Protecting Information Sample Clauses
Protecting Information. 2.1 City/Town must identify all places, both physical and logical, where City/Town receives, processes, and stores Tax Information and create a plan to adequately secure those areas.
2.2 Tax Information must be protected during transmission, storage, use, and destruction. City/Town must have written policies, standards, and procedures to document how it protects its information systems, including Tax Information so that it conforms to the State of Arizona statutes A.R.S. §§ 42-2001 through 42-2004 and policies, standards, and procedures found on the Arizona Strategic Enterprise Technology (“ASET”) website at ▇▇▇▇.▇▇.▇▇▇/▇▇▇▇▇▇▇▇▇/▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇-▇▇▇- procedures or ASET’s successor agency or website and Arizona Department of Homeland Security’s website at ▇▇▇▇▇://▇▇▇▇▇▇.▇▇▇/information-security-policies- standards-and-procedures.
2.3 Department staff and authorized City/Town staff are prohibited from inspecting Tax Information unless they have a business reason. Browsing through Tax Information concerning friends, neighbors, family members, or people in the news is strictly prohibited.
2.4 All removable media, including paper and CDs, containing Tax Information must be secured when not in use and after normal business hours by placing all materials in a locked drawer or cabinet. During use, Tax Information must be protected so that it is not visible to members of the public or anyone without a business need for the information.
2.5 All individuals accessing or storing Tax Information from an alternative work site must enter into a signed agreement that specifies how the Tax Information will be protected while at that site. Only trusted employees shall be permitted to access Tax Information from alternative sites. Tax Information may not be accessed while in public places such as restaurants, lounges, or pools.
2.6 Tax Information may not be discussed in elevators, restrooms, the cafeteria, or other public areas. Terminals should be placed in such a manner that prohibits public viewing of Tax Information.
2.7 When transporting confidential materials, the materials should be covered so that others cannot see the Tax Information. When sending Tax Information by fax, a cover sheet should always be used.
2.8 Any person with unsupervised access to Tax Information shall receive training on the confidentiality laws and requirements to protect such information before being given access to such information and annually thereafter. They must sign certificates after...
Protecting Information. We maintain appropriate physical, electronic, technological, procedural, and organizational safeguards to protect against unauthorized access, disclosure, copying, use or modification, theft, misuse, or loss of your personal information in our custody or control. These safeguards are appropriate to the sensitivity of the information, the purposes for which it is used, the quantity and distribution of the personal information and the medium on which we (or our service providers) store it. We limit access to your personal information to the employees and agents who require it for the purposes of their role. Your personal information is only used for the purposes for which it was collected or where permitted by law. We store personal information for as long as is necessary to achieve the purposes for which it was collected or in accordance with applicable law.
Protecting Information. Consumer information Company information Client information Protecting Information Send requests for company information to Investor Relations Our employees’ personal information deserves protection too Gifts and Entertainment Before accepting a gift, check the guidelines
Protecting Information. We may retain copies of your identity documents to comply with Canadian and our home office regulatory and legislative requirements with respect to record keeping. Your information will be protected with appropriate safeguards and security measures. We will retain your information only for the time it is required for the purposes explained.
Protecting Information. 12.1 You shall safeguard all confidential information Shift4 supplies or otherwise makes accessible to you using a reasonable degree of care. You shall only use Shift4’s confidential information for the purposes of these Terms and shall not disclose Shift4’s confidential information to any person, except as Shift4 may agree in advance and in writing. At Shift4’s request, you shall return to Shift4 or destroy all of Shift4’s confidential information in your possession or control.
12.2 You are solely responsible for ensuring that your account numbers, passwords, security questions and answers, login details and any other security or access information used by you to use or access the Services are kept safe and confidential. You must prevent unauthorized access to and use of any of your information or data used with or stored in or by the Services (collectively, “Account Data”). You are responsible for electronic communications sent to Shift4 or to any third-party containing Account Data and for all uses of the Services in association with your Account Data, whether or not authorized by you. Shift4 has the right to rely on user names, password and other ▇▇▇▇▇▇ credentials, access controls for the Services or any software provided or approved by Shift4 to authenticate access to, and use of, the Services and any software. You must immediately notify Shift4 if you become aware of any loss, theft or unauthorized use of any Account Data. Shift4 reserves the right to deny you access to the Services, in whole or in part, if Shift4 believes that any loss, theft or unauthorized use of any Account Data or access information has occurred.
12.3 You may submit comments or ideas about the Services, including about how to improve the Services. By submitting any idea, you agree that (a) Shift4 expressly disclaims any confidentiality obligations or use restrictions, express or implied, with respect to any idea; (b) your submission will be non-confidential; and (c) Shift4 is free to use and disclose the idea on an unrestricted basis without notifying or compensating you. You release Shift4 from all liability and obligations that may arise from Shift4’s receipt, review, use or disclosure of any portion of any idea.
