Privacy and Information Access Clause Samples

The "Privacy and Information Access" clause defines how personal and confidential information is handled and who is permitted to access it within the context of the agreement. Typically, this clause outlines the obligations of each party to protect sensitive data, sets limits on the use and disclosure of such information, and may specify procedures for requesting or granting access to records. Its core function is to safeguard privacy, ensure compliance with applicable data protection laws, and clarify the rights and responsibilities regarding information sharing between the parties.
Privacy and Information Access. Comodo shall follow the privacy policy posted on its website at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇.▇▇▇/repository/privacy-policy.php when collecting and using information from you. Comodo may amend the privacy policy at any time by posting the amended privacy policy on its website. By accepting this Agreement, you are providing express permission for the following information to be obtained by this program: Data and information that is collected from users for statistics and analysis during Comodo product installation, uninstallation and product update(s) in order for Comodo to know specific Comodo product usage on various operating systems, and to assist in further product planning and support include: Anonymous Computer ID; Comodo defined integer values for Product ID, Channel ID, Affiliate ID and selected Interface Language, Comodo product version; operating system name, platform, language, build and version; input e-mail (if optionally provided during installation); Comodo product related license information; settings for consent to data collection; if the web filtering feature is enabled and a browsed URL is a heuristic match with a malicious website database, the URL may be sent to Comodo for further analysis. The following information is also sent to Comodo to determine active users: Anonymous Computer ID; Comodo defined integer values for Product ID, Channel ID and Affiliate ID; and Comodo product version. The following information is only sent to Comodo based on consent: Install options; Comodo application usage (i.e. Comodo product launch and which features and interfaces used); Information on executed files which includes the file path, file size, the file’s sha-1 hash, Comodo verdict and source of verdict, user’s decision on application, parent application sha-1 hash, url associated with the file, IP of domain from where the file is downloaded, browser name and version from where a file is downloaded, if the file is seen as an installer by product, a file’s digital signing status, digital signer name if the file is signed; Information on installed browser, such as name, search engine and home page settings; Default browser; Crash dumps of Comodo application and Kernel crash dumps. In order to investigate crashes in the context of the system, computer information as extracted using Microsoft tool “msinfo32.exe /nfo” is sent, which contains complete system information including but not limited to, the categories of “Hardware Resources”, “Components”, and “Softwa...
Privacy and Information Access. Comodo shall follow the privacy policy posted on its website at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇.▇▇▇/repository/privacy-policy.php when collecting and using information from you. Comodo may amend the privacy policy at any time by posting the amended privacy policy on its website. By accepting this Agreement, you are providing express permission for the following information to be obtained by this program: The file/application list is scanned; reporting of information of scan events to Comodo’s ITSM server/ portal for integration, where the scan events will be shown on ITSM portal per device; System information via PAAR Service (Information about the computer or device such as computer ID, operating system language, operating system type); User events, such as install, uninstall, and updates, via Comodo Messaging Center Service. Administrator access control for device; Data reporting to Comodo of response errors and response time for the following services: FLS, Valkyrie, ITSM File Rating, and ▇▇▇▇▇▇▇▇.▇▇▇▇▇▇.▇▇▇, as well as determining if these services are available. Options to automatically submit crash reports for CCS processes crash and Windows crashes and event logs are also available. CCS also sends the following information to Comodo’s FLS: Scan of files; file downloads from URLs and from which URL the file is downloaded; domain IP, browser name; parent hash if the file/process has a parent process; user id; product id; product version; installer; file size; file type; file path; digital signature status; file hidden status; verdict source; caller type; value of signer name of the code signing digital signature; enterprise field; enterprise value; registration and de-registration information. CCS monitors file upload/download status and the duration of such. Monitoring and reporting of file operations including any upload to Comodo Valkyrie, upload to Comodo account manager service (if configured), downloading updates from ▇▇▇▇▇▇▇▇.▇▇▇▇▇▇.▇▇▇ or other configured updating service. Reporting of unrecognized files that have stayed unrecognized for a given time period. Downloads of the local verdict service database updates is also allowed. A recognizer function of the program blocks suspicious applications from dropping files into a user’s autorun folder and has the ability to choose applicable actions. CCS may also send logs to third party logging systems, these could include event logs, system logs, and external files. CCS also creates, as needed, files or other i...
Privacy and Information Access. Xcitium shall follow the privacy policy posted on its website at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇ when collecting and using information from you. Xcitium may amend the privacy policy at any time by posting the amended privacy policy on its website. By accepting this Agreement, you are providing express permission for the following information to be obtained by this program: Data and information that is collected from users for statistics and analysis during Xcitium product installation, uninstallation and product update(s) in order for Xcitium to know specific Xcitium product usage on various operating systems, and to assist in further product planning and support include: Anonymous Computer ID; Xcitium defined integer values for Product ID, Channel ID, Affiliate ID and selected Interface Language, Xcitium product version; operating system name, platform, language, build and version; input e-mail (if optionally provided during installation); Xcitium product related license information; settings for consent to data collection; if the web filtering feature is enabled and a browsed URL is a heuristic match with a malicious website database, the URL may be sent to Xcitium for further analysis. The following information is also sent to Xcitium to determine active users: Anonymous Computer ID; Xcitium defined integer values for Product ID, Channel ID and Affiliate ID; and Xcitium product version. The following information is only sent to Xcitium based on consent: Install options; Xcitium application usage (i.e. Xcitium product launch and which features and interfaces used); Information on executed files which includes the file path, file size, the file’s sha-1 hash, Xcitium verdict and source of verdict, user’s decision on application, parent application sha-1 hash, url associated with the file, IP of domain from where the file is downloaded, browser name and version from where a file is downloaded, if the file is seen as an installer by product, a file’s digital signing status, digital signer name if the file is signed; Information on installed browser, such as name, search engine and home page settings; Default browser; Crash dumps of Xcitium application and Kernel crash dumps. In order to investigate crashes in the context of the system, computer information as extracted using Microsoft tool “msinfo32.exe /nfo” is sent, which contains complete system information including but not limited to, the categories of “Hardware Resources”, “Components”, and “Software Environme...
Privacy and Information Access. Comodo shall follow the privacy policy posted on its website at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇.▇▇▇/repository/privacy-policy.php when collecting and using information from you. Comodo may amend the privacy policy at any time by posting the amended privacy policy on its website. By accepting this Agreement, you are providing express permission for the following information to be obtained by this program: The file/application list is scanned; reporting of information of scan events to Comodo’s ITSM server/ portal for integration, where the scan events will be shown on ITSM portal per device; System information via PAAR Service (Information about the computer or device such as computer ID, operating system language, operating system type); User events, such as install, uninstall, and updates, via Comodo Messaging Center Service. Administrator access control for device; Configurable protocols used for FLS, allowing the ITSM administrator to specify which protocol to be used for communication with FLS: Transmission Control Protocol (TCP), User Datagram Protocol (UDP) or both. Data reporting to Comodo of response errors and response time for the following services: FLS, Valkyrie, ITSM File Rating, and ▇▇▇▇▇▇▇▇.▇▇▇▇▇▇.▇▇▇, as well as determining if these services are available. Options to automatically submit crash reports for CCS processes crash and Windows crashes and event logs are also available. CCS also sends the following information to Comodo’s FLS: Scan of files; file downloads from URLs and from which URL the file is downloaded; domain IP, browser name and version to download the URL; parent hash if the file/process has a parent process; user id; product id; product version; upload enabled status; installer; file size; file type; file path; digital signature status; file hidden status; verdict source; caller type; value of signer name of the code signing digital signature; enterprise field; enterprise value; registration and de-registration information. CCS may also send logs to third party logging systems, these could include event logs, system logs, and external files.

