DATA PROTECTION AND PRIVACY Clause Samples

POPULAR SAMPLE Copied 33 times
DATA PROTECTION AND PRIVACY. For the purposes of Services, Product, SaaS, Software, and/or Maintenance and Support, that Supplier provides to DXC, DXC Customers, and/or end users of DXC or DXC Customers under the terms of this Agreement, any Schedule, and/or SOW, the following shall apply:
DATA PROTECTION AND PRIVACY. 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "Accenture Personal Data" means personal data owned, licensed, or otherwise controlled or processed by Accenture including personal data processed by Accenture on behalf of its clients. “Accenture Data” means all information, data and intellectual property of Accenture or its clients or other suppliers, collected, stored, hosted, processed, received and/or generated by Supplier in connection with providing the Deliverables to Accenture, including Accenture Personal Data.
DATA PROTECTION AND PRIVACY. Full details on how we use cookies and how we hold and administer information from which we may identify our Users or any third party can be found in our Privacy and Cookie Policy section on The Website.
DATA PROTECTION AND PRIVACY. (a) Except as has not resulted, and would not reasonably be expected to result, individually or in the aggregate, in a NV5 Material Adverse Effect: (i) each NV5 Entity maintains, and since December 31, 2021, has adopted, implemented and maintained a data privacy and security compliance program that complies with all applicable Privacy/Cybersecurity Requirements, that is designed to protect NV5 IT Assets and Personal Information against threats and hazards to their security and the unauthorized use or disclosure thereof, and that includes commercially reasonable plans, policies, procedures and administrative, technical and physical safeguards designed to protect such NV5 IT Assets, Personal Information, and other data; (ii) the NV5 Entities are, and since December 31, 2021, have been, in compliance with all Privacy/Cybersecurity Requirements; (iii) since December 31, 2021, (A) no Person has (1) gained unauthorized access, including any such access reportable to a Governmental Authority or affected Person under applicable Law, to any Personal Information transmitted to or from, processed by or stored on any NV5 IT Assets, or otherwise possessed or controlled by or for the NV5 Entities, or (2) used, accessed or disclosed any such Personal Information or NV5 IT Assets for any illegal or unauthorized purpose and (B) no NV5 Entity has received any written notice of any claims from, and there have been no Actions instituted or threatened in writing (including any investigation) by, any Governmental Authority or any other Person alleging any violation, breach or compromise of any Personal Information, or any violation or breach of any Privacy/Cybersecurity Requirements; (iv) without limiting the foregoing in this Section 3.17, since December 31, 2021, (A) no breach, unauthorized access or other noncompliance related to Privacy/Cybersecurity Requirements has occurred related to any Personal Information that is Processed or otherwise possessed by a NV5 Entity, (B) no information security or privacy breach event has occurred that has resulted in, or would require, notification by or on behalf of a NV5 Entity to any Governmental Authority or other Person under any Privacy/Cybersecurity Requirements, and (C) no NV5 Entity is or has been in violation, breach or default of any Contracts with respect to the Processing of NV5 IT Assets or Personal Information; and (v) since December 31, 2021, the NV5 Entities have not provided or authorized access or rights to any Personal...
