Protecting Information. 2.1 City/Town must identify all places, both physical and logical, where City/Town receives, processes, and stores Tax Information and create a plan to adequately secure those areas.
2.2 Tax Information must be protected during transmission, storage, use, and destruction. City/Town must have written policies, standards, and procedures to document how it protects its information systems, including Tax Information so that it conforms to the State of Arizona statutes A.R.S. §§ 42-2001 through 42-2004 and policies, standards, and procedures found on the Arizona Strategic Enterprise Technology (“ASET”) website at xxxx.xx.xxx/xxxxxxxxx/xxxxxxxx-xxxxxxxxx-xxx- procedures or ASET’s successor agency or website and Arizona Department of Homeland Security’s website at xxxxx://xxxxxx.xxx/information-security-policies- standards-and-procedures.
2.3 Department staff and authorized City/Town staff are prohibited from inspecting Tax Information unless they have a business reason. Browsing through Tax Information concerning friends, neighbors, family members, or people in the news is strictly prohibited.
2.4 All removable media, including paper and CDs, containing Tax Information must be secured when not in use and after normal business hours by placing all materials in a locked drawer or cabinet. During use, Tax Information must be protected so that it is not visible to members of the public or anyone without a business need for the information.
2.5 All individuals accessing or storing Tax Information from an alternative work site must enter into a signed agreement that specifies how the Tax Information will be protected while at that site. Only trusted employees shall be permitted to access Tax Information from alternative sites. Tax Information may not be accessed while in public places such as restaurants, lounges, or pools.
2.6 Tax Information may not be discussed in elevators, restrooms, the cafeteria, or other public areas. Terminals should be placed in such a manner that prohibits public viewing of Tax Information.
2.7 When transporting confidential materials, the materials should be covered so that others cannot see the Tax Information. When sending Tax Information by fax, a cover sheet should always be used.
2.8 Any person with unsupervised access to Tax Information shall receive training on the confidentiality laws and requirements to protect such information before being given access to such information and annually thereafter. They must sign certificates after...
Protecting Information. We maintain appropriate physical, electronic, technological, procedural, and organizational safeguards to protect against unauthorized access, disclosure, copying, use or modification, theft, misuse, or loss of your personal information in our custody or control. These safeguards are appropriate to the sensitivity of the information, the purposes for which it is used, the quantity and distribution of the personal information and the medium on which we (or our service providers) store it. We limit access to your personal information to the employees and agents who require it for the purposes of their role. Your personal information is only used for the purposes for which it was collected or where permitted by law. We store personal information for as long as is necessary to achieve the purposes for which it was collected or in accordance with applicable law.
Protecting Information. We may retain copies of your identity documents to comply with Canadian and our home office regulatory and legislative requirements with respect to record keeping. Your information will be protected with appropriate safeguards and security measures. We will retain your information only for the time it is required for the purposes explained.
Protecting Information. Consumer information Company information Client information Protecting Information Send requests for company information to Investor Relations Our employees’ personal information deserves protection too Gifts and Entertainment Before accepting a gift, check the guidelines
Protecting Information. 2.1 City/Town must identify all places, both physical and logical, where Confidential Information is received, processed and stored and create a plan to adequately secure those areas.
2.2 Confidential Information must be protected during transmission, storage, use, and destruction. City/Town must have policies and procedures to document how it protects its information systems, including Confidential Information contained therein. An example of appropriate protection standards is set forth in National Institute of Standards and Technology Special Publication 800-53. The publication may be found at xxxx://xxxxxxx.xxxx.xxx/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
2.3 Employees are prohibited from inspecting information unless they have a business reason for the information. Browsing information concerning friends, neighbors, family members, or people in the news is strictly prohibited.
2.4 All removable media, including paper and CDs, containing Confidential Information must be secured when not in use and after normal business hours by placing all materials in a locked drawer or cabinet. During use, Confidential Information must be protected so that it is not visible to members of the public or anyone without a business need for the information.
2.5 All individuals accessing or storing Confidential Information from an alternative work site must enter into a signed agreement that specifies how the Confidential Information will be protected while at that site. Only trusted employees shall be permitted to access Confidential Information from alternative sites. Confidential Information may not be accessed while in public places such as restaurants, lounges, or pools.
2.6 Confidential Information may not be sent outside the local area network by unencrypted email. City/Town is responsible for ensuring in-flight email communications containing Confidential Information are sent through a secure process. This may include encryption of the email message, a secure mailbox controlled by City/Town, an encrypted point-to- point tunnel between the correspondents or use of Transport Layer Security (TLS) between correspondents. The acceptable encryption algorithms are set forth in the standards attached as Exhibit 1, which may be updated to accommodate changed technology.
2.7 Confidential Information may not be discussed in elevators, restrooms, the cafeteria, or other public areas. Terminals should be placed in such a manner that prohibits public viewing of Confide...
Protecting Information. 12.1 You shall safeguard all confidential information Shift4 supplies or otherwise makes accessible to you using a reasonable degree of care. You shall only use Shift4’s confidential information for the purposes of these Terms and shall not disclose Shift4’s confidential information to any person, except as Shift4 may agree in advance and in writing. At Shift4’s request, you shall return to Shift4 or destroy all of Shift4’s confidential information in your possession or control.