Related to Privacy and Information Access

  • Privacy and Information Security We make security and the protection of your information a top priority. You can access our Privacy Policy at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇.▇▇▇/privacy/, which is incorporated into and made a part of this Agreement by this reference.

  • Access and Information The Company, on the one hand, and Parent and Acquisition Corp., on the other hand, shall each afford to the other and to the other’s accountants, counsel and other representatives full access during normal business hours throughout the period prior to the Effective Time to all of its properties, books, contracts, commitments and records (including but not limited to tax returns) and during such period, each shall furnish promptly to the other all information concerning its business, properties and personnel as such other party may reasonably request, provided that no investigation pursuant to this Section 6.01 shall affect any representations or warranties made herein. Each party shall hold, and shall cause its employees and agents to hold, in confidence all such information (other than such information that (a) is already in such party’s possession or (b) becomes generally available to the public other than as a result of a disclosure by such party or its directors, officers, managers, employees, agents or advisors or (c) becomes available to such party on a non-confidential basis from a source other than a party hereto or its advisors, provided that such source is not known by such party to be bound by a confidentiality agreement with or other obligation of secrecy to a party hereto or another party until such time as such information is otherwise publicly available; provided, however, that (i) any such information may be disclosed to such party’s directors, officers, employees and representatives of such party’s advisors who need to know such information for the purpose of evaluating the transactions contemplated hereby (it being understood that such directors, officers, employees and representatives shall be informed by such party of the confidential nature of such information), (ii) any disclosure of such information may be made as to which the party hereto furnishing such information has consented in writing and (iii) any such information may be disclosed pursuant to a judicial, administrative or governmental order or request; provided, further, that the requested party will promptly so notify the other party so that the other party may seek a protective order or appropriate remedy and/or waive compliance with this Agreement and if such protective order or other remedy is not obtained or the other party waives compliance with this provision, the requested party will furnish only that portion of such information that is legally required and will exercise its best efforts to obtain a protective order or other reliable assurance that confidential treatment will be accorded the information furnished. If this Agreement is terminated, each party will deliver to the other all documents and other materials (including copies) obtained by such party or on its behalf from the other party as a result of this Agreement or in connection herewith, whether so obtained before or after the execution hereof.

