Sentences with phrase «access to such information in»

Thus, we agree with the first point: in order to meet its requirements for providing access, a covered entity must not only provide access to such protected health information it holds, but must also provide access to such information in a designated record set of its business associate, pursuant to its business associate contract, unless the information is the same as information maintained directly by the covered entity.

Not exact matches

If you interact with us through a social media platform, plug - in etc., then you may be permitting us to have on - going access to certain information from your social network profile (such as name, social networking id page, email address, photo, gender, location, the people / sites you follow etc.).
Although Zuckerberg talked a lot about protecting user information, he did not mention why Facebook overlooked the potential problems inherent in giving developers such broad access to user data in the first place.
Protect Your Personal Information In order to effectively use most personal finance apps, you must enter sensitive information, such as your bank login and password, with which criminals can gain access to youInformation In order to effectively use most personal finance apps, you must enter sensitive information, such as your bank login and password, with which criminals can gain access to youinformation, such as your bank login and password, with which criminals can gain access to your accounts.
In addition to mortgage insurance, it also issues mortgage - backed securities and pursues a variety of social policy agendas at the behest of Ottawa, such as disseminating information on regional housing markets, improving access to affordable housing and encouraging energy efficiency in new homeIn addition to mortgage insurance, it also issues mortgage - backed securities and pursues a variety of social policy agendas at the behest of Ottawa, such as disseminating information on regional housing markets, improving access to affordable housing and encouraging energy efficiency in new homein new homes.
The hacker was able to use a physician - operated website that was no longer in use and left unsecured in order to access the records, which included information such as names, the last four digits of credit card numbers, phone numbers, birth dates, and both physical and digital addresses.
Except as required by law or with the approval of the customer, a telecommunications carrier that receives or obtains customer proprietary network information by virtue of its provision of a telecommunications service shall only use, disclose, or permit access to individually identifiable customer proprietary network information in its provision of (A) the telecommunications service from which such information is derived, or (B) services necessary to, or used in, the provision of such telecommunications service, including the publishing of directories.
Facebook Inc Chief Executive Mark Zuckerberg apologized on Wednesday for mistakes his company made in how it handled data belonging to 50 million of its users and promised tougher steps to restrict developers» access to such information.
You acknowledge, consent and agree that we may access, preserve, and disclose your registration and any other information you provide if required to do so by law or in a good faith belief that such access preservation or disclosure is reasonably necessary to: (a) comply with legal process; (b) enforce this Agreement; (c) respond to claims of a violation of the rights of third - parties; (d) respond to your requests for customer service; or (e) protect the rights, property, or personal safety of The Defense Alliance of Minnesota, The Defense Alliance of Minnesota Affiliates, its users and the public.
It may be because customers have such easy access to more information than ever before — in only a few seconds and with a couple taps on their phones, customers can read reviews, compare prices from multiple retailers, see whether something's in stock, find out how fast it will ship or be available for pick - up, and more.
Investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for Federal civilian employment, military service, Federal contracts, or access to classified information, but only to the extent that the disclosure of such material would reveal the identity of a source who furnished information to the Government under an express promise that the identity of the source would be held in confidence.
By using this website, you acknowledge that you have read and understand the foregoing disclaimers and release Richard Bernstein Advisors LLC and its affiliates, members, officers, employees and agents from any and all liability whatsoever relating to your use of this site, any such links, or any information contained herein or in any such appearances or articles (whether accessed through such links or downloaded directly from this website).
In investing, this could be a structural edge such as access to better information or low - cost permanent capital, or it may be an intellectual edge derived from creativity or lateral thinking or a psychological edge like emotional rigor or temperament.
Because mobile boarding passes contain the passenger's full name and confirmation number, anyone with access to the boarding pass can use the information included in it to change the flight details, such as the seat number or the flight number.
