Privacy Management Sample Clauses

Privacy Management. Applications such as “Software as a Service’ used by Us to collect Personal Data must have the URL for Our Privacy Statement embedded into the web page where Personal Data is collected. It is available in all languages. • Where applicable, individuals must be given the opt-in choice to participate prior to providing their Personal Data. Opt-in selection boxes are not pre-selected by default. • Where applicable, the system should have the capability of allowing individuals to accessupdate or delete their Personally Identifiable Information or unsubscribe when requested. This can be an automated or manual process. The process must be clearly explained to theindividual. • System must not transfer Personal Data to other systems or be used for purposes other thanspecified. • System must have appropriate security controls to avoid unauthorized access, disclosure and / or use or modification of individuals’ Personal Data. • The system must adhere to the Federal Trade Commission’s CAN-SPAM Act if it: o Requests input of Personal Data from an individual to complete “Email to a Friend”notifications, or o The system offers online, subscription-based communication services. • Supplier has set up protective devices for ensuring the integrity and the authenticity of Personal Data, especially state-of-the-art protective devices against malware and similar security attacks. • Supplier has implemented measures to prevent Personal Data from undergoing any unwanted degradation or deletion without having a copy immediately usable. • Supplier will keep records concerning its security, and organizational technical measures as well as records on any security incident affecting Personal Data. Such records shall be made available in a standard format immediately exploitable and available for inspection, upon Our request in the course of a security check or in the framework of an audit for up to 1 year.
AutoNDA by SimpleDocs
Privacy Management. Protection of personal information is a core business function that needs to be effectively managed. Privacy management applies common management principles (e.g., planning, directing, controlling, evaluating) to the personal information collected, used, disclosed, retained and destroyed by institutions. It involves establishing and following disciplined and consistent practices for the management of personal information. To be effective, it also requires leadership and a commitment to privacy protection at all levels of your organization. An effective privacy management program will:  Define Roles and Responsibilities: The head of an institution is accountable for compliance with FIPPA. In most institutions, some or all of the powers or duties of a head will have been delegated to an officer or officers (e.g., Delegated Decision- Makers and Coordinators). However, the management of privacy needs to be an institution-wide initiative, engaging staff at all levels. Your staff are accountable for protecting the personal information in their custody and control.
Privacy Management. The following measures shall ensure that the technical and organisational measures taken remain effective in the long term.
Privacy Management. Provider represents and warrants that it operates a comprehensive privacy program of at a minimum (i) standards and processes intended to demonstrate that Provider´s products and services comply with applicable privacy laws, regulations and contractual obligations; and (ii) processes for reviewing Provider´s standards and practices on an ongoing basis to ensure that they remain up to date. Provider shall ensure that all persons authorized to process the Personal Data of HERE have committed themselves to confidentiality. Upon request, Provider shall provide evidence to HERE of such commitment.
Privacy Management. Data protection is achieved by means of regular audits and a constantly updated list of processing activities and service agreements for all employees. These documents can be viewed by every customer. Xxxxxxxx Xxxxxx has been appointed data protection officer.
Privacy Management. ▪ Applications such as “Software as a Service’ used by McAfee Enterprise to collect Personal Data must have the URL for the McAfee Enterprise Privacy Statement embedded into the web page where Personal Data is collected. It is available in all languages. ▪ Where applicable, individuals must be given the opt-in choice to participate prior to providing their Personal Data. Opt-in selection boxes are not pre-selected by default. ▪ Where applicable, the system should have the capability of allowing individuals to access update or delete their Personally Identifiable Information or unsubscribe when requested. This can be an automated or manual process. The process must be clearly explained to the individual. ▪ System must not transfer Personal Data to other systems or be used for purposes other than specified. ▪ System must have appropriate security controls to avoid unauthorized access, disclosure and / or use or modification of individuals’ Personal Data. ▪ The system must adhere to the Federal Trade Commission’s CAN-SPAM Act if it: • Requests input of Personal Data from an individual to complete “Email to a Friend” notifications, or • The system offers online, subscription-based communication services.