Protecting Information. 1You are solely responsible for ensuring that your account numbers, passwords, security questions and answers, login details and any other security or access information used by you to use or access the Clover Service is kept safe and confidential. You must prevent unauthorized access to and use of any Account Data. You are responsible for all electronic communications sent to us or to any third party (including Clover Network, Inc.) containing Account Data and for all uses of the Clover Service or any software provided or approved by Processor to authenticate access to, and use of, the Clover Service and any software. Processor has the right to rely on user names, password and other ▇▇▇▇▇▇ credentials, access controls for the Clover Service or any software provided or approved by Processor to authenticate access to, and use of, the Clover Service and any software. You must immediately notify us if you become aware of any loss, theft or unauthorized use of any Account Data (see Clover Service support center contact information below). We reserve the right to deny you access to the Clover Service, in whole or in part, if we believe that any loss, theft or unauthorized use of any Account Data or access information has occurred.
Protecting Information. Information must be protected in a manner commensurate with its sensitivity, value and criticality. This policy applies regardless of the media on which information is stored, the locations where the information is stored, the systems used to process the information, or the processes by which information is handled. • Mail, email and faxes must be routed directly to the intended recipient. • Information should be available to other persons in the Association only on a need-to- know basis. • Filing cabinets designated by the Association to contain personal, including sensitive, information are to be kept secured at all times. • All Board Directors, Volunteers and Members will keep all Association files secure.
Protecting Information. 21 . 1 W e may use any information we hold about you ( and other members of your household) to manage your account with us.
21 . 2 The ways in which we collect, store, use, share and otherwise process your data are described in our privac y notice, which is available on our website.
21 . 3 You confirm that you have the consent of each member of your household to agree to our use of data in accordance with our privac y notice .
21 . 4 W e will take appropriate technical and organisational measures against unauthorised and unlawful processing, accidental loss, destruction or damage to the information we hold on you ( and your household). W e will not pass the information we hold on you outside the European Economic Area ( EEA) without obtaining your consent or putting in place other appropriate safeguards, but the persons with whom we share your information may hold or transfer this information outside the EEA, where i t may be less securel y protected.
21 . 5 I f you send us proof of identification, you are entitled to have a copy of the information we hold on you. W e may charge an administration fee for this. For further details, please contact u s in accordance with section 29 ( communications). Please see the privac y notice on our website for further details.
Protecting Information. The user agrees to use and store data in accordance with the principles of the Data Protection ▇▇▇ ▇▇▇▇ and that the information will only be used for the purpose as described in this agreement and for the lifetime of this agreement. The data is not for onward transmission All users will have the option to either:- Schedule and download manual extracts from the EduBase2 portal. This is available in XML, CSV or XLS format. All users of the Web Service will have the option to obtain XML data feeds, or XML, CSV or XLS scheduled extracts. This option will require the linking of your applications via the Web Service to allow for automated data transfer, thus removing the burden of manually updating data and will ensure synchronisation between databases. If you require further information on how to integrate your system with the web services, please refer to the Help Section and access the ws-specifications or alternatively , please contact the EduBase Service Desk on 0870 120 25 27 or email on ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇.▇▇▇.▇▇ Please Note: This data is not for onwards transmission on a commercial basis. Access to EduBase 2 will be given to the following person(s) who are employees, please can you also highlight if any contractors require access, the name of the project they are specifically involved with, how long they require access for and why:- Key Contact Name, Job Title, Contact Telephone Number & Email Address Superuser Name, Job Title, Contact Telephone Number & Email Address Name, Job Title, Contact Telephone Number & Email Address Name, Job Title, Contact Telephone Number & Email Address All staff require months access Please indicate the estimated length of time required for access i.e. 3 months, 6 months or 12 months. Can you please provide a generic email address for business purposes. Generic Email Address Alternatively, can you please ensure that an email address is provided for each user annotated above. If for any reason there are problems with access or with the data extracts please refer to the Content Management Section in EduBase and see the Frequently Asked Questions Guides or contact The EduBase Helpdesk via e-mail at: ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇.▇▇.▇▇ or telephone: ▇▇▇▇ ▇▇▇ ▇▇▇▇.
Protecting Information. If the Owner intends to keep all such confidential information internal and wishes to forbid the Recipient from dispensing it to Third Parties, then select the second checkbox statement in Article VI. VII. Governing Law (30) State Of Governance. This agreement must be fully compliant with the current legal atmosphere of the state whose court systems govern its content and effect. Review the conditions that have been set above to make sure they are compliant with the governing State, then name this State in Article VII. Article VIII.