  • Data and Information 14.1 The Contractor shall have the right to use, and shall have access to, all geological, geophysical, drilling, well production, well location maps and other information held by the Republic related to the Contract Area in consideration of the payment of the required fees. 14.2 The Contractor shall promptly provide the Minister, free of cost, with all data obtained as a result of Hydrocarbons Operations under this Contract, including seismic data, geological, geophysical, geochemical, petro-physical, engineering, well logs, maps, magnetic tapes, cores, cuttings and production data, as well as all interpretative and derivative data, including reports, analyses, interpretations and evaluations prepared in respect of Hydrocarbons Operations. 14.3 The Republic shall have title to all original data and information resulting from Hydrocarbons Operations under this Contract, including but not limited to geological, geophysical, petro-physical and engineering data, well logs and completion status reports, and any other data that the Contractor or anyone acting on its behalf may compile or obtain during the term of this Contract. The Contractor is entitled to retain and use a copy of all such data, subject to the provisions of this Article 14. 14.4 The Contractor acknowledges the proprietary rights of the Republic in all data and information referred to in this Article 14 and agrees to treat all such data and information as confidential and to comply with applicable laws and regulations with respect to the storage and any transport or export out of the Republic of any such data and information. 14.5 The Contractor may disclose such information to its employees to the extent required for efficient conduct of Hydrocarbons Operations, provided such individuals have signed or otherwise be subject to an undertaking relating to the confidentiality of the same information as part of their employment contract, or to Affiliates and consultants, or to bona fide prospective assignees of rights under this Contract or to banks or financial institutions from which finance is sought, provided that the Contractor obtains from such entities, prior to disclosure, a written confidentiality undertaking. In the case of disclosure to prospective assignees, any disclosure of such information shall require the prior written consent of the Minister, which consent shall not be unreasonably withheld. 14.6 The Contractor may disclose information as and to the extent required by a regulatory or judicial authority having proper jurisdiction over the Contractor, provided that the Minister is first notified of such disclosure and of the information so disclosed. 14.7 The Contractor’s obligation of confidentiality under this Article shall be of a continuing nature and shall not be cancelled by the expiration, suspension or termination of this Contract, or by any transfer or assignment of interest under this Contract.

  • Records and Information 14.1 A Sector Association and an Operator must retain records of all information required to be supplied to the Administrator under these Rules. 14.2 In particular, an Operator must retain: 14.2.1 sufficient records to allow the Administrator to verify whether a target unit has met its target, including sufficient records to allow the accurate verification of throughput and annual consumption of energy of a target unit; and 14.2.2 records of energy saving actions and measures implemented during each target period. 14.3 A Sector Association and an Operator must make all records which it is required to retain under these Rules available for inspection by the Administrator or a person appointed by the Administrator and must provide copies of such records in response to a request by the date specified in the request. 14.4 All records required to be retained under these Rules must be retained throughout the duration of an agreement and for a period of four years following the termination of an agreement.

  • Documentation and Information Such Stockholder shall not make any public announcement regarding this Agreement or the transactions contemplated hereby without the prior written consent of Parent (such consent not to be unreasonably withheld, conditioned or delayed), except as may be required by applicable Law (provided that reasonable notice of any such disclosure will be provided to Parent, and such Stockholder will consider in good faith the reasonable comments of Parent with respect to such disclosure and otherwise cooperate with Parent in obtaining confidential treatment with respect to such disclosure). Such Stockholder consents to and hereby authorizes Parent to publish and disclose in all documents and schedules filed with the SEC or any other Governmental Entity or applicable securities exchange, and any press release or other disclosure document that Parent reasonably determines to be necessary or advisable in connection with the Offer, the Merger or any other transactions contemplated by the Business Combination Agreement or this Agreement, such Stockholder’s identity, the aggregate number of Subject Shares owned by Stockholders subject to this Agreement, the existence of this Agreement and the nature of such Stockholder’s commitments and obligations under this Agreement, and such Stockholder acknowledges that Parent may, in Parent’s sole discretion, file this Agreement or a form hereof with the SEC or any other Governmental Entity or securities exchange. Such Stockholder agrees to promptly give Parent any information necessary for the preparation of any such disclosure documents, and such Stockholder agrees to promptly notify Parent of any changes with respect to information supplied by such Stockholder specifically for use in any such disclosure document, if and to the extent that any such information shall have become false or misleading in any material respect.