Privacy Breach Protocol definition

Privacy Breach Protocol means the OBI Privacy Breach Protocol, as amended from time to time, that forms part of the Governance Policy.
Privacy Breach Protocol means the OBI Privacy Breach Protocol, as amended from time to time, that forms part of the Governance Policy and which can be found on OBI’s website at https://www.braincode.ca/content/about-brain-code.
Privacy Breach Protocol means the OBI Privacy Breach Protocol, as amended from time to time, that forms part of the Governance Policy and which can be found on OBI’s website at http://www.braininstitute.ca/Brain-CODE-governance.

Examples of Privacy Breach Protocol in a sentence

  • Follow Steps 2 through 6 of the Privacy Breach Protocol At this point, all of the steps required for a self-identified or suspected privacy breach are the same as described in the previous template.

  • In June 2014, City Council adopted a Privacy Breach Protocol to provide a comprehensive and transparent process to respond to privacy breaches involving personal information in the custody or control of the City.

  • In addition to following the Privacy Breach Protocol, Parties to this agreement may choose to also report directly to the BC government central privacy office if the privacy breach occurs at their institution.

  • In the event of a suspected breach of privacy or security, the DIS Program will follow the DHW Privacy Breach Protocol which may require the DIS Program to contact and collaborate with the User Organization representative responsible for privacy and security to conduct an investigation.

  • The Contractor must deliver a Privacy Breach Protocol within three (3) months of Contract award that is approved by the Technical Authority as part of their incident management processes for the handling of any privacy related incidents.

  • We just took away his exemption; same with upper residential units.

  • The Company has its registered office in Kolkata and has six tea estates which are located in Assam and Dooar’s region of West Bengal.2. FINANCIAL RESULTS (STANDALONE AND CONSOLIDATED)The financial performance of the Company for the financial year ended 31st March, 2023 is summarized below:(Amount in Rs.) 3.

  • This is expected to change with time as the DSO takes on increasing responsibility.The Privacy Breach Protocol has been updated since 2013 to reflect the role of the DSO.

  • McKhann GM, Knopman DS, Chertkow H, Hyman BT, Jack Jr CR, Kawas CH et al.

  • On June 23, 2014, consistent with privacy breach management best practices, City Council adopted a Privacy Breach Protocol to be used in all instances where a privacy breach occurs involving personal information in the custody or control of the City of Oshawa.

Related to Privacy Breach Protocol

  • Privacy Breach means a common law breach of confidence, infringement, or violation of any rights to privacy, including but not limited to breach of the Insured’s privacy statement, breach of a person’s right of publicity, false light, intrusion upon a person’s seclusion, public disclosure of a person’s privacy information, or misappropriation of a person’s picture or name for commercial gain.

  • Data Breach means the unauthorized access by an unauthorized person that results in the use, disclosure or theft of Customer Data.

  • Data Breaches Party shall report to AHS, though its Chief Information Officer (CIO), any impermissible use or disclosure that compromises the security, confidentiality or privacy of any form of protected personal information identified above within 24 hours of the discovery of the breach. Party shall in addition comply with any other data breach notification requirements required under federal or state law.

  • Privacy Standards means the standards of the privacy of individually identifiable health information, as pursuant to HIPAA.

  • Privacy Shield means the EU-U.S. Privacy Shield and Swiss-U.S. Privacy Shield Framework self-certification program operated by the U.S. Department of Commerce and approved by the European Commission pursuant to Decision C(2016)4176 of 12 July 2016 and by the Swiss Federal Council on January 11, 2017 respectively.

  • Privacy Statement means any and all of the Company's privacy policies published on its web site or otherwise provided to users of the Company's products and services or the Company's data subjects regarding the collection, use and distribution of personal information from visitors to its web site, consumers of its products and services and/or the Company's data subjects, as applicable;

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Privacy Policies has the meaning specified in Section 4.14(e).

  • Personal Data Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise processed;

  • Privacy Notice means Sage’s privacy notice posted on xxx.xxxx.xxx (or such other URL as Sage may notify to you) and which may be amended by Sage from time to time.

  • Confidential Information Breach means, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Privacy Incident means violation of the Minnesota Government Data Practices Act (Minnesota Statutes chapter 13); violation of federal data disclosure or privacy requirements in federal laws, rules and regulations; and/or breach of a contractual obligation to protect State data. This includes, but is not limited to, improper or unauthorized access to, viewing of, obtaining of, acquisition of, use of, disclosure of, damage to, loss of, modification of, alteration to or destruction of State data protected by such State or federal laws or by contract.

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Patient Information means information (however recorded) which—

  • Privacy Policy means the terms which set out how we will deal with confidential and personal information received from you via the Website;

  • Customer Data means any content, materials, data and information that Authorized Users enter into the production system of a Cloud Service or that Customer derives from its use of and stores in the Cloud Service (e.g. Customer-specific reports). Customer Data and its derivatives will not include SAP’s Confidential Information.

  • Summary Health Information means information (a) that summarizes the claims history, claims expenses, or type of claims experienced by individuals for whom a plan sponsor had provided health benefits under a health plan; and (b) from which the information described at 42 CFR Section 164.514(b)(2)(i) has been deleted, except that the geographic information described in 42 CFR Section 164.514(b)(2)(i)(B) need only be aggregated to the level of a five-digit ZIP code.

  • Serious Breach means any breach defined as a Serious Breach in the Agreement or any breach or breaches which adversely, materially or substantially affect the performance or delivery of the Services or compliance with the terms and conditions of the Agreement or the provision of a safe, healthy and supportive learning environment or a breach of security that adversely affects the Personal Data or privacy of an individual. Failure to comply with Law, or actions or omissions by the Provider that endanger the Health or Safety of Learners, Provider Personnel, and all other persons including members of the public would constitute a Serious Breach;

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Contractor Sensitive Information means any information provided by the Contractor to the Authority (disregarding any protective marking or assertion of confidentiality) which: is specified as Contractor Sensitive Information in Schedule 7 and has not lost its sensitivity according to the justifications and durations set out in that Schedule; and is exempt information pursuant to sections 33(1) or 36, 38 or 39 of FOISA (having regard for that purpose to the public interest there might be in disclosing such information as referred to in section 2(1)(b) of FOISA).

  • Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.

  • Serious traffic violation means a conviction when operating a commercial motor vehicle of:

  • Serious assault means an act that constitutes a felony violation of chapter XI of the Michigan penal code, 1931 PA 328, MCL 750.81 to 750.90h, or that constitutes an assault and infliction of serious or aggravated injury under section 81a of the Michigan penal code, 1931 PA 328, MCL 750.81a.

  • Individually Identifiable Health Information means information that is a subset of health information, including demographic information collected from an individual, and: (a) is created or received by a health care provider, health plan, employer, or health care clearinghouse; (b) relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual; and (c) that identifies the individual or with respect to which there is a reasonable basis to believe the information can be used to identify the individual.

  • Privacy Act means the Privacy Act 1988 (Cth).