Privacy Management. Applications such as “Software as a Service’ used by McAfee Enterprise to collect Personal Data must have the URL for the McAfee Enterprise Privacy Statement embedded into the web page where Personal Data is collected. It is available in all languages. Where applicable, individuals must be given the opt-in choice to participate prior to providing their Personal Data. Opt-in selection boxes are not pre-selected by default. Where applicable, the system should have the capability of allowing individuals to access update or delete their Personally Identifiable Information or unsubscribe when requested. This can be an automated or manual process. The process must be clearly explained to the individual. System must not transfer Personal Data to other systems or be used for purposes other than specified. System must have appropriate security controls to avoid unauthorized access, disclosure and / or use or modification of individuals’ Personal Data. The system must adhere to the Federal Trade Commission’s CAN-SPAM Act if it: Requests input of Personal Data from an individual to complete “Email to a Friend” notifications, or The system offers online, subscription-based communication services.
AutoNDA by SimpleDocs
Privacy Management. WALL PRIVACY allows You to manage Your privacy settings within Your Accounts by showing You how Your information is used by the Account You select, by following this process : • When You choose an Account to inspect, WALL PRIVACY will respond to Your request and review the use of Your data by the selected Account; • WALL PRIVACY then tells You what data is processed by Your Account, where You can find this data and then offers to delete the data You no longer wish to have processed in Your Account; • These are simple suggestions made following Your request to inspect the data processed in Your Account; • WALL PRIVACY proposals are based on what is technically possible to do but no guarantee is given as to the practical application of these requests on Your Account; • You are under no obligation to follow these suggestions, You can either simply read the result of the research or do nothing. While performing Privacy Management, We rely on various third-party providers, such as providers of technical support and information alerts’ providers. In no case We shall bear responsibility on the accuracy of data provided by such third-party providers and shall bear no responsibility on any type of loss and/or damage caused in connection of such data to any party. WALL PRIVACY is not responsible for : • the consequences of Your choices on WALL PRIVACY, for which You are solely responsible for; • the actions taken on Your Account as a result of Your choices made through the WALL PRIVACY; • the respect of Your choices made in Your Account. Only You have the possibility to ensure that the data is no longer processed in accordance with the choices You have made WALL PRIVACY does not interfere with the privacy settings available within Your Accounts, nor does it offer additional privacy settings. We encourage You to review the Terms of Use and privacy statements of Your accounts to understand what is done with Your personal data in Your accounts.
Privacy Management. HERE represents and warrants that it operates a comprehensive privacy program that includes (i) standards and processes intended to demonstrate HERE’s compliance with Data Protection Laws, regulations and contractual obligations; and (ii) effective processes for review- ing HERE standards and practices to ensure compliance. HERE ensures that its personnel and subprocessors engaged in the Processing of Personal Data are informed and have received appropriate training regarding their responsibilities and obligations of confidentiality, which survive the termination of its personnel or a subprocessor’s engagement with HERE. HERE shall ensure that access to your Personal Data is limited to those personnel who require such access to perform the Agreement. HERE’s global privacy and data protection team and Data Protection Officer may be reached via email at xxxxxxx@xxxx.xxx.

