Security of Transmissions Sample Clauses

Security of Transmissions. Privacy cannot be guaranteed when using Rogers Services. If Subscriber requires secure transmission of data, Subscriber must provide for its own means of doing so. Subscriber assumes full responsibility for the establishment of appropriate security measures to control access to their own respective equipment and information.
AutoNDA by SimpleDocs
Security of Transmissions. It is possible for third parties to monitor data traffic over the Provider and privacy cannot be guaranteed. If End User desires to secure transmission of data beyond that provided by FARMERS EDGE, End User must provide for its own means of doing so. End User assumes full responsibility for the establishment of appropriate security measures to control accessto their own respective equipment and information.
Security of Transmissions. Customer understands and agrees that CAIRE does not control the transfer of data or the use of telecommunications services utilized by Customer and CAIRE to access the Data Center and provide CAIREview hereunder, including, without limitation, telecommunications services providers, the internet, and MPLS providers. CAIRE does not warrant the secure operation of CAIREview or that it will be able to prevent third party disruptions of CAIREview.

Related to Security of Transmissions

  • DESCRIPTION OF TRANSFER Categories of data subjects whose personal data is transferred Data exporter may submit Personal Data to the Service, the extent of which is determined and controlled by the data exporter in its sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of data subjects: ● Customers, business partners, and vendors of the data exporter (who are natural persons) ● Employees or contact persons of data exporter customers, business partners, and vendor ● Employees, agents, advisors, contractors, or any user authorized by the data exporter to use the Service (who are natural persons) Categories of personal data transferred Data exporter may submit Personal Data to the Service, the extent of which is determined and controlled by the data exporter in its sole discretion, and which may include, but is not limited to the following categories of personal data: ● First and last name ● Business contact information (company, email, phone, physical business address) ● Personal contact information (email, cell phone) ● Title ● Position ● Employer ● ID data ● Professional life data ● Personal life data (in the form of security questions and answers) ● Connection data ● Localization data Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures. Data exporter may submit special categories of data to the Service, the extent of which is determined and controlled by the data exporter in its sole discretion, and which may include Personal Data concerning health information. If applicable, data exporter agrees that it has reviewed and assessed the restrictions and safeguards applied to the special categories of Personal Data, including the measures described in the Trust & Compliance Documentation (as defined by this DPA) and Documentation (as defined in the Agreement), and has determined that such restrictions and safeguards are sufficient. The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis) Subject to Customer’s use of the Service, Personal Data will be transferred on a continuous basis during the term of the Agreement. Nature of the processing Identity and access management and related services pursuant to the Agreement. Purpose(s) of the data transfer and further processing The objective of Processing of Personal Data by the data importer is the performance of the Service pursuant to the Agreement and as instructed by data exporter in its use of the Service. The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period Data exporter may retain Personal Data in the Service for the duration of the Agreement. Personal Data within the Service post-termination of the Agreement will be retained and deleted in accordance with the Documentation. For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing Sub-processors may only Process Personal Data as necessary for the performance of the Service pursuant to the Agreement and for the duration of the Agreement. Sub-processor information are made available on Okta’s ‘Agreements’ webpage (accessible via xxx.xxxx.xxx/xxxxxxxxxx under the “Trust & Compliance Documentation” link).

  • Notice of Transfer The Agent may deem and treat a Lender party to this Agreement as the owner of such Lender’s portion of the Obligations for all purposes, unless and until, and except to the extent, an Assignment and Acceptance shall have become effective as set forth in Section 10.06.

  • Reservations for Registry Operations 3.1. The following ASCII labels must be withheld from registration or allocated to Registry Operator at All Levels for use in connection with the operation of the registry for the TLD: WWW, RDDS and WHOIS. The following ASCII label must be allocated to Registry Operator at All Levels for use in connection with the operation of the registry for the TLD: NIC. Registry Operator may activate WWW, RDDS and WHOIS in the DNS, but must activate NIC in the DNS, as necessary for the operation of the TLD. None of WWW, RDDS, WHOIS or NIC may be released or registered to any person (other than Registry Operator) or third party. Upon conclusion of Registry Operator’s designation as operator of the registry for the TLD all such withheld or allocated names shall be transferred as specified by ICANN. Registry Operator may self-­‐allocate and renew such names without use of an ICANN accredited registrar, which will not be considered Transactions for purposes of Section 6.1 of the Agreement.

  • MAINTENANCE OF TRAFFIC A. In the event that any of the work is conducted within any public right of way, the CONTRACTOR shall provide proper Maintenance of Traffic (MOT). Unless otherwise specified, the standard specifications to be used for the Service will be the strictest and latest edition as promulgated by the Florida Department of Transportation (FDOT) or the Federal Highway Administration (FHWA).

  • Disposal of Transmitted Items Upon your receipt of a confirmation approval from Credit Union that we have received an image that you have transmitted, you agree to retain the check for at least 60 calendar days from the date of the image transmission. After 60 days, you agree to destroy the check that you transmitted as an image, mark it "VOID", or otherwise render it incapable of further transmission, deposit, or presentment. During the time the retained check is available, you agree to promptly provide it to Credit Union upon request.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

Time is Money Join Law Insider Premium to draft better contracts faster.