Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.
Protection The Asset Representations Reviewer will take reasonable measures to protect the secrecy of and avoid disclosure and unauthorized use of Confidential Information, including those measures that it takes to protect its own confidential information and not less than a reasonable standard of care. The Asset Representations Reviewer acknowledges that Personally Identifiable Information is also subject to the additional requirements in Section 4.09.
Protection of PFPC Trust PFPC Trust shall be indemnified by the Fund and without liability for any action PFPC Trust takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC Trust receives from or on behalf of the Fund or from counsel and which PFPC Trust believes, in good faith, to be consistent with those directions or advice or Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC Trust (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.
Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.
Protection of Right Title and Interest (a) The Seller shall execute and file such financing statements and cause to be executed and filed such continuation statements, all in such manner and in such places as may be required by law fully to preserve, maintain, and protect the interest of the Purchaser (or its assignee) in the Receivables and in the proceeds thereof. The Seller shall deliver (or cause to be delivered) to the Purchaser file-stamped copies of, or filing receipts for, any document filed as provided above, as soon as available following such filing. (b) The Seller shall not change its name, identity, or corporate structure in any manner that would, could, or might make any financing statement or continuation statement filed by the Seller in accordance with paragraph (a) above seriously misleading within the meaning of ss. 9-402(7) of the UCC, unless it shall have given the Purchaser at least five (5) days' prior written notice thereof and shall have promptly filed appropriate amendments to all previously filed financing statements or continuation statements. (c) The Seller shall give the Purchaser at least sixty (60) days' prior written notice of any relocation of its principal executive office if, as a result of such relocation, the applicable provisions of the UCC would require the filing of any amendment of any previously filed financing or continuation statement or of any new financing statement and shall promptly file any such amendment or new financing statement. The Seller shall at all times maintain each office from which it shall service Receivables, and its principal executive office, within the United States of America. (d) The Seller shall maintain accounts and records as to each Receivable accurately and in sufficient detail to permit the reader thereof to know at any time the status of such Receivable, including payments and recoveries made and payments owing (and the nature of each). (e) The Seller shall maintain its computer systems, in accordance with its customary standards, policies and procedures, so that, from and after the time of conveyance hereunder of the Receivables to the Purchaser, the Seller's master computer records (including any back-up archives) that refer to a Receivable shall indicate clearly the interest of the Purchaser in such Receivable and that such Receivable is owned by the Purchaser or its assignee. Indication of the ownership of a Receivable by the Purchaser or its assignee shall not be deleted from or modified on the Seller's computer systems until, and only until, the Receivable shall have been paid in full or repurchased. (f) If at any time the Seller shall propose to sell, grant a security interest in, or otherwise transfer any interest in automotive receivables to any prospective purchaser, lender, or other transferee, the Seller shall give to such prospective purchaser, lender, or other transferee computer tapes, records, or print-outs (including any restored from back-up archives) that, if they shall refer in any manner whatsoever to any Receivable, shall indicate clearly that such Receivable has been conveyed to and is owned by the Purchaser. (g) The Seller shall, upon receipt by the Seller of reasonable prior notice, permit the Purchaser and its agents at any time during normal business hours to inspect, audit, and make copies of and abstracts from the Seller's records regarding any Receivable. (h) Upon request, the Seller shall furnish to the Purchaser, within twenty (20) Business Days, a list of all Receivables (by contract number and name of Obligor) then owned by the Purchaser, together with a reconciliation of such list to the Schedule of Receivables.
Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include: a. A list of the students whose Student Data was involved in or is reasonably believed to have been involved in the breach, if known; and b. The name and contact information for an employee of the Provider whom parents may contact to inquire about the breach.
Protection of the Environment If the Contractor encounters circumstances such as weather conditions or site factors where the Contractor knows or should reasonably know that proceeding with the Work may, directly or indirectly, cause Environmental Damage, the Contractor shall:
Protection of Personal Data 25.1 The Parties agree that they may obtain and have access to personal data for the duration of the Agreement for the fulfilment of the rights and obligations contained herein. In performing the obligations as set out in this Agreement, the Parties shall at all times ensure that: a) they process data only for the express purpose for which it was obtained; b) once processed for the purposes for which it was obtained, all data will be destroyed to an extent that it cannot be reconstructed to its original form; c) data is provided only to authorised personnel who strictly require the personal data to carry out the Parties’ respective obligations under this Agreement; d) they do not disclose personal data of the other Party, other than in terms of this Agreement; e) they have all reasonable technical and organisational measures in place to protect all personal data from unauthorised access and/or use; f) they have appropriate technical and organisational measures in place to safeguard the security, integrity and authenticity of all data in its possession or under its control in terms of this Agreement; g) such personal data is protected against unauthorised or unlawful processing, accidental loss, destruction or damage, alteration, disclosure or access. 25.2 The Parties agree that if personal data will be processed for additional purposes beyond the original purpose for which it was obtained, explicit consent must be obtained beforehand from those persons whose information will be subject to further processing. 25.3 Should it be necessary for either Party to disclose or otherwise make available the personal data to any third party (including sub-contractors and employees), it may do so only with the prior written permission of the other Party. The Party requiring such permission shall require of all such third parties, appropriate written undertakings to be provided, containing similar terms to that set forth in this clause 25, and dealing with that third party's obligations in respect of its processing of the personal data. Following approval by the other Party, the Party requiring permission agrees that the provisions of this clause 25 shall mutatis mutandis apply to all authorised third parties who process personal data. 25.4 The Parties shall ensure that any persons authorized to process data on their behalf (including employees and third parties) will safeguard the security, integrity and authenticity of all data. Where necessary to meet this requirement, the Parties shall keep all personal data and any analyses, profiles, or documents derived therefrom logically separated from all other data and documentation held by it. 25.5 The Parties shall carry out regular assessments to identify all reasonably foreseeable internal and external risks to the personal data in its possession or under its control. The Parties shall implement and maintain appropriate safeguards against the risks which it identifies and shall also regularly verify that the safeguards which it has in place has been effectively implemented. 25.6 The Parties agree that they will promptly return or destroy any personal data in their possession or control which belongs to the other Party once it no longer serves the purpose for which it was collected in relation to this Agreement, subject to any legal retention requirements. This may be at the request of the other Party and includes circumstances where a person has requested the Parties to delete all instances of their personal data. The information will be destroyed in such a manner that it cannot be reconstructed to its original form, linking it to any particular individual or organisation.