DATA PROTECTION AND PRIVACY a. If Partner has access to or otherwise Processes Personal Data, then Partner shall: i. only Process the Personal Data in accordance with Company's documented instructions and on its behalf, and in accordance with the Agreement and this Data Protection Addendum and related Attachments; ii. take reasonable steps to ensure the reliability of its staff and any other person acting under its supervision who may come into contact with, or otherwise have access to and Process, Personal Data; ensure persons authorized to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality; and ensure that such personnel are aware of their responsibilities under this Data Protection Addendum and any Data Protection Laws (or Partner’s own written binding policies are at least as restrictive as this Data Protection Addendum); iii. assist Company as needed to cooperate with and respond to requests from supervisor authorities, data subjects, customers, or others to provide information (including details of the services provided by Partner) related to Partner’s Processing of Personal Data; iv. notify the Company without undue delay, and no later than twenty four (24) hours, after becoming aware of a Breach Incident; v. provide full, reasonable cooperation and assistance to Company in: a. allowing data subjects to exercise their rights under the Data Protection Laws, including (without limitation) the right of access, right to rectification, restriction of Processing, erasure, data portability, object to the Processing, or the right not to be subject to an automated individual decision making; b. ensuring compliance with any notification obligations of personal data breach to the supervisory authority and communication obligations to data subjects, as required under Data Protection Laws; c. Ensuring compliance with its obligation to carry out data protection impact assessments with respect to the Processing of Personal Data, and with its prior consultation with the supervisory authority obligation (as applicable). vi. only process or use Personal Data on its systems or facilities to the extent necessary to perform its obligations under the Agreement; vii. as required under Data Protection Laws, maintain accurate written records of any and all the Processing activities of any Personal Data carried out under the Agreement (including the categories of Processing carried out and, where applicable, the tra...
DATA PROTECTION AND PRIVACY. 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "Accenture Personal Data" means personal data owned, licensed, or otherwise controlled or processed by Accenture including personal data processed by
DATA PROTECTION AND PRIVACY. The ‘Author’ understands that staff of ASERS Publishing, the ‘Publisher’ and its affiliated companies worldwide will be contacting him/ her concerning the publishing of the ‘Article’ and occasionally for marketing purposes (unless, with respect to such marketing, I tick the box below), and in case of publication of the ‘Article’, ‘Author’s’ full name, and affiliation will be published in Journal’ webpage and will be sent by the ‘Publisher’ to a third party as a metadata, to be indexed and abstracted. I do not wish to receive news, promotions and special offers about products and services of ASERS Publishing and its affiliates worldwide.
DATA PROTECTION AND PRIVACY. 17.1 Where Sage processes on the End-User’s behalf any data classified as personal data or special categories of personal data under applicable data protection and privacy laws, Sage shall comply with the applicable data protection and privacy laws. In particular, Sage shall: 17.1.1 maintain technical and organisational security measures and safeguards sufficient to comply with at least those obligations imposed on controllers by applicable data protection and privacy laws; 17.1.2 act only on instructions from the End-User (as data controller) in respect of such personal data and process it only for the purposes of: (a) performing Sage’s obligations under this Agreement and to prevent or address service or technical problems; (b) as compelled by law; and (c) as the End User expressly permits in writing; and 17.1.3 be responsible for the performance of its personnel (including its employees and contractors) and their compliance with its obligations under this Agreement, except as otherwise specified within this Agreement. 17.2 In addition to the above requirements, Sage may, upon the End-User’s request, provide to the End-User, a declaration and any supporting evidential documents of Sage’s compliance with requirements of any local data protection and privacy laws. 17.3 Notwithstanding this clause 17, the End-User owns the End-User Data and has sole responsibility for its legality, reliability, integrity, accuracy and quality and shall also be responsible and for its own compliance with applicable data protection and privacy laws.
DATA PROTECTION AND PRIVACY. The Bank knows that your privacy is very important. As such, safeguarding your privacy will always be one of our highest priorities. A copy of the Bank’s Privacy Policy is included in your Card packaging. Please review it. It may also be found on the cardholder website along with a copy of this Agreement. If you have any concerns about our policy, please contact us at the Contact Information listed below. We reserve the right to modify or supplement our Privacy Policy at any time. Our Privacy Policy is posted on the cardholder website and you agree to review it on at least an annual basis. We will disclose information to third parties about your account or the transfers you make: (i) where it is necessary for completing transfers; (ii) in order to verify the existence and condition of your account for a third party, such as a credit bureau or merchant; (iii) in order to comply with government agency or court orders; or (iv) if you give us written permission.
DATA PROTECTION AND PRIVACY. HTL is committed to compliance with all national and, where appropriate, international laws relating to the protection of Personal Data and individual privacy (including GDPR); this policy applies to all Personal Data Processed by HTL. Personal Data is classified as Restricted and only accessible on a need-to-use and event-by-event basis; by authorised HTL Personnel who need to deal with it.