Request from Data Subjects Sample Clauses

Request from Data Subjects. To the extent that Data Controller is unable to respond to Data Subject request without the aid and support of the Data Processor, the Processor upon request of the Data Controller in writing will make available , Personal Data of Data Subjects and support the Controller to fulfill requests by Data Subjects to exercise their rights under the GDPR in a manner consistent with the functionality of the software product and SurveySparrow’s role as a Processor. SurveySparrow shall comply with reasonable requests of the Controller and in return Controller agrees to reimburse SurveySparrow for such assistance. If SurveySparrow receives a request from the Data Subject to exercise its rights under the GDPR, SurveySparrow will redirect such Data Subject to the Controller. The Controller shall be solely responsible for timely response to any such Data Subject Requests or communications involving Personal Data.
AutoNDA by SimpleDocs

Related to Request from Data Subjects

  • Data Subjects The categories of Data Subjects who we may collect Personal Data about may include the following where they are a natural person: the Customer, the directors and ultimate beneficial owner(s) of the Customer, your customers, employees and contractors, payers and payees. You may share with Airwallex some or all of the following types of Personal Data regarding Data Subjects: • full name; • email address; • phone number and other contact information; • date of birth; • nationality; • public information about the data subject; • other relevant verification or due diligence documentation as required under these terms; and • any other data that is necessary or relevant to carry out the Agreed Purposes.

  • Received From Third Party Such information was or is hereafter rightfully received by the party from a third party (expressly excluding the Fund’s custodian, prime broker and administrator) without restriction on its disclosure and without breach of this Agreement or of a similar confidential disclosure agreement regarding them; or

  • Data Subject Requests To the extent legally permitted, Okta shall promptly notify Customer if Okta receives a request from a Data Subject to exercise the Data Subject's right of access, right to rectification, restriction of Processing, erasure (“right to be forgotten”), data portability, object to the Processing, or its right not to be subject to an automated individual decision making (“Data Subject Request”). Factoring into account the nature of the Processing, Okta shall assist Customer by appropriate organizational and technical measures, insofar as this is possible, for the fulfilment of Customer’s obligation to respond to a Data Subject Request under Data Protection Laws and Regulations. In addition, to the extent Customer, in its use of the Service, does not have the ability to address a Data Subject Request, Okta shall, upon Customer’s request, provide commercially- reasonable efforts to assist Customer in responding to such Data Subject Request, to the extent that Okta is legally authorized to do so, and the response to such Data Subject Request is required under Data Protection Laws and Regulations. To the extent legally permitted, Customer shall be responsible for any costs arising from Okta’s provision of such assistance.

  • DATA LOSS The Company does not accept responsibility for the security of Your account or content. You agree that Your use of the Website or Services is at Your own risk.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • RECOVERY FROM THIRD PARTIES 11.1 If 11.1.1 the Seller makes a payment in respect of a Warranty Claim by the Purchaser (the “Damages Payment”); 11.1.2 any member of the Purchaser’s Group recovers from a third party (including pursuant to any insurance policy) any sum in cash or in kind which compensates it in respect of the Loss which is the subject matter to that Warranty Claim (the “Third Party Sum”); 11.1.3 the receipt of that Third Party Sum was not taken into account in calculating the Damages Payment; and 11.1.4 the aggregate of the Third Party Sum and the Damages Payment exceeds the amount required to compensate the Purchaser in full for the Loss or Liability which gave rise to the Warranty Claim in question, such excess being the “Excess Recovery”, then the Purchaser shall, promptly on receipt of the Third Party Sum by any member of the Purchaser’s Group, repay to the Seller an amount equal to the lower of (i) the Excess Recovery and (ii) the Damages Payment, after deducting (in either case) all additional Tax and any costs incurred by the Purchaser or the relevant member of the Purchaser’s Group in recovering that Third Party Sum. 11.2 If, before the Seller pays any amount in respect of any Warranty Claim under this Agreement, any EDS Entity is entitled to recover (whether by payment, discount, credit, relief, insurance or otherwise) from a third party a sum which indemnifies or compensates any relevant member of the Purchaser’s Group (in whole or in part) in respect of the Loss or Liability which is the subject matter of the Warranty Claim, the Purchaser shall procure that, before steps are taken against the Seller, the Purchaser will make reasonable efforts to enforce recovery against the third party and any actual recovery shall reduce or satisfy, as applicable, such Warranty Claim to the extent of such recovery, provided that the Seller first indemnifies the Purchaser’s Group and the EDS Entities against any Tax that may be suffered on receipt of any sum recovered thereunder, together with any costs or expenses incurred in recovering such sum.

  • EDD Independent Subrecipient Reporting Requirements Effective January 1, 2001, the County of Orange is required to file in accordance with subdivision (a) of Section 6041A of the Internal Revenue Code for services received from a “service provider” to whom the County pays $600 or more or with whom the County enters into a contract for $600 or more within a single calendar year. The purpose of this reporting requirement is to increase child support collection by helping to locate parents who are delinquent in their child support obligations. The term “service provider” is defined in California Unemployment Insurance Code Section 1088.8, Subparagraph B.2 as “an individual who is not an employee of the service recipient for California purposes and who received compensation or executes a contract for services performed for that service recipient within or without the State.” The term is further defined by the California Employment Development Department to refer specifically to independent Subrecipients. An independent Subrecipient is defined as “an individual who is not an employee of the ... government entity for California purposes and who receives compensation or executes a contract for services performed for that ... government entity either in or outside of California.” The reporting requirement does not apply to corporations, general partnerships, limited liability partnerships, and limited liability companies. Additional information on this reporting requirement can be found at the California Employment Development Department web site located at xxxx://xxx.xxx.xx.xxx/Employer_Services.htm

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Meteorological Data Reporting Requirement (Applicable to wind generation facilities only)

  • Subsidy Requests and Reporting Requirements 1. The Grantee or Management Company shall complete a CRF Subsidy Request Report - Recap of Tenant Income Certification, which provides a unit-by-unit listing of all units in the Development for whom assistance is being requested and gives detailed information including the occupants’ eligibility, set-aside requirements, amount of household rent paid, utility allowance and amount of CRF Rental Subsidy requested. 2. The CRF Subsidy Request Report - Recap of Tenant Income Certification shall be prepared as of the last day of each calendar month during the period of performance and shall be submitted to XXXXxxxxxxxx@XxxxxxxXxxxxxx.xxx and Florida Housing’s monitoring agent no later than the 15th day of the following month. The December 2020 request will be due on or before December 15th. The Grantee will submit executed Coronavirus Relief Fund Rental Assistance Applications and supporting documentation to Florida Housing’s monitoring agent within 5 days upon the monitoring agent’s request.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!