Examples of Privacy and Security Policies in a sentence
The Company has used commercially reasonable efforts consistent with Applicable Law and Applicable Requirements relating to privacy, and consistent with its own Privacy and Security Policies, to store and secure all Personal Data, which are designed to protect against unauthorized access to and use of the Personal Data.
The Company is HIPPA compliant in all material respects and there has been no material breach or violation of the Privacy and Security Policies at any time.
The information security practices used with respect to all Personal Data maintained by or on behalf of the Company conform, and at all times have conformed, to all Privacy and Security Policies and Privacy Laws.
Except as set forth on Section 3.2(aa) of the Disclosure Schedule, to the Knowledge of Holdings, there has been no material breach or violation of the Privacy and Security Policies or applicable Privacy Laws since January 1, 2019.
The Company has used commercially reasonable efforts consistent with standard industry practices, applicable Law, self-governing rules and policies relating to privacy and its own Privacy and Security Policies to store and secure all Personal Data to protect against unauthorized access to or use of the Personal Data.
The Company and its Subsidiaries have at all times complied with the Company Privacy and Security Policies in all material respects.
Except as set forth on Section 3.2(aa)(i) of the Disclosure Schedule, to the Knowledge of Holdings, there has been no material breach or violation of the Privacy and Security Policies or applicable Privacy Laws since January 1, 2019.
The information security practices used with respect to all Personal Data maintained by or, to the Knowledge of Holdings, on behalf of, the Company conform in all material respects to all applicable Privacy and Security Policies and Privacy Laws.
Section 2.2(w)(ii) of the Disclosure Schedule sets out a copy or summary of the Company’s Privacy and Security Policies, including (without limitation) all the forms of consent (including a description of how such consent is obtained) used by Company in respect of the collection, use or disclosure of Personal Data.
The information security practices used with respect to all Personal Data maintained by or, to the Knowledge of Holdings, on behalf of, the Company Group conform in all material respects to all applicable Privacy and Security Policies and Privacy Laws.