Related to Privacy Management

  • Information Management Information and Records

  • Traffic Management 9.2.1 During the Operating Period, Developer shall be responsible for the general management of traffic on the Project. Developer shall manage traffic so as to preserve and protect safety of traffic on the Project and Related Transportation Facilities and, to the maximum extent practicable, to avoid disruption, interruption or other adverse effects on traffic flow, throughput or level of service on the Project and Related Transportation Facilities. Developer shall conduct traffic management in accordance with all applicable Technical Provisions, Technical Documents, Laws and Governmental Approvals, and in accordance with the Traffic Management Plan. 9.2.2 Developer shall prepare and submit to TxDOT and the Independent Engineer for TxDOT approval a Traffic Management Plan for managing traffic on the Project and Related Transportation Facilities after the commencement of traffic operations on any portion of the Project, addressing (a) orderly and safe movement and diversion of traffic on Related Transportation Facilities during Project construction, (b) orderly and safe movement of traffic on the Project and (c) orderly and safe diversion of traffic on the Project and Related Transportation Facilities necessary in connection with field maintenance and repair work or Renewal Work or in response to Incidents, Emergencies and lane closures. Developer shall prepare the Traffic Management Plan according to the schedule set forth in the Technical Provisions. The Traffic Management Plan shall comply with the Technical Provisions and Technical Documents concerning traffic management and traffic operations. Developer shall carry out all traffic management during the Term in accordance with the approved Traffic Management Plan. 9.2.3 Developer shall implement the Traffic Management Plan to promote safe and efficient operation of the Project and Related Transportation Facilities at all times during the course of any construction or operation of the Project and during the Utility Adjustment Work. 9.2.4 TxDOT shall have at all times, without obligation or liability to Developer, the right 9.2.4.1 Issue Directive Letters to Developer regarding traffic management 9.2.4.2 Provide on the Project, via message signs or other means consistent with Good Industry Practice, non-Discriminatory traveler and driver information, and other public information (e.g. amber alerts), provided that the means to disseminate such information does not materially interfere with the functioning of the ETCS.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Records Management Records the Provider must keep

  • Management Information To be Supplied to CCS no later than the 7th of each month without fail. Report are to be submitted via MISO CCS Review 100% Failure to submit will fall in line with FA KPI FROM THE FOLLOWING, PLEASE SELECT AND OUTLINE YOUR CHARGING MECHANISM FOR THIS SOW. WHERE A CHARGING MECHANISM IS NOT REQUIRED, PLEASE REMOVE TEXT AND REPLACE WITH “UNUSED”. 5.1 CAPPED TIME AND MATERIAL CHARGES 5.2 PRICE PER STORY POINT CHARGES 5.3 TIME AND MATERIALS CHARGES

  • Change Management BellSouth provides a collaborative process for change management of the electronic interfaces through the Change Control Process (CCP). Guidelines for this process are set forth in the CCP document as amended from time to time during this Agreement. The CCP document may be accessed via the Internet at xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity 1.1.02 Identify at least one individual to act as the program contact in the following areas: 1. Immunization Program Manager;

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement. 60.2 The Parties will employ characteristics and methods of operation that will not interfere with or impair the Parties’ networks, or the network of any third parties or Affiliated companies, connected with or involved directly in the network or facilities of CenturyLink. 60.3 CLEC shall not interfere with or impair service over any circuits, facilities or equipment of CenturyLink, its Affiliated companies, or its connecting and concurring carriers. 60.4 If CLEC causes any impairment or interference, CenturyLink shall promptly notify CLEC of the nature and location of the problem and that, unless promptly rectified, a temporary discontinuance of the use of any circuit, facility or equipment may be required. The Parties agree to work together to attempt to promptly resolve the impairment or interference. If CLEC is unable to promptly remedy, then CenturyLink may, at its option, temporarily discontinue the use of the affected circuit, facility or equipment until the impairment is remedied. 60.5 Any violation of Applicable Law or regulation regarding the invasion of privacy of any communications carried over CenturyLink’s facilities, or that creates hazards to the employees of CenturyLink or to the public, is also considered an impairment of service. 60.6 CenturyLink shall give advanced notice to CLEC of all non-scheduled maintenance or other planned network activities to be performed by CenturyLink on any Network Element, including any hardware, equipment, software, or system, providing service functionality of which CLEC has advised CenturyLink may potentially impact CLEC End Users. 60.7 The Parties shall provide notice of network changes and upgrades in accordance with 47 C.F.R. §§51.325 through 51.335. CenturyLink may discontinue any Interconnection arrangement, Telecommunications Service, or Network Element provided or required hereunder due to network changes or upgrades after providing CLEC notice as required by this Section. CenturyLink agrees to cooperate with CLEC and/or the appropriate regulatory body in any transition resulting from such discontinuation of service and to minimize the impact to customers which may result from such discontinuance of service.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!