Purposes of data Sample Clauses

Purposes of data processing With the express consent of the interested party, the Company will process the personal data collected, giving them also to those Parties indicated in this information sheet, for the management and realization of the sporting event. The data may be used for the drafting of rankings and for the publication of video-photographic material of the sporting event. Legal basis of data processing The Company processes your personal data lawfully, where the data processing is: − is deemed necessary for the execution of the requested service; − is imposed by legal obligations; − is based on the express consent. Consequences of failure communication of personal data With regard to the personal data requested, the failure to communicate them, prevents the execution of the service. Methods of data processing and storage The information and personal data collected will be used and stored in order to provide the requested service. Once the service is complete, all personal data will be destroyed within 10 years. Personal data will be processed by the data controller using partially automated and/or non-automated tools; personal data are stored on servers with limited access. Data communication Your personal data may be disclosed to:
AutoNDA by SimpleDocs
Purposes of data processing Helmholtz Munich processes the personal data of the doctoral researchers for fulfilling the contractual obligations under this Supervisory Agreement, the “terms and guidelines of good doctoral training at Helmholtz Munich” and the “Rules for Safeguarding Good Scientific Practice”.
Purposes of data processing operations
Purposes of data processing and data security 91. Personal data shall be processed by the Data Controllers for the following purposes:  performance of this Contract;  compliance with applicable regulations. The Data Controllers undertake, without limitation, to take (or cause to be taken) all reasonable measures to guarantee the protection of Processed Personal Data by means of technical security rules and an adequate security policy against loss, destruction, alteration, unauthorised access to or use of Processed Personal Data or unauthorised processing thereof by their employees.
Purposes of data processing In the context of operation of the Site and the services provided by Lemonway, the processing of personal data is intended to manage the customers, the creation and management of accounts, management of the contracts, management of cancellations, management of disputes, Website management, mailing, communications, the anti-money laundering and combating the financing of terrorism, KYC, development of statistics with the aim of improving the Lemonway tools, the management of requests concerning the rights of people, implementation of the Partners, support management.

Related to Purposes of data

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described:

