary, or any of their property or assets may be bound or affected, (iv) require any action by, filing, registration, or qualification with, or Governmental Approval from, any Governmental Authority (except such Governmental Approvals which have already been obtained and are in full force and effect) or are being obtained pursuant to Section 6.1(b), or (v) constitute an event of default under any material agreement by which Borrower or any of such Subsidiaries, or their respective properties, is bound. Neither Borrower nor any of its Subsidiaries is in default under any agreement to which it is a party or by which it or any of its assets is bound in which such default could reasonably be expected to have a Material Adverse Change.
Safeguards for Personal Information Supplier agrees to develop, implement, maintain, and use administrative, technical, and physical safeguards, as deemed appropriate by DXC, to preserve the security, integrity and confidentiality of, and to prevent intentional or unintentional non-permitted or violating use or disclosure of, and to protect against unauthorized access to or accidental or unlawful destruction, loss, or alteration of, the Personal Information Processed, created for or received from or on behalf of DXC in connection with the Services, functions or transactions to be provided under or contemplated by this Agreement. Such safeguards shall meet all applicable legal standards (including any encryption requirements imposed by law) and shall meet or exceed accepted security standards in the industry, such as ISO 27001/27002. Supplier agrees to document and keep these safeguards current and shall make the documentation available to DXC upon request. Supplier shall ensure that only Supplier’s employees or representatives who may be required to assist Supplier in meeting its obligations under this Agreement shall have access to the Personal Information.
Written Authorization Prior to performing any Professional Services in connection with the Tasks, the Design Professional shall obtain from the City a written authorization to proceed. Further, throughout the term of this Agreement, the Design Professional shall immediately advise the City in writing of any anticipated changes to any Task, including any changes to the time for completion or the Compensation and Fee Schedule, and shall obtain the City's written consent to the change prior to making any changes. In no event shall the City's consent be construed to relieve the Design Professional from its duty to render all Professional Services in accordance with applicable laws and accepted industry standards.
Personal Information 23.1 Subject to any applicable laws, the Licensee authorises XXXXX to: 23.1.1 use any Personal Information that SAMRO for the purposes of processing, executing and administering the Agreement; calculating Licence Fees; collecting the Licence Fees; 23.1.2 informing the Licensee of any SAMRO news and information or information relating to the Agreement; 23.1.3 informing the Licensee of any amendment, Tariff amendment or General Amendment to this Agreement. 23.1.4 access the Licensees Personal Information from credit bureaux relating to the Licensees payment profile for purposes of financial risk assessment, fraud prevention and debtor tracing and that we may disclose the necessary Personal Information to any such credit bureaux. 23.1.5 obtain, capture store, process, analyse and use the Licensees personal information for SAMRO marketing purposes in relation to XXXXX’s business of managing its Repertoire.
Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.
Privacy and Personal Information (a) This clause 14 applies where this agreement amounts to a “service arrangement” under the Information Privacy Act 2009 (Qld). (b) For the purpose of this clause 14, Personal Information has the meaning given in the Information Privacy Act 2009 (Qld). (c) If the Recipient collects or has access to Personal Information in order to undertake the Activity, the Recipient must: (i) comply with Parts 1 and 3 of Chapter 2 of the Information Privacy Act 2009 (Qld) in relation to the discharge of its obligations under this agreement (including its obligations regarding Reports), as if the Recipient was the Department; (ii) ensure that Personal Information is protected against loss and against unauthorised access, use, modification, disclosure or other misuse; (iii) not use Personal Information other than for the purposes of undertaking the Activity, unless required or authorised by law; (iv) not disclose Personal Information without the consent of the Department, unless required or authorised by law; (v) not transfer Personal Information outside of Australia without the consent of the Department; (vi) ensure that access to Personal Information is restricted to those of the Recipient's employees and officers who require access in order to perform their duties; (vii) ensure that the Recipient's officers and employees do not access, use or disclose Personal Information other than in the performance of their duties; (viii) ensure that the Recipient's subcontractors who have access to Personal Information comply with obligations the same as those imposed on the the Recipient under this clause 14; (ix) fully co-operate with the Department to enable the Department to respond to applications for access to, or amendment of a document containing an individual’s Personal Information and to privacy complaints; and (x) comply with such other privacy and security measures as the Department reasonably advises the Recipient in writing from time to time. (d) The Recipient must immediately notify the Department on becoming aware of any breach, suspected breach or complaint alleging something that would, if proved, be a breach of clause 14(c) and provide full details of the breach, suspected breach or complaint. (e) On request by the Department, the Recipient must obtain from its Representatives engaged for the purposes of this agreement, an executed deed of privacy in a form acceptable to the Department.
Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.