Privacy and Security Practices Clause Samples

Privacy and Security Practices. 7.1 DiMe Privacy Policy. DiMe operates the Services and handles Customer information, pursuant to the privacy policy available at ▇▇▇▇▇://▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/privacy-policy (the “Privacy Policy”).
Privacy and Security Practices. Each HSP shall: (a) with the support of audit logs provided by CAMH, have logging, auditing and monitoring policies and procedures including communication of these controls to Authorized Users; (b) have an incident management process to identify, escalate, investigate and report any privacy and/or security incident relating to the Data in the Repository which affects the HSP’s Clients, such process to interface with and support the CBI incident management process; (c) have a process to handle Client requests to access, or correct their PHI, or challenge the HSP’s privacy practices. Any such requests must be communicated to CAMH at the first reasonable opportunity; (d) have a process to handle a Client’s request to not share their PHI and to withdraw their consent for sharing PHI (Lockbox), and to the extent that this impacts the Data, communicate this immediately to CAMH; (e) keep Shared Client Data confidential and secure and use the same degree of care to protect such Data, as the HSP uses to protect its PHI of a like nature, but in any event, in maintaining such Shared Client Data confidential and secure, it shall not use a standard of care that is less than a reasonable standard of care; (f) access the Data only in compliance with this DSA and Applicable Legislation; (g) take reasonable steps to ensure the physical, administrative, and technological security of PHI in its custody or control and to prevent theft, loss and unauthorized access, copying, modification, use, disclosure or disposal of PHI; (h) maintain such policies, procedures and systems as necessary to prevent unauthorized persons from having access to, collecting, using, disclosing, modifying, disposing, copying, stealing or otherwise committing any other act that could breach or compromise the confidentiality, availability, accessibility, integrity, structure, format or content of the PHI of a Client that has been uploaded into the Repository by another HSP, or the privacy of that Client; (i) ensure that its Agents, including its Authorized Users, are aware of and comply with the requirements of this DSA with respect to the sharing of PHI through the Repository; (j) be responsible for notifying its Clients of any inappropriate use, access, disclosure, theft or loss of any PHI in its custody; and (k) provide training to its Agents, including its Authorized Users, with respect to their legal obligations relating to privacy and PHI generally.
Privacy and Security Practices. Coolset operates and handles Customer Information solely as necessary to fulfill its obligations, commitments, and purposes described under this Agreement (“MSA”) and the order form (“Order Form”), and in compliance with the General Data Protection Regulation (GDPR) and according to the privacy policy available at ▇▇▇▇▇://▇▇▇▇▇▇▇.▇▇▇/legal/privacy (the “Privacy Policy”). Coolset’s current trust, security, and data protection practices are set forth at ▇▇▇▇▇://▇▇▇▇▇.▇▇▇▇▇▇▇.▇▇▇ (the “Trust Center”), which details the measures Coolset takes to protect the security, confidentiality, and integrity of Customer Information, among others.
Privacy and Security Practices. Xenegrade shall maintain privacy and confidentially for all data of Licensee. Xenegrade may access the data of Licensee for performing corporate activities including, but not limited to: quality improvement, customer service, auditing, business planning and development, and general administrative duties. All the data recorded in XenDirect is owned by the Licensee and Xenegrade will not sell or distribute any of the Licensee’s data.
Privacy and Security Practices. ▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇’▇ privacy and security practices are explained in ▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇’▇ Privacy Statement, as amended from time to time. You agree that ▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇ is entitled to monitor your use of this website for the purpose of enforcing the restrictions in Section 5 and to maintain the privacy and security of this website.
Privacy and Security Practices 

Related to Privacy and Security Practices

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each JBE Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such JBE Work Location.

  • SAFETY PRACTICES (a) i Employees requiring glasses must wear glasses, preferably with safety lenses instead of contact lenses while on the job site. ii W.C.B. approved safety footwear must be worn at all times while on the job site. iii Employee attire will be in conformance with W.C.B. Regulation and the Employer’s policy.

  • Privacy and Security (a) Each of the Company and its Subsidiaries complies (and requires and monitors the compliance of applicable third parties) in all material respects with all applicable Laws relating to privacy or data security, and reputable industry practice, standards, self-governing rules and policies and their own published, posted and internal agreements and policies (which are in conformance with reputable industry practice) (all of the foregoing collectively, “Privacy Laws”) with respect to: (i) personally identifiable information (including name, address, telephone number, electronic mail address, social security number, bank account number or credit card number), sensitive personal information and any special categories of personal information regulated thereunder or covered thereby (“Personal Information”), whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners; and (ii) non-personally identifiable information, whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners. (b) Neither the Company nor any of its Subsidiaries uses, collects, or receives any Personal Information or sensitive non-personally identifiable information and does not become aware of the identity or location of, or identify or locate, any particular Person as a result of any receipt of such Personal Information, in a manner which would materially breach or violate any Privacy Laws and materially and adversely impact the business of the Company and its Subsidiaries, taken as a whole. (c) To the Company’s knowledge, Persons with which the Company or any of its Subsidiaries have contractual relationships have not breached any agreements or any Privacy Laws pertaining to Personal Information and to non-personally identifiable information. (d) To the Company’s knowledge, the Company and its Subsidiaries take all commercially reasonable steps to protect the operation, confidentiality, integrity and security of their respective business systems and websites and all information and transactions stored or contained therein or transmitted thereby against any unauthorized or improper use, access, transmittal, interruption, modification or corruption, and there have been no material breaches of same. Without limiting the generality of the foregoing, each of the Company and its Subsidiaries (i) uses industry standard encryption technology and (ii) has implemented a comprehensive security plan that (1) identifies internal and external risks to the security of the Company’s or its Subsidiaries’ confidential information and Personal Information and (2) implements, monitors and improves adequate and effective safeguards to control those risks.

  • Data Privacy and Security Laws The Company is, and at all prior times was, in material compliance with all applicable state and federal data privacy and security laws and regulations in the United States, including, without limitation, the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) as amended by the Health Information Technology for Economic and Clinical Health Act, and all applicable provincial and federal data privacy and security laws and regulations in Canada, including without limitation the Personal Information Protection and Electronic Documents Act (S.C. 2000, c. 5) (“PIPEDA”); and the Company has taken commercially reasonable actions to prepare to comply with, and have been and currently are in compliance with, the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679) (collectively, the “Privacy Laws”). To ensure compliance with the Privacy Laws, the Company has in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; (iv) “personal information”, “personal health information”. and “business contact information” as defined by PIPEDA; (v) “personal data” as defined by GDPR; and (vi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. The Company has at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies: (i) it has not received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Privacy Laws, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Privacy Law; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability under any Privacy Law.