HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:
Protecting Your Personal Information In addition to protecting your access codes, you should also take precautions to protect your personal identification information, such as your driver’s license, Social Security number, or tax identification number. This information by itself or together with account information may allow unauthorized access to your accounts. You should treat personal information with the same level of care that you would for your account information. You should also protect and secure all information and data stored in any personal computer or other equipment you use to access our Online Banking service.
Safeguards for Personal Information Supplier agrees to develop, implement, maintain, and use administrative, technical, and physical safeguards, as deemed appropriate by DXC, to preserve the security, integrity and confidentiality of, and to prevent intentional or unintentional non-permitted or violating use or disclosure of, and to protect against unauthorized access to or accidental or unlawful destruction, loss, or alteration of, the Personal Information Processed, created for or received from or on behalf of DXC in connection with the Services, functions or transactions to be provided under or contemplated by this Agreement. Such safeguards shall meet all applicable legal standards (including any encryption requirements imposed by law) and shall meet or exceed accepted security standards in the industry, such as ISO 27001/27002. Supplier agrees to document and keep these safeguards current and shall make the documentation available to DXC upon request. Supplier shall ensure that only Supplier’s employees or representatives who may be required to assist Supplier in meeting its obligations under this Agreement shall have access to the Personal Information.
Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.
Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.
YOUR PERSONAL INFORMATION When using established banking relationships to send your transfer, personal information about you contained in the transaction may be provided to overseas authorities and the beneficiary bank in order to comply with applicable legal obligations and prevent crime. This may include a transfer of your personal data outside the EEA. This information may include your full name, address, date of birth and account number. For more detail on how we transfer data internationally, see our Data Protection Statement.
Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.
Password Protection Contractor agrees that any portable or laptop computer that has access to the Eligible Users or State of Utah networks, or stores any Public Data is equipped with strong and secure password protection.
CLEARANCE PATTERNS 7.1 The State shall develop separate clearance patterns for each of the following:
Consumer information The Retailer will on reasonable written request from the Distributor, and within a reasonable timeframe, provide the Distributor with such Consumer information as is reasonably available to the Retailer and necessary to enable the Distributor to fulfil its obligations in accordance with this agreement. The information will be treated by the Distributor as Confidential Information and the Distributor expressly acknowledges and agrees that it is not authorised to, and will not, use such information in any way or form other than as permitted by this clause 29.2.