─ Protection of Personal Information Security and Breach Investigation Procedures and Practices Act Sample Clauses

─ Protection of Personal Information Security and Breach Investigation Procedures and Practices Act. 1. Vendors that receive Personal Information as defined by and in accordance with Kentucky’s Personal Information Security and Breach Investigation Procedures and Practices Act, KRS 61.931, et seq., (the “Act”), shall secure and protect the Personal Information by, without limitation, complying with all requirements applicable to non-affiliated third parties set forth in the Act.
AutoNDA by SimpleDocs
─ Protection of Personal Information Security and Breach Investigation Procedures and Practices Act. Contractors that receive Personal Information as defined by and in accordance with Kentucky’s Personal Information Security and Breach Investigation Procedures and Practices Act, KRS 61.931, KRS 61.932, KRS 61.933, and KRS 61.934, (the “Act”), shall secure and protect the Personal Information by, without limitation, complying with all requirements applicable to non-affiliated third parties set forth in the Act. The Contractor hereby agrees to cooperate with the Commonwealth in complying with the response, mitigation, correction, investigation, and notification requirements of the Act. The Contractor shall notify as soon as possible, but not to exceed seventy-two (72) hours, the contracting agency, the Commissioner of the Kentucky State Police, the Auditor of Public Accounts, and the Commonwealth Office of Technology of a determination of or knowledge of a breach, unless the exception set forth in KRS 61.932(2)(b)2 applies and the Contractor abides by the requirements set forth in that exception. If the agency is a unit of government listed in KRS 61.931(1)(b), the Contractor shall notify the Commissioner of the Department of Local Government in the same manner as above. If the agency is a public school district listed in KRS 61.931(1)(d), the Contractor shall notify the Commissioner of the Department of Education in the same manner as above. If the agency is an educational entity listed under KRS 61.931(1)(e), the Contractor shall notify the Council on Postsecondary Education in the same manner as above. Notification shall be in writing on a form developed by the Commonwealth Office of Technology. The Contractor hereby agrees that the Commonwealth may withhold payment(s) owed to the Contractor for any violation of the Identity Theft Prevention Reporting Requirements. The Contractor hereby agrees to undertake a prompt and reasonable investigation of any breach as required by KRS 61.933. Upon conclusion of an investigation of a security breach of Personal Information as required by KRS 61.933, the Contractor hereby agrees to an apportionment of the costs of the notification, investigation, and mitigation of the security breach. In accordance with KRS 61.932(2)(a) the Contractor shall implement, maintain, and update security and breach investigation procedures that are appropriate to the nature of the information disclosed, that are at least as stringent as the security and breach investigation procedures and practices established by the Commonwealth Office o...

Related to ─ Protection of Personal Information Security and Breach Investigation Procedures and Practices Act

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Collection of Personal Information 10.1 The Subscriber acknowledges and consents to the fact that the Issuer is collecting the Subscriber’s personal information for the purpose of fulfilling this Agreement and completing the Offering. The Subscriber acknowledges that its personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) may be included in record books in connection with the Offering and may be disclosed by the Issuer to: (a) stock exchanges or securities regulatory authorities, (b) the Issuer's registrar and transfer agent, (c) tax authorities, (d) authorities pursuant to the PATRIOT Act (U.S.A.) and (e) any of the other parties involved in the Offering, including the Issuer’s Counsel. By executing this Agreement, the Subscriber is deemed to be consenting to the foregoing collection, use and disclosure of the Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) for the foregoing purposes and to the retention of such personal information for as long as permitted or required by applicable laws. Notwithstanding that the Subscriber may be purchasing the Note as agent on behalf of an undisclosed principal, the Subscriber agrees to provide, on request, particulars as to the nature and identity of such undisclosed principal, and any interest that such undisclosed principal has in the Issuer, all as may be required by the Issuer in order to comply with the foregoing. 10.2 Furthermore, the Subscriber is hereby notified that the Issuer may deliver to any government authority having jurisdiction over the Issuer, the Subscriber or this Subscription, including the SEC and/or any state securities commissions, certain personal information pertaining to the Subscriber, including the Subscriber’s full name, residential address and telephone number, the number of Shares or other securities of the Issuer owned by the Subscriber, the principal amount of Note purchased by the Subscriber, the total Subscription Amount paid for the Note and the date of distribution of the Note.

  • Labor Law Information You acknowledge that if you continue to hold shares of Common Stock acquired under the Plan after an involuntary termination of your employment, you may not be eligible to receive unemployment benefits in Russia. Anti-Corruption Information. Anti-corruption laws prohibit certain public servants, their spouses and their dependent children from owning any foreign source financial instruments (e.g., shares of foreign companies such as the Company). Accordingly, you should inform the Company if you are covered by these laws because you should not hold shares of Common Stock acquired under the Plan.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Use of Personal Information 1. Personal Information (Personal Information and Personal Information collating with other information) obtained by DBS by providing the service shall be subject for the privacy policy protecting Member’s Personal Information which will be established separately (hereinafter, “Privacy Policy”) and this “Membership Agreement”. 2. DBS may disclose the Personal Information of the Members to the following third parties. [Personal Information subject to third party disclosure] The Personal Information specified in the “Privacy Policy”, which will be established separately. [Scope of third parties] Insurance companies contracted by DBS to implement the compensation set forth in Article 22, paragraph1, and other companies subject to the scope to specify in the “Privacy Policy” which will be established separately. [Purpose of disclosure to third parties]. The purpose of disclosure in the “Privacy Policy”, which will be established separately. [Party responsible for management of Personal Information] DOCOMO BIKESHARE, INC.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Interlocal Cooperation Act RCW 39.34 allows cooperative purchasing between public agencies, and other political subdivisions. SMC 20.60.100 also allows non profits to use these agreements. If a public agency files or has filed an Intergovernmental Cooperative Purchasing Agreement with the City of Seattle, those agencies are eligible to purchase from Contracts established by the City. Such agencies may ask City of Seattle Contractors to accept orders from the agency, citing the City of Seattle contract as the basis for the order. The Vendor may accept or decline such orders. If the Vendor accepts an order from another public agency using the City of Seattle contract as the basis, the Vendor agrees to sell additional items at the contract prices, terms and conditions. The City of Seattle accepts no responsibility for the payment of the purchase price by other governmental agencies. Should the Vendor require additional pricing for such purchases, the Vendor is to name such additional pricing upon Offer to the City.

  • Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.

  • CONFIDENTIALITY AND NON-DISCLOSURE; SECURITY BREACH REPORTING 2.1 For purposes of this Contract, confidential information will not include information or material which (a) enters the public domain (other than as a result of a breach of this Contract); (b) was in the receiving party’s possession prior to its receipt from the disclosing party; (c) is independently developed by the receiving party without the use of confidential information; (d) is obtained by the receiving party from a third party under no obligation of confidentiality to the disclosing party; or (e) is not exempt from disclosure under applicable State law.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!