STATUTORY POWERS TO PROCESS PERSONAL DATA Sample Clauses

STATUTORY POWERS TO PROCESS PERSONAL DATA i. The principle legislative instruments that provide powers to lawfully share information under this agreement are:
AutoNDA by SimpleDocs
STATUTORY POWERS TO PROCESS PERSONAL DATA i. The principle legislative instruments that provide powers to lawfully share information under this agreement are: Sharing personal data for the Law Enforcement Purpose (under Part 3 of the Data Protection Act 2018): where the sharing of personal data is between the police and other Competent Authorities (as defined by Schedule 7 of the Data Protection Act 2018) for any of the Law Enforcement purposes (prevention / investigation / detection / prosecution of criminal offences, execution of criminal penalties, safeguarding against and preventing threats to public security.
STATUTORY POWERS TO PROCESS PERSONAL DATA i. The principle legislative instruments that provide powers to lawfully share information under this agreement are: The Data Protection Xxx 0000 under the General Data Protection Regulations 2018 Article 6(1) (e) which is in support of processing [that] is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller. HC processes personal information in accordance with this Act, which exists to ensure the fair and lawful use of personal data and to protect the rights of the data subject. The Act provides exemptions to some of its provisions if complying with them will prejudice the protection/detection of crime and the apprehension and prosecution of offenders. The Act also requires HC to comply wi th the following principles when processing personal data: o Fairly and lawfully processed o Being processed for specified and lawful purposes and not in any manner incompatible with those purposes o Adequate, relevant and not excessive o Accurate and where necessary, up to date o Not kept for longer than is necessary o Being processed in accordance with individuals rights o Secure o Not to be transferred to countries outside the EU.
STATUTORY POWERS TO PROCESS PERSONAL DATA i. The principal legislative instruments that provide powers to lawfully share information under this Agreement are: Policing Protocol Order 2011
STATUTORY POWERS TO PROCESS PERSONAL DATA. Hampshire Constabulary will share information with HANTSAR where an exceptional risk has been identified. The lawful basis for sharing information within this agreement is: Vital Interests.
STATUTORY POWERS TO PROCESS PERSONAL DATA i. There is no specific relevant statutory power for the purposes of this agreement.

Related to STATUTORY POWERS TO PROCESS PERSONAL DATA

  • Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Vendor certifies that Vendor is not a company identified on the Texas Comptroller’s list of companies known to have contracts with, or provide supplies or services to, a foreign organization designated as a Foreign Terrorist Organization by the U.S. Secretary of State. Does Vendor certify? Yes, Vendor certifies Certification Regarding Prohibition of Boycotting Israel (Tex. Gov. Code 2271) If (a) Vendor is not a sole proprietorship; (b) Vendor has ten (10) or more full-time employees; and (c) this Agreement or any agreement with a TIPS Member under this procurement has value of $100,000 or more, the following certification shall apply; otherwise, this certification is not required. Vendor certifies, where applicable, that neither the Vendor, nor any affiliate, subsidiary, or parent company of Vendor, if any, boycotts Israel, and Vendor agrees that Vendor and Vendor Companies will not boycott Israel during the term of this Agreement. For purposes of this Agreement, the term “boycott” shall mean and include refusing to deal with, terminating business activities with, or otherwise taking any action that is intended to penalize, inflict economic harm on, or limit commercial relations with Israel, or with a person or entity doing business in Israel or in an Israeli-controlled territory but does not include an action made for ordinary business purposes. When applicable, does Vendor certify? Yes, Vendor certifies 5 Certification Regarding Prohibition of Contracts with Certain Foreign-Owned Companies (Tex. Gov. 5 Code 2274) Certain public entities are prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant Vendor direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by a customer for product warranty and support purposes. Vendor certifies that neither it nor its parent company nor any affiliate of Vendor or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this certification, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” Vendor certifies that Vendor will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor. When applicable, does Vendor certify? Yes, Vendor certifies 5 Certification Regarding Prohibition of Discrimination Against Firearm and Ammunition Industries (Tex.

  • Protection of Personal Data 25.1 The Parties agree that they may obtain and have access to personal data for the duration of the Agreement for the fulfilment of the rights and obligations contained herein. In performing the obligations as set out in this Agreement, the Parties shall at all times ensure that:

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Personal Data Registry Operator shall (i) notify each ICANN-­‐accredited registrar that is a party to the registry-­‐registrar agreement for the TLD of the purposes for which data about any identified or identifiable natural person (“Personal Data”) submitted to Registry Operator by such registrar is collected and used under this Agreement or otherwise and the intended recipients (or categories of recipients) of such Personal Data, and (ii) require such registrar to obtain the consent of each registrant in the TLD for such collection and use of Personal Data. Registry Operator shall take reasonable steps to protect Personal Data collected from such registrar from loss, misuse, unauthorized disclosure, alteration or destruction. Registry Operator shall not use or authorize the use of Personal Data in a way that is incompatible with the notice provided to registrars.

Time is Money Join Law Insider Premium to draft better contracts faster.