Privacy and Security. (a) Each of the Company and its Subsidiaries complies (and requires and monitors the compliance of applicable third parties) in all material respects with all applicable Laws relating to privacy or data security, and reputable industry practice, standards, self-governing rules and policies and their own published, posted and internal agreements and policies (which are in conformance with reputable industry practice) (all of the foregoing collectively, “Privacy Laws”) with respect to: (i) personally identifiable information (including name, address, telephone number, electronic mail address, social security number, bank account number or credit card number), sensitive personal information and any special categories of personal information regulated thereunder or covered thereby (“Personal Information”), whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners; and (ii) non-personally identifiable information, whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners.
(b) Neither the Company nor any of its Subsidiaries uses, collects, or receives any Personal Information or sensitive non-personally identifiable information and does not become aware of the identity or location of, or identify or locate, any particular Person as a result of any receipt of such Personal Information, in a manner which would materially breach or violate any Privacy Laws and materially and adversely impact the business of the Company and its Subsidiaries, taken as a whole.
(c) To the Company’s knowledge, Persons with which the Company or any of its Subsidiaries have contractual relationships have not breached any agreements or any Privacy Laws pertaining to Personal Information and to non-personally identifiable information.
(d) To the Company’s knowledge, the Company and its Subsidiaries take all commercially reasonable steps to protect the operation, confidentiality, integrity and security of their respective business systems and websites and all information and transactions stored or contained therein or transmitted thereby against any unauthorized or improper use, access, transmittal, interruption, modification or corruption, and there have been no material breaches of same. Without limiting the generality of the foregoing, each of the Company and its Subsidiaries (i) uses industry standard encryption technology and (ii) has implemented a c...
Privacy and Security. (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.
(b) If the Service Provider receives any request by a third party for any information related to, or gathered in respect of the Confidential Information, it shall immediately refer such request to AHS and shall reasonably cooperate with AHS’s response to such request.
(c) To the extent required by HIA and FOIPP, the Service Provider shall protect personal information and health information in its possession by taking reasonable administrative, technical and physical security precautions against such risks as unauthorized access, collection, use, disclosure alteration or disposal. Such precautions must be no less than those precautions undertaken by AHS. Any records created, obtained and maintained in the delivery of the Services that the Service Provider intends to destroy must be destroyed in accordance with HIA and/or FOIPP and AHS’s records management policies.
(d) The Service Provider shall notify AHS immediately upon discovery by the Service Provider that Confidential Information could be, or has been, released to an unauthorized third party, or of any breach of this Article 6 resulting from the conduct of the Service Provider and, if appropriate, take reasonable steps to remedy the breach. The Service Provider shall cooperate with AHS’s investigation of any such disclosure or breach and AHS’s efforts to recover the Confidential Information. Notwithstanding any notification by the Service Provider to AHS under this Section 6.2, all obligations of the Service Provider with respect to the Confidential Information shall survive and continue to bind the Service Provider. The Service Provider shall not intimidate, punish, terminate, penalize or otherwise harass any Staff if such Staff notifies AHS of any breach of this Agreement.
Privacy and Security. 9.1 County receives funding from the State Department of Health Care Services pursuant to an annual contracting arrangement (hereinafter “State Contract”). The State Contract contains certain requirements pertaining to the privacy and security of personally identifiable information (hereinafter “PII”) provided to County by the State Department of Health Care Services and/or protected health information (hereinafter “PHI”) provided to County by the State Department of Health Care Services, and requires that County contractually obligate any of its subcontractors to also comply with these requirements.
9.2 Contractor hereby agrees to be bound by, and comply with, any and all terms and conditions of the State Contract pertaining to the privacy and/or security of PII and/or PHI, a copy of which is available from Marin Behavioral Health & Recovery Services’ (BHRS) Administration upon request.
9.3 Additionally, in the event the State Contract requires County to notify the State of a breach of privacy and/or security of PII and/or PHI, Contractor shall, immediately upon discovery of a suspected or actual breach of privacy and/or security of PII and/or PHI by Contractor, notify the County of Marin, Health and Human Services Compliance Program of such breach by telephone and email or facsimile (contact details below). Contractor further agrees that it shall notify County of any such breaches prior to the time County is required to notify the State pursuant to the State Contract. Email: XXXXxxxxxxxxx@xxxxxxxxxxx.xxx
9.4 In the event the State Contract requires County to pay any costs associated with a breach of privacy and/or security of PII and/or PHI, including but not limited to the costs of notification, Contractor shall pay on County’s behalf any and all such costs arising out of a breach of privacy and/or security of PII and/or PHI by Contractor.
9.5 Contractor shall ensure that all staff and subcontractors complete a privacy and security training upon initial hire, and annually thereafter. Contractor shall provide evidence of these trainings when requested by County, CA Department of Health Care Services or the US Department of Health & Human Services.
9.6 Contractor shall ensure that all staff and subcontractors sign a confidentiality agreement upon initial hire, and annually thereafter. Contractor shall provide evidence of completed agreements when requested by County, CA Department of Health Care Services or the US Department of Health & Human Services.
Privacy and Security. Acumatica has taken reasonable actions, including encryption of Subscriber Data during transmission and firewalls, to ensure that Subscriber Data is disclosed only to Authorized Parties. However, you acknowledge that the Internet is an open system and Acumatica cannot and does not warrant or guarantee that Subscriber Data will not be intercepted by third parties. Acumatica disclaims any liability for interception of any Subscriber Data or electronic communications. Notwithstanding the first sentence in this Section 5.1, Acumatica may disclose information you submitted to Acumatica if required by law or in the event that Acumatica, in good faith, believes disclosure is necessary to (i) comply with legal process, or
Privacy and Security. Client privacy is extremely important to Formidium. Please read Formidium’s Privacy Policy here which explains how Formidium treats and protects personal data when the Client uses the Formidium Systems.
