Privacy and Information Security Laws definition

Privacy and Information Security Laws means (i) applicable Laws relating to privacy, security and/or collection and use of personal information, and/or (ii) any other applicable Laws relating to information security, in each case as applicable to the Company.
Privacy and Information Security Laws means (a) any Applicable Law that governs the receipt, collection, compilation, use, storage, processing, sharing, safeguarding, security, disposal, destruction, disclosure or transfer of Personal Data including, to the extent applicable to Seller and its Affiliates, the GDPR, (b) any Applicable Laws requiring a person or Governmental Entity to be notified of any situation where there is, or reason to believe there has been, a loss, misuse, or unauthorized access, disclosure or acquisition of Personal Data and (c) applicable published interpretation and guidance issued by Governmental Entities having the effect of law.
Privacy and Information Security Laws means all Laws relating to privacy and protection or Processing or both of Personal Data and/or protected health information, including without limitation (and to the extent the following Laws are applicable), HIPAA, the Health Information Technology for Economic and Clinical Health Act (HITECH), the California Computer Crime Law (CCCL), California Penal Code Sec. 502, California Invasion of Privacy Act, California Penal Code Sec. 630 et seq., Fair Credit Reporting Act (FCRA), California Consumer Legal Remedies Act (CLRA), California Civil Code Sec. 1750 et seq., Unfair Competition Law, California Business and Professions Code Sec. 17200 et seq., the Federal Trade Commission Act, the Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003 (CAN-SPAM Act), the Telephone Consumer Protection Act (TCPA), the California Consumer Privacy Act of 2018 (CCPA), the New York Stop Hacks and Improve Electronic Data Security Act (SHIELD Act), the Payment Card Industry Data Security Standard (PCI DSS), and any and all similar Laws relating to privacy, security, data protection, data availability and destruction and data breach, including security incident notification, to the extent any such Laws are applicable.

Examples of Privacy and Information Security Laws in a sentence

  • As such, whether it is PHI claim information or Nonpublic Information (“NI”) or Personally Identifiable Information (“PII”), it is information that may be regulated and protected by Health Insurance Portability and Accountability Act (“HIPAA”), the New York Department of Financial Services (“NY DFS”), the Fair Credit Reporting Act (“FCRA”) or other Global orU.S. Privacy and Information Security Laws.

  • To the Knowledge of the Company, no investigations, claims or complaints are pending or have been threatened against the Acquired Companies by any Person regarding a violation of Privacy and Information Security Laws, and/or other information security policies.

  • As such, whether it is PHI claim information or Nonpublic Information (“NI”) or Personally Identifiable Information (“PII”), it is information that may be regulated and protected by Health Insurance Portability and Accountability Act (“HIPAA”), the New York Department of Financial Services (“NY DFS”), the Fair Credit Reporting Act (“FCRA”) or other Global or U.S. Privacy and Information Security Laws.

  • WHEREAS appropriate consultation on the draft Criteria for the Admission and Enrolment of students for the 2021-2022 school year has taken place, WHEREAS Section 239 of the Education Act stipulates that the criteria must be adopted, put into force, and sent to each governing board at least 15 days before the beginning of the student enrolment period; WHEREAS the enrolment period for the 2021-2022 school year will be from February 1, 2021 to February 19, 2021; It was MOVED by D.

  • Each Target Company has implemented reasonable physical, technical and administrative safeguards that are compliant with applicable Privacy and Information Security Laws in all material respects and consistent in all material respects with industry standards that are designed to protect Personal Data from unauthorized access by any Person.

  • Each of the Company Entities have implemented commercially reasonable safeguards, including as may be required by Law, including Consumer Protection, Privacy and Information Security Laws, including administrative, physical and technical security measures given the sensitivity of data Processed by the Company and MTE, including Confidential Information and Personal Data, designed to protect against Security Incidents.

  • No Target Company has received any written notice that it is subject to any enforcement Action by any Governmental Authority or any material Action by any other Person, in each case, that alleges the unauthorized Processing of Protected Data or non-compliance with applicable Privacy and Information Security Laws, excluding for clarity, individual data deletion, “opt out” or similar privacy rights requests in the ordinary course of business.

  • Each Seller Privacy Policy has at all times included all information and made all disclosures to users or customers reasonably required by Privacy and Information Security Laws, and none of such disclosures made or contained in any Seller Privacy Policy has been inaccurate, misleading or deceptive or in material violation of applicable Privacy and Information Security Laws.

  • This study, when completed, may indicate a need to amend both solid waste and water regulations.

  • Each Target Company provided all notices and obtained all consents required in connection with any use of cookies, device or browser, cross-device tracking, or other user, device, account, or other tracking technology or similar technology, in connection with the use of such technologies in accordance with Privacy and Information Security Laws.


