Privacy by design Sample Clauses

Privacy by design. IRIS Connect shall be constructed with privacy-by-design principles at its core.
AutoNDA by SimpleDocs
Privacy by design. After termination of the license for the tjecco® application, the personal data processed by the licensee in the system will be deleted after 6 months at the latest. The ID data will be kept anonymized at the latest after three months after the end of the license in order to continue anonymous statistical analyses on the use of the software.
Privacy by design. A key priority during Y3 of the project has been to ensure that the architecture was fully compliant with the privacy by design approach. WP2 performed a detailed and systematic analysis of potential risks related to personal data protection. The adoption of the General Data Protection Regulation (GDPR) in April 2016 has been carefully analyzed and studied in order to ensure complete compliance. Privacy by design is ensured through concepts of full transparency, prior informed consent, the Right to be Forgotten and anonymity definition.
Privacy by design. Privacy by design aims to integrate privacy and data protection into the design specifications and architecture of information and communication systems and technologies, in order to facilitate compliance with privacy and data protection principles from the outset.
Privacy by design. To the extent the Processor designs the systems, procedures or processes under which the Processing takes place, the Processor shall design such systems as to comply with the GDPR art. 25.
Privacy by design. The Processor takes the requirements of Art. 25 GDPR into account as early as the design and development phase of the product development. This is ensured by proactively involving legal counsel and the data protection officer. Processes and functionalities are set up in such a way that data protection principles such as lawfulness, transparency, purpose limitation, data minimization, etc., as well as the security of processing are taken into account at an early stage.
Privacy by design. XXXX shall implement policies and measures to ensure that managerial, organisational, business practices and technical systems are designed in a manner to anticipate, identify and avoid harm to you; • XXXX shall implement policies and measures to ensure that the technology used in the processing of personal data is in accordance with commercially accepted or certified standards; • XXXX shall implement policies and measures to ensure that the legitimate interest of businesses including any innovation is achieved without compromising privacy interests; • XXXX shall implement policies and measures to ensure that privacy is protected throughout processing from the point of collection to deletion of personal data and processing of personal data is carried out in a transparent manner and the interest of the data provider is accounted for at every stage of processing of personal Data.
AutoNDA by SimpleDocs
Privacy by design. Of particular importance in terms of privacy by design (PbD) is the nature of technical infrastructure within the HBP. Following the completion of the DGWG’s data policy manual, it is therefore advisable to begin awareness-raising exercises among the HBPs technical staff in terms of this concept. Table 6: Privacy by Design training Sessions Planned What Who involved When Comment Locally based workshops / xxxxx-bag lunches on PbD SP12, external experts on GDPR, and on technical infrastructure, DGWG representation, SPs5-11 Ongoing, ‘roadshow’ approach to maximise exposure Exploiting economies of travel to visit local labs, etc., will allow for wide dissemination of insights Webinars Ongoing These can be arranged at relatively short notice via Doodle poll to ensure maximum turnout
Privacy by design. The Concessionaire shall design the Communications System in accordance with "Privacy by Design" principles. In accordance with these principles, the Concessionaire shall take into account throughout the design process both (a) MTA Consumers' privacy interests, (b) its Privacy Best Practices Commitment, and (c) the protection of Personally Identifiable Information throughout its lifecycle. For the avoidance of doubt, the Concessionaire’s obligations concerning Privacy by Design shall include designing the Communications System to meet the requirements set out in Section 8 (Privacy).

Related to Privacy by design

  • Company Creation and Use of Confidential Information The Executive understands and acknowledges that the Company has invested, and continues to invest, substantial time, money and specialized knowledge into developing its resources, creating a customer base, generating customer and potential customer lists, training its employees, and improving its product offerings in the field of financial services. The Executive understands and acknowledges that as a result of these efforts, the Company has created, and continues to use and create Confidential Information. This Confidential Information provides the Company with a competitive advantage over others in the marketplace.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Use of Voice, Image and Likeness I give the Company permission to use my voice, image or likeness, with or without using my name, for the purposes of advertising and promoting the Company, or for other purposes deemed appropriate by the Company in its reasonable discretion, except to the extent expressly prohibited by law.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to:

  • No Improper Use of Materials During his or her employment with the Company, Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom Employee has an obligation of confidentiality, and Employee will not bring onto the premises of the Company any unpublished documents or any property belonging to any former employer or any other person to whom Employee has an obligation of confidentiality unless consented to in writing by that former employer or person.

  • Use of Proprietary Information Officer recognizes that Corporation possesses a proprietary interest in all of the information described in Section 6 and has the exclusive right and privilege to use, protect by copyright, patent or trademark, manufacture or otherwise exploit the processes, ideas and concepts described therein to the exclusion of Officer, except as otherwise agreed between Corporation and Officer in writing. Officer expressly agrees that any products, inventions, discoveries or improvements made by Officer, his agents or affiliates based on or arising out of the information described in Section 6 shall be (i) deemed a work made for hire under the terms of United States Copyright Act, 17 U.S.C. § 101 et seq., and Corporation shall be the owner of all such rights with respect thereto and (ii) the property of and inure to the exclusive benefit of Corporation.

  • Access; Confidentiality (a) At all times during the period commencing with the execution and delivery of this Agreement and continuing until the earlier to occur of the termination of this Agreement pursuant to Article VIII and the Merger Effective Time, the Company shall afford Parent, and Parent shall afford the Company, and each of their respective financial advisors, business consultants, legal counsel, accountants and other agents and representatives reasonable access during normal business hours, upon reasonable notice, to its properties, books and records and personnel; provided, however, that the disclosing party may restrict or otherwise prohibit access to any documents or information to the extent that (i) any applicable Law requires such party to restrict or otherwise prohibit access to such documents or information or (ii) access to such documents or information would give rise to a waiver of any attorney-client privilege, work product doctrine or other applicable privilege applicable to such documents or information, and provided further, that no information or knowledge obtained by the receiving party in any investigation conducted pursuant to the access contemplated by this Section 6.05 shall affect or be deemed to modify any representation or warranty of the disclosing party set forth in this Agreement or otherwise impair the rights and remedies available to receiving party hereunder. If the Company or Parent does not provide access or information in reliance on the preceding sentence, it shall use its commercially reasonable efforts to communicate the applicable information to the other party in a way that would not violate the applicable Law or obligation or to waive such a privilege including by providing such information in redacted form as necessary to preserve such a privilege or comply with such Law or otherwise make appropriate substitute disclosure arrangements, to the extent possible. Any investigation conducted pursuant to the access contemplated by this Section 6.05 shall be conducted in a manner that does not unreasonably interfere with the conduct of the business of the Company and its Subsidiaries or Parent and its Subsidiaries. Nothing in this Section 6.05 or elsewhere in this Agreement shall be construed to require the Company, any of its Subsidiaries, Parent, any of its Subsidiaries, or any of their respective Representatives of any of the foregoing to prepare any reports, analyses, appraisals, opinions or other information or to allow sampling of any environmental media or building component.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!