Privacy; Data Protection. When You visit the Site, the Symantec Privacy Policy that is available for review via the “Privacy Policy” link that appears on the Site shall apply. When You request the Services, the following information will be collected and sent from Your device to Symantec via an Internet connection: The information provided by You to Symantec’s service representative over the phone or entered by You into Symantec’s online interface when requesting the Services; and The type and version of operating system and Internet browser used by Your device. During Your Services session, if a Support Software Tool is installed, the following information may be collected by the Support Software Tool and sent to Symantec via secured connection: The number of files scanned, threats found, and threats fixed by the Support Software Tool; The type of threats found; The number and type of threats remaining that have not been fixed by the Support Software Tool; Whether a firewall is active; Whether antivirus software is installed, running, and up to date; Browser information including security and temporary file settings; System information related to the operating system, memory and disk space, proxy configuration, and directory listings for the Support Software Tool; The security status (good/fair/poor) of the device as determined by the Support Software Tool; Installed programs and active processes information; and Application log file information and registry data. All of the collected information as set out above is necessary for the purpose delivery of the Services including analyzing, diagnosing, resolving the problem You have encountered, and optimizing the functionality of Symantec’s products and services. The information may be transferred to the Symantec group in the United States or other countries that may have less protective data protection laws than the region in which You are situated (including the European Union), but Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection. Symantec may disclose the collected information if asked to do so by a law enforcement official as required or permitted by law or in response to a subpoena or other legal process. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from th...
Privacy; Data Protection. The Licensed Software may collect the IP address for your system on which the Licensed Software is installed and submit such IP address to Symantec through the Licensed Software, for the purpose of enabling Symantec to fulfill a technical support request from You or Your network administrator or to improve the installation process for the Licensed Software. The information will be used only for the purpose(s) set forth above. The information may be transferred to the Symantec group in the United States or other countries that may have less protective data protection laws than the region in which you are situated (including the European Union), but Symantec has taken steps so that the information, if transferred, receives an adequate level of protection. Any such information obtained by the Licensed Software will be maintained in a secure manner, and will not be correlated with any other personally identifiable information. Symantec may disclose the information if asked to do so by a law enforcement official as required or permitted by law or in response to a subpoena or other legal process.
Privacy; Data Protection. (a) Parent and its Subsidiaries used commercially reasonable efforts to (i) make all disclosures to, and obtain all necessary consents from users, customers and workers (i.e., employees, independent contractors and temporary employees) of Parent and its Subsidiaries required by applicable law relating to privacy and data security and (ii) file registrations as required with the applicable data protection authority. Parent and its Subsidiaries also have ensured that each of them has complied with any cross-border limitation relating to the transfer of Personal Information. Parent and its Subsidiaries have posted a privacy policy governing its use of data and disclaimers of liability on their web sites, and have complied at all times in all respects with such privacy policy, any public statements made by any of them regarding its privacy practices and all other rules, policies and procedures established from time to time by any of them with respect to Personal Information. Such posted privacy policies cover all of the activities in which Parent and its Subsidiaries are engaged including the placement of cookies, the tracking of user activity on a website and the creation of profiles of users; and Parent and its Subsidiaries comply with all requests from users, customers and workers to opt-out of the collection, use or disclosure of Personal Information as required by applicable law.
(b) There is no action or claim pending, asserted or, to the knowledge of Parent, threatened or anticipated against Parent or any of its Subsidiaries alleging a violation of privacy, data protection, data security or confidentiality obligations under any applicable Legal Requirements, and no valid basis exists for any such action or claim. The negotiation, execution and consummation of the transactions contemplated by this Agreement, and any disclosure and/or transfer of information, including Personal Information, in connection therewith, will not breach or otherwise cause any violation of any such Legal Requirements relating to privacy, data protection, data security or the collection, use or maintenance of Personal Information relating to users, customers or workers. With respect to all Personal Information gathered or accessed in the course of operations of Parent and its Subsidiaries, Parent and its Subsidiaries have at all times taken all reasonable measures consistent with industry best practices to ensure that such data is protected against loss and unauthorized access, u...
Privacy; Data Protection. From time to time, the Prerelease Software may collect certain information from Your computer, which may include: Information on potential security risks as well as URLs of websites visited that the Prerelease Software deems potentially fraudulent. The URLs could contain personally identifiable information that a potentially fraudulent website is attempting to obtain without Your permission. This information is collected by Symantec for the purpose of evaluating and improving the ability of Symantec’s products to detect malicious behavior, potentially fraudulent websites and other Internet security risks. URLs of websites visited as well as search keywords and search results only if the Norton Safe Web feature is enabled. This information is collected by Symantec for the purpose of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it. Executable files and files that contain executable content that are identified as potential malware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Prerelease Software’s automatic submission function. The collected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. Such automatic submission function may be deactivated after installation by following the instructions in the associated documentation for applicable products. The name given to the computer, mobile or mobile computing device (the “Device”) during the initial setup of such Device. If collected, the name will be used by Symantec as an account name for the Device under which You may elect to receive additional services and/or under which You may use certain features of the Prerelease Software. You may change such account name at any time after installation of the Prerelease Software (recommended). Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation of the Software was successfully completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encounter...
Privacy; Data Protection. 9.1 The Customer acknowledges that it has read and understood the Viva Energy Australia Privacy Policy available at xxx.xxxxxxxxxx.xxx.xx (Privacy Policy).
9.2 Viva Energy will comply with the Privacy Policy (as amended from time to time).
9.3 The Customer acknowledges that it consented to use of its information in accordance with the Privacy Policy (as amended from time to time) and Clauses 13 - 17 when completing the application for eInvoice access and the Customer warrants that each eInvoice Authorised User has consented to the use of their personal information in accordance with the Privacy Policy (as amended from time to time) and Clauses 13 - 17.