More Definitions of Privacy and Information Security Laws

Privacy and Information Security Laws means (i) all applicable Laws, and all regulations concerning the processing, protection, privacy or security of Personal Information, (including, where applicable, Laws of jurisdictions where Personal Information was collected), including, as applicable, data-breach notification Laws, consumer protection Laws, Laws concerning requirements for website and mobile application privacy policies and practices, Social Security number protection Laws, data security Laws, and Laws concerning email, text message, or telephone communications, including: the Federal Trade Commission Act, the Telephone Consumer Protection Act, the Telemarketing and Consumer Fraud and Abuse Prevention Act, the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003, the California Consumer Privacy Act of 2018 (“CCPA”), the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, the Fair Credit Reporting Act, the Fair and Accurate Credit Transaction Act, the General Data Protection Regulation 2016/679 (“GDPR”), the UK Data Protection Xxx 0000 (“UK DPA”), the UK General Data Protection Regulation as defined by the UK DPA as amended by the Data Protection, Privacy and Electronic Communications (Amendments etc) (EU Exit) Regulations 2019 (“UK GDPR”), and the Privacy and Electronic Communications Regulations 2003, and Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector (and any national legislation that implements it), in each case as applicable and in force, and as amended, consolidated, re-enacted or replaced, and all other similar international, federal, state, provincial, and local Laws, as applicable, and (ii) any applicable published industry best practice or other standard in which the Company Group or any of its Subsidiaries operate as a party that pertains to privacy or restrictions or obligations related to the Processing of Personal Information or direct marketing to consumers or consumer protection.

Related to Privacy and Information Security Laws

  • Electronic and Information Resources means information resources, including information resources technologies, and any equipment or interconnected system of equipment that is used in the creation, conversion, duplication, or delivery of data or information. The term includes telephones and other telecommunications products, information kiosks, transaction machines, Internet websites, multimedia resources, and office equipment, including copy machines and fax machines.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Background Information means various types of information provided by the Sponsors and is defined in RFP Section 2.4(1)(b);

  • Data Room Information means the information and documents listed in the index of documents contained in the Data Site attached to the Company Disclosure Letter;

  • network and information system have the meaning set forth in OAR 407-014-0305, as such rule may be revised from time to time.

  • De-identified information means health information that

  • Privacy/Data Security Laws means all laws governing the receipt, collection, use, storage, processing, sharing, security, disclosure, or transfer of Personal Information or the security of Company’s Business Systems or Business Data.

  • Criminal history record information means records and data collected by criminal justice agencies

  • Seller Information As defined in Subsection 34.04(a).

  • Foreground Information means any Invention first conceived, developed or reduced to practice as part of the Work under the Contract and all other Technical Information conceived, developed or produced as part of the Work under the Contract;

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Patient Information means information (however recorded) which—

  • Electronic and Information Resources Accessibility Standards means the accessibility standards for electronic and information resources contained in 1 Texas Administrative Code Chapter 213.

  • Derived Information means such written information regarding the Notes as is disseminated by any Underwriter to a potential investor, which information is not any of (A) Issuer Information, (B) Prepricing Information or (C) contained in the Registration Statement, the Preliminary Prospectus, the Ratings Free Writing Prospectus or the Prospectus or any amendment or supplement to any of them, taking into account information incorporated therein by reference (other than information incorporated by reference from any information regarding the Notes that is disseminated by any Underwriter to a potential investor); and

  • Information has the meaning specified in Section 10.07.

  • Client Information means any data, information, software or other materials that you provide to Red Hat under the Agreement.

  • Transferred Information means the personal information (namely, information about an identifiable individual other than their business title or business contact information when such information is used for the purposes of contacting an individual in that individual’s capacity as an employee or an official of an organization and for no other purpose) to be disclosed, transferred or conveyed to the Recipient or any of its Representatives by or on behalf of the Disclosing Parties as a result of or in conjunction with the transactions contemplated herein.

  • Licensed Information means any information concerning the Licensed Program, which is owned by the Licensor and is licensed to the Licensee together with the Licensed Program. Licensed Information includes such information as input form, user manual, interface format and input/output format and is delivered to and used by the Licensee as confidential information or proprietary property of the Licensor.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Requested Information has the meaning set forth in Section 4.3(a).

  • Specified Information means information in a children's protective services case record related specifically to the department's actions in responding to a complaint of child abuse or child neglect. Specified information does not include any of the following:

  • Confidential commercial information means records provided to the govern- ment by a submitter that arguably contain material exempt from release under Exemption 4 of the Freedom of Information Act, 5 U.S.C. 552(b)(4), be- cause disclosure could reasonably be expected to cause substantial competi- tive harm.

  • Updated Information shall have the meaning set forth in Section 9.1(b)(i).

  • Original Information means information that—

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.