12.2 You are solely responsible for ensuring that your account numbers, passwords, security questions and answers, login details and any other security or access information used by you to use or access the Services are kept safe and confidential. You must prevent unauthorized access to and use of any of your information or data used with or stored in or by the Services (collectively, “Account Data”). You are responsible for electronic communications sent to Shift4 or to any third-party containing Account Data and for all uses of the Services in association with your Account Data, whether or not authorized by you. Shift4 has the right to rely on user names, password and other xxxxxx credentials, access controls for the Services or any software provided or approved by Shift4 to authenticate access to, and use of, the Services and any software. You must immediately notify Shift4 if you become aware of any loss, theft or unauthorized use of any Account Data. Shift4 reserves the right to deny you access to the Services, in whole or in part, if Shift4 believes that any loss, theft or unauthorized use of any Account Data or access information has occurred.
12.3 You may submit comments or ideas about the Services, including about how to improve the Services. By submitting any idea, you agree that (a) Shift4 expressly disclaims any confidentiality obligations or use restrictions, express or implied, with respect to any idea; (b) your submission will be non-confidential; and (c) Shift4 is free to use and disclose the idea on an unrestricted basis without notifying or compensating you. You release Shift4 from all liability and obligations that may arise from Shift4’s receipt, review, use or disclosure of any portion of any idea.
Protecting Information. If the Owner intends to keep all such confidential information internal and wishes to forbid the Recipient from dispensing it to Third Parties, then select the second checkbox statement in Article VI. VII. Governing Law (30) State Of Governance. This agreement must be fully compliant with the current legal atmosphere of the state whose court systems govern its content and effect. Review the conditions that have been set above to make sure they are compliant with the governing State, then name this State in Article VII. Article VIII.
Protecting Information. 21 . 1 W e may use any information we hold about you ( and other members of your household) to manage your account with us.
21 . 2 The ways in which we collect, store, use, share and otherwise process your data are described in our privac y notice, which is available on our website.
21 . 3 You confirm that you have the consent of each member of your household to agree to our use of data in accordance with our privac y notice .
21 . 4 W e will take appropriate technical and organisational measures against unauthorised and unlawful processing, accidental loss, destruction or damage to the information we hold on you ( and your household). W e will not pass the information we hold on you outside the European Economic Area ( EEA) without obtaining your consent or putting in place other appropriate safeguards, but the persons with whom we share your information may hold or transfer this information outside the EEA, where i t may be less securel y protected.
21 . 5 I f you send us proof of identification, you are entitled to have a copy of the information we hold on you. W e may charge an administration fee for this. For further details, please contact u s in accordance with section 29 ( communications). Please see the privac y notice on our website for further details.
Protecting Information. 1You are solely responsible for ensuring that your account numbers, passwords, security questions and answers, login details and any other security or access information used by you to use or access the Clover Service is kept safe and confidential. You must prevent unauthorized access to and use of any Account Data. You are responsible for all electronic communications sent to us or to any third party (including Clover Network, Inc.) containing Account Data and for all uses of the Clover Service or any software provided or approved by Processor to authenticate access to, and use of, the Clover Service and any software. Processor has the right to rely on user names, password and other xxxxxx credentials, access controls for the Clover Service or any software provided or approved by Processor to authenticate access to, and use of, the Clover Service and any software. You must immediately notify us if you become aware of any loss, theft or unauthorized use of any Account Data (see Clover Service support center contact information below). We reserve the right to deny you access to the Clover Service, in whole or in part, if we believe that any loss, theft or unauthorized use of any Account Data or access information has occurred.
Protecting Information. 13.1 You shall safeguard all confidential information Clover supplies or otherwise makes accessible to you using a reasonable degree of care. You shall only use Clover’s confidential information for the purposes of these Terms and shall not disclose Clover’s confidential information to any person, except as Clover may agree in advance and in writing. At Clover’s request, you shall return to Clover or destroy all of Clover’s confidential information in your possession or control.
13.2 You are solely responsible for ensuring that your account numbers, passwords, security questions and answers, login details and any other security or access information used by you to use or access the Service is kept safe and confidential. You must prevent unauthorized access to and use of any of your information or data used with or stored in or by the Service (collectively, “Account Data“). You are responsible for electronic communications sent to Clover or to any third party containing Account Data and for all uses of the Service in association with your Account Data, whether or not authorized by you. Clover has the right to rely on user names, password and other xxxxxx credentials, access controls for the Service or any software provided or approved by Clover to authenticate access to, and use of, the Service and any software. You must immediately notify Clover if you become aware of any loss, theft or unauthorized use of any Account Data (see Clover Service support center contact information below). Clover reserves the right to deny you access to the Service, in whole or in part, if Clover believes that any loss, theft or unauthorized use of any Account Data or access information has occurred.
13.3 You may submit comments or ideas about the Service, including about how to improve the Service. By submitting any idea, you agree that (a) Clover expressly disclaims any confidentiality obligations or use restrictions, express or implied, with respect to any idea; (b) your submission will be non-confidential; and (c) Clover is free to use and disclose the idea on an unrestricted basis without notifying or compensating you. You release Clover from all liability and obligations that may arise from Clover’s receipt, review, use or disclosure of any portion of any idea.