Privacy; Data Protection. Other than as set forth in Section 2.18 of the Company Disclosure Schedule:
(a) The Company has complied, and is in compliance, in all material aspects with the Company’s (i) terms of service and / or user agreements (“Terms of Service”) and (ii) published privacy policies in effect at all applicable times (the “Privacy Policies”). True, correct and complete copies of such Terms of Service and Privacy Policies have been provided to Buyer prior to the date hereof.
(b) The Company is (and has been) in compliance in all material respects, with all applicable Laws that relate to or govern (i) the collection, compilation, use, storage, security, disclosure and transfer of User Data, (ii) sending or causing or permitting to be sent to an electronic address a commercial electronic message, and (iii) installing or causing to be installed a computer program on any other Person’s computer system. The Company has the requisite third-party consents to use all User Data in accordance with the Terms of Service and Privacy Policies and to engage and to have engaged in the aforementioned activities.
(c) The Company has taken reasonable administrative, technical and physical measures to protect its rights in any User Data and to ensure that all User Data is protected against loss, damage, and unauthorized access, use, modification or other misuse. To the Knowledge of the Company, there has been no loss, damage, or unauthorized access, use, modification, or other misuse of any User Data maintained by or on behalf of the Company in the past three (3) years. No Person or Governmental Body has made any material written complaint or Claim or commenced any Claim or proceeding with respect to Loss, damage, or unauthorized access, use, modification, or other misuse of any such information; and, to the Knowledge of the Company, there is no reasonable basis for any such Claim.
(d) The consummation of the transactions contemplated by this Agreement will not (i) violate the Company’s Terms of Service or Privacy Policies, (ii) require the Company to provide any notice to, or seek any consent from, any user, employee, customer, supplier, service provider or other third party thereunder as it relates to User Data, (iii) under applicable Laws and the Privacy Policies, restrict the ability of the Company to use User Data after the Closing. Except for restrictions set forth in applicable Laws or the Privacy Policies, there shall be no restriction on the use by Company of User Data collected...
Privacy; Data Protection. (a) Company and its Subsidiaries have used commercially reasonable efforts to (i) make all disclosures to, and obtain all necessary consents from, users, customers and workers (i.e., employees, independent contractors and temporary employees) of Company and its Subsidiaries required by applicable law relating to privacy and data security and (ii) file registrations as required with the applicable data protection authority. Company and its Subsidiaries also have ensured that each of them has complied with any cross-border limitation relating to the transfer of Personal Information (as defined below). Company and its Subsidiaries have posted a privacy policy governing its use of data and disclaimers of liability on their web sites, and have complied at all times in all respects with such privacy policy, any public statements made by any of them regarding its privacy practices and all other rules, policies and procedures established from time to time by any of them with respect to Personal Information. Such posted privacy policies cover all of the activities in which Company or its Subsidiaries are engaged including the placement of cookies, the tracking of user activity on a website and the creation of profiles of users; and Company and its Subsidiaries comply with all requests from users, customers and workers to opt-out of the collection, use or disclosure of Personal Information as required by applicable law. As used in this Agreement, “Personal Information” means any information that (alone or in combination with other information held by a Person) can be used to identify a specific individual, including without limitation such individual’s name, address, telephone number, fax number, email address or credit card number.
Privacy; Data Protection. The provisions below are not intended as legal advice; You are responsible for determining what laws, including data privacy laws, to which You and Your business are subject.
Privacy; Data Protection. By installing and/or using the Software and Services, You agree that Symantec may, and You have obtained all the necessary consents and rights for Symantec to, collect, use, retain, disclose and/or process Collected Data for the purposes and as described in the applicable Symantec product privacy notices, including the Symantec privacy statement at: xxxx://xxx.xxxxxxxx.xxx/privacy. “
Privacy; Data Protection. Seller has not collected any personally identifiable information concerning users of its products, services and websites from any third parties in connection with the operation of the TRS Business. Seller and, to Seller’s Knowledge, its subcontractors in the TRS Business have complied in all material respects with all Requirements of Law and its privacy policies relating to the privacy of users of Seller’s products, services and websites, including without limitation with respect to the use, collection, storage, disclosure and transfer of any data and personally identifiable information collected by Seller or by third parties having authorized access to the records of Seller. Seller and, to the Knowledge of Seller, its subcontractors have complied in all material respects with all Requirements of Law and its privacy policies relating to the collection, use, storage, transfer, and disclosure of any data and personally identifiable information of any employees, contractors or consultants, both in the United States and internationally. Seller has not received a complaint regarding Seller’s collection, use or disclosure of data, including but not limited to personally identifiable information. The execution, delivery and performance of this Agreement comply with all Requirements of Law relating to privacy and do not violate Seller’s privacy policies. True and correct copies of all such privacy policies are referred to on Schedule 4.21 and are available to Purchaser for review, and Seller and its subcontractors have at all times made all privacy policy disclosures to such users or customers as required by Requirements of Law. None of such disclosures made or contained in any such privacy policy has been inaccurate, misleading or deceptive or in violation of any Requirements of Law. Seller has implemented and maintains a comprehensive plan, or plans, which (i) identifies internal and external risks to the security of data and TRS Confidential Information, including personally identifiable information; (ii) implements, monitors and improves adequate and effective administrative, electronic and physical safeguards to control those risks; (iii) maintains notification procedures in compliance with all Requirements of Law and privacy or other policies in the case of any breach of security compromising data, including unencrypted data containing personally identifiable information; and (iv) adequately provides for the prevention of data loss. Seller has not experience...