  • Collection of Data The Insured acknowledges being informed that the Insurer processes his personal data in accordance with regulations relative to the protection of personal data in effect and that, moreover: - the answers to the questions asked are mandatory and that in the event of false declarations or omissions, the consequences for him may be invalidity of the subscription to the contract (article L 113-8 of the Insurance Code) or the reduction of indemnities (article L 113-9 of the Insurance Code), • The processing of personal data is necessary for acceptance and execution of its contract and its guarantees, for the management of commercial and contractual relationships, and for the execution of legal, regulatory or administrative provisions in effect. • The data collected and processed is kept for the period necessary for execution of the contract or the legal obligation. This data is then archived in accordance with the durations specified by the provisions relative to time limits. • The recipients of the data concerning him are, within the limits of their powers, the services of the Insurer in charge of signature, management and execution of the Insurance Contract and guarantees, its delegates, agents, partners, subcontractors and reinsurers, within the framework of their duties. It can also be sent, if necessary, to professional bodies as well as to all persons involved in the contract such as lawyers, experts, court officials and ministerial officers, trustees, guardians or investigators. Information concerning him may also be transmitted to the Underwriter, as well as to all persons authorized as Authorized Third Parties (courts, arbitrators, mediators, relevant ministries, supervisory and regulatory authorities and all public bodies authorized to receive it as well as departments in charge of control such as statutory auditors, auditors as well as departments in charge of internal control). • In its capacity as a financial organization, the Insurer is subject to the legal obligations resulting mainly from the Monetary and Financial Code with regard to money laundering and against the financing of terrorism and, as such, it monitors contracts, which may result in the drafting of a declaration of suspicion or a measure of freezing of assets. The data and documents concerning the Insured are kept for a period of five (5) years from the end of the contract or termination of the relationship. • His personal information will also be able to be used within the framework of processing to fight against insurance fraud, which may lead, if applicable, to placement on a list of persons presenting a risk of fraud. This registration may have the effect of extending examination of his case, or even the reduction or refusal of the benefit of a right, benefit, contract or service offered. In this context, personal data concerning him (or concerning persons or parties who are interested in the contract may be processed by any authorized persons working within the entities of the Insurer Group in the context of the fight against fraud. This data may also be intended for the authorized personnel of organizations directly concerned by fraud (other insurance organizations or intermediaries; judicial authorities, mediators, arbitrators, court officials, legal officers; third-party organizations authorized by a legal provision and, if applicable, victims of acts of fraud or their representatives). In the event of a fraud alert, the data is kept for a maximum of six (6) months to qualify the alert and then deleted, unless the alert is relevant. In the event of a relevant alert, the data is kept for up to five (5) years following closure of the fraud case, or until the end of the legal proceedings and the applicable limitation periods. For people registered on a list of suspected fraudsters, their data is deleted after 5 years from the date of placement on this list. • In its capacity as insurer, it is founded in carrying out the processing of data relative to violations, condemnations and measures of security, either at the time of subscription of the insurance contract, or during the period of execution, or within the framework of the handling of legal action. • Personal data may be used by the Insurer within the framework of processing implemented by the insurer, the purpose of which is research and development to improve the quality or relevance of its future insurance or assistance products and service offers • Personal data concerning him may be accessible to some of the Insurer's employees or service providers established in countries outside the European Union. • By proving his identity, the Insured has a right of access, rectification, deletion and opposition concerning the data processed. He also has the right to ask to limit the use of his data when it is no longer necessary, or to recover, in a structured format, the data that he has provided when it was necessary for the contract or when he consented to the use of this data. He has the right to provide instructions relative to the fate of his personal data after his death. These instructions, general or specific, concern the storage, removal and communication of his data after his death. These rights can be exercised with the Insurer's Data Protection Representative: - by email: sent to XXXX@XXXXXXXX.xx or - by postal mail: by writing to the following address: Délégué représentant à la protection des données – MUTUAIDE ASSISTANCE – 000, xxx xx xx Xxxxxx – 93196 Noisy le Grand. After having made a request to the Data Protection Representative without having received satisfaction, he has the possibility of contacting the CNIL (Commission Nationale de l'informatique et des Libertés).

  • Identification of Data a. All Background, Third Party Proprietary and Controlled Government Data provided by Disclosing Party shall be identified in the Annex under which it will be provided.

  • Deletion of Data You can delete the information saved on your device at any time by uninstalling the App via your operating system. If you have activated a cloud solution to synchronize your device (e.g. Samsung Cloud or Apple iCloud), it may be necessary for you to delete the safeguard saved in the cloud to delete the data saved in the cloud. Images taken with the treasure xxxx App are saved on your device and are not automatically deleted from your device when the app is uninstalled. The TabTracks App is not authorized to do this under requested permissions. This is a security setting for the iOS and Android operating systems. The information saved on our servers under your user account can be deleted at any time upon your request. Please write an email with your request to xxxxxxxxxxx@xxxxxxxxx.xxx.

  • Source of Data A description of (1) the process used to identify Paid Claims in the Population and (2) the specific documentation relied upon by the IRO when performing the Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare carrier or intermediary manual or bulletins (including issue and date), other policies, regulations, or directives).‌‌‌

  • Description of Data Instructions to the drafter; delete after completion of this section: This section of this attachment should provide sufficient information such that each party understands the information that will be transmitted under this Agreement. Examples of information that should be provided include: * Whether the data is obtained from human subjects and, if so, a description of the population included in the data. * If the data is from animal subjects, the species of animal the data was obtained using. * If not from human or animal subjects, a description of the focus of the data. * The number of subjects and/or experiments included * Name of the study that the data was obtained under If there is a particular study that needs to be acknowledged/cited as the source of the data, this information should be included here.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Retention of data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.

  • Sources of Data A full description of documentation and other information, if applicable, relied upon by the IRO in performing the Transactions Review.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

Time is Money Join Law Insider Premium to draft better contracts faster.