Privacy and Security. Acumatica has taken reasonable actions, including encryption of Subscriber Data during transmission and firewalls, to ensure that Subscriber Data is disclosed only to Authorized Parties. However, you acknowledge that the Internet is an open system and Acumatica cannot and does not warrant or guarantee that Subscriber Data will not be intercepted by third parties. Acumatica disclaims any liability for interception of any Subscriber Data or electronic communications. Notwithstanding the first sentence in this Section 5.1, Acumatica may disclose information you submitted to Acumatica if required by law or in the event that Acumatica, in good faith, believes disclosure is necessary to (i) comply with legal process, or (ii) protect the rights or property of Acumatica, its Affiliates, licensors or others. Acumatica does not sell or rent Personal Data to third parties for their marketing purposes without your explicit consent and Acumatica only uses your information as described in the Privacy Statement. For more information on Acumatica’s Privacy Statement, see the Privacy Statement posted on xxx.xxxxxxxxx.xxx/xxxxxxxxxx. If you object to your information being used in the manner set forth in the Privacy Statement, you should discontinue use of the Service.
Privacy and Security. Microsoft and Customer will each comply with all applicable privacy and data protection laws and regulations (including applicable security breach notification law). However, Microsoft is not responsible for compliance with any laws applicable to Customer or Customer’s industry that are not also generally applicable to information technology services providers. Customer consents to the processing of personal information by Microsoft and its agents to facilitate the subject matter of this agreement. Customer may choose to provide personal information to Microsoft on behalf of third parties (including Customer’s contacts, resellers, distributors, administrators, and employees) as part of this agreement. Customer will obtain all required consents from third parties under applicable privacy and data protection law before providing personal information to Microsoft. The personal information Customer provides in connection with this agreement will be processed according to the privacy statement available at xxxxx://xxx.xxxxxxxxx.xxx/licensing/servicecenter (see footer), except that Product-specific privacy statements are in the Product use rights. Personal data collected through Products may be transferred, stored and processed in the United States or any other country in which Microsoft or its service providers maintain facilities. By using the Products, Customer consents to the foregoing. Microsoft abides by the EU Safe Harbor and the Swiss Safe Harbor frameworks as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of data from the European Union, the European Economic Area, and Switzerland. For Online Services, additional privacy and security details are in the Product use rights.
Privacy and Security. (a) Each of the Group Companies comply (and require and monitor the compliance of applicable third parties) in all material respects with all applicable U.S., state, foreign and multinational Laws (including Regulation (EU) 2016/679 of the European Parliament and Council of 27 April 2016 (General Data Protection Regulation), the Computer Fraud and Abuse Act (and all state and foreign Laws similar thereto), the Children’s Online Privacy Protection Act and the California Consumer Privacy Act) relating to privacy or data security, and reputable industry practice, standards, self-governing rules and policies and their own published, posted and internal agreements and policies (which are in conformance with reputable industry practice) (all of the foregoing collectively, “Privacy Laws”) with respect to: (i) personally identifiable information (including name, address, telephone number, electronic mail address, social security number, bank account number or credit card number), sensitive personal information and any special categories of personal information regulated thereunder or covered thereby (“Personal Information”) (including such Personal Information of visitors who use the Group Companies’ respective Websites, suppliers, clients and distributors), whether any of same is accessed or used by the Group Companies or any of their respective business partners; (ii) non-personally identifiable information (including such Personal Information of visitors who use the Group Companies respective Websites, suppliers, clients and distributors), whether any of same is accessed or used by any Group Company or any of their respective business partners; (iii) spyware and adware; (iv) the procurement or placement of advertising from or with reputable Persons and Websites; (v) the use of Internet searches associated with or using particular words or terms; (vi) the sending of solicited or unsolicited electronic mail messages; and (vii) privacy generally.
(b) The Group Companies post all policies with respect to the matters set forth in Section 3.20(a) on their respective Websites in conformance with Privacy Laws. No Group Company uses, collects, or receives any Personal Information or sensitive non-personally identifiable information and does not become aware of the identity or location of, or identify or locate, any particular Person as a result of any receipt of such Personal Information.
(i) To the Group Companies’ knowledge, the advertisers and other Persons with whic...
Privacy and Security. MX may in its sole discretion terminate the Agreement at any time if MX determines in its sole discretion that Participant’s actions and/or continued participation in MX would, or is reasonably likely to, endanger the privacy or security of Patient Data or otherwise result in a breach of the Agreement that is reasonably likely to harm MX or an NP Participant. MX shall deliver notice of this termination to Participant at least twenty-four (24) hours prior to terminating Participant’s access to the System, unless MX determines in its sole discretion that Participant’s access must be terminated immediately in order to protect the privacy or security of the Patient Data, in which case MX may terminate access immediately without notice.
Privacy and Security. We do not sell or rent your personal information to third parties for marketing purposes without your consent and we only use Your Information as described in the Privacy Policy. We view protection of users' privacy as a very important principle. We understand clearly that you and Your Information are one of our most important assets. We store and process Your Information on computers located in the United States that are protected by physical as well as technological security devices. You should only log in to your PayPal account on a page which begins with xxxxx://xxx.xxxxxx.xxx/. All of our pages begin with xxxxx://xxx.xxxxxx.xxx/ and therefore you should not use any other site that does not begin as such. We use third parties to verify and certify our privacy principles. Our current Privacy Policy is available at xxxxx://xxx.xxxxxx.xxx/cgi-bin/webscr?cmd=p/gen/privacy-outside. If you object to your information being transferred or used in this way, please do not use our Services.