Examples of Applicable Privacy and Data Security Laws in a sentence
Partners are not Personnel, 397 subcontractors or agents of VOILA and are responsible and liable for their own compliance with 398 Applicable Privacy and Data Security Laws.
Partners are not Personnel, 397 subcontractors or agents of VOILA and are responsible and liable for their own compliance with 398 Applicable Privacy and Data Security Laws.
Data Privacy Laws means any state or national law or regulation protecting the privacy, confidentiality, or security of Personal Information.
Applicable Data Protection Law means all data privacy or data protection laws or regulations globally that apply to the Processing of Personal Information under this Data Processing Agreement, which may include Applicable European Data Protection Law.
European Data Protection Laws means the EU General Data Protection Regulation 2016/679 (“GDPR”) and data protection laws of the European Economic Area (“EEA”) and their member states and the FADP.
Applicable Anti-Corruption and Bribery Laws means international, federal, state, provincial and local laws, rules, regulations, directives and governmental requirements currently in effect and as they become effective relating in any way to the Contractor’s provision of goods and/or services to Authority, including without limitation “FCPA” or any applicable laws and regulations, including in the jurisdiction in which the Contractor operates and/or manufac- tures goods for the Authority, relating to anti-corruption and bribery.
EU Data Protection Laws means EU Directive 95/46/EC, as transposed into domestic legislation of each Member State and as amended, replaced or superseded from time to time, including by the GDPR and laws implementing or supplementing the GDPR;
Data Protection Requirements means all Requirements of Law, to the extent applicable to the items and services provided by the Borrower and each Restricted Subsidiary, relating to the privacy and security of information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases and personal, personally identifiable, sensitive, confidential or regulated data and, in each case, to the protection thereof from unauthorized use, access, misappropriation or modification.