We urge the Department of Education and IRS to work together to restore secure access to the DRT as soon as possible, and to do so in a way that avoids creating barriers to access for low - income students, such as requiring complicated financial or personal information.
Facebook will need to approve all apps that request access to information such as check - ins, likes, photos, posts, videos, events and groups
Users are advised that there are inherent security risks in transmitting data, such as emails, credit card or personal information, via the Internet, because it is impossible to safeguard completely against unauthorized access by 3rd - parties.
Several highly publicized cases in the late 1980s (such as access to computer systems in Canada from New York or access to NATO information systems in Norway from the USA) have shown that «the prevention of computer crime is of great significance as business, administration and society depend to a high degree on the efficiency and security of modern information technology».
Upon request, we will grant individuals reasonable access to Personal Information that we hold about them for the purpose of correcting, amending, or deleting such Personal Information where it is inaccurate; provided, however, that we reserve the right to deny access or limit access in cases where the burden or cost of providing access would be disproportionate to the risks to your privacy or in the case of a vexatious or fraudulent request.
Application of this technology area can provide consumers access to information such as the weight, age and health of the animal in their meal as well as the conditions it was raised, transported and slaughtered under.
You shall not Post Content that: (1) infringes any proprietary rights of any third party; (2) violates any law or regulation; (3) is defamatory or trade libelous; (4) is harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, intimidating, profane, pornographic, hateful, racially, ethnically or sexually discriminatory or otherwise objectionable in any way or that otherwise violates any right of another; (5) encourages conduct that would violate any conduct prohibited by this Agreement; (6) restricts or inhibits any other user from using the Website; (7) is or amounts to an unsolicited advertisement, promotion, or other form of solicitation; (8) impersonates any person or entity or that directly or indirectly attempts to gain unauthorized access to any portion of the Website or any computer, software, or data of any person, organization or entity that uses or accesses the Website; (9) provides or create links to external sites that violate the Agreement; (10) is intended to harm, exploit, solicit, or collect personally identifiable information of, any individual under the age of 18 («Minor») in any way; (11) invades anyone's privacy by attempting to harvest, collect, store, or publish private or personally identifiable information without their foreknowledge and willing consent or distributes or contains viruses or any other technologies that may harm the Website or any of its users; (12) is copyrighted, protected by trade secret or otherwise subject to third - party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from the rightful owner to post the material and to grant Non-GMO Project all of the license rights granted herein; and / or (13) contains or promotes an illegal or unauthorized copy of another person's copyrighted work.
Non-GMO Project specifically disclaims any and all liability from damages, which may result from accessing any third - party site linked to the Website, or from reliance on any information or content contained in such third - party site.
By using the Website you acknowledge and agree that Non-GMO Project may access, preserve, and disclose your Account Information and any Posted Content associated with that Account if required to do so by law or in a good - faith belief that such access preservation or disclosure is reasonably necessary to: (a) satisfy any applicable law, regulation, legal process or governmental request, (b) enforce this Agreement, including the investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues (including, without limitation, the filtering of spam), (d) respond to user support requests, or (e) protect the rights, property or safety of Non-GMO Project, its users and the public.
Contractual partners who have access to your Personal Data in order to provide services to you on behalf of The Consumer Goods Forum are contractually obliged to keep such information in confidence and may not use these Personal Data for any other purpose.
Security We will take reasonable steps to protect your personally identifiable information as you transmit your information from your computer to our Site and to protect such information from loss, misuse and unauthorized access, disclosure, alteration or destruction in accordance with this Privacy Policy and the Terms of Use.
You may not do any of the following while accessing or using the Services: (i) access, tamper with, or use non-public areas of the Services, fanatix's computer systems, or the technical delivery systems of fanatix's providers; (ii) probe, scan, or test the vulnerability of any system or network or breach or circumvent any security or authentication measures; (iii) access or search or attempt to access or search the Services by any means (automated or otherwise) other than through our currently available, published interfaces that are provided by fanatix (and only pursuant to those terms and conditions), unless you have been specifically allowed to do so in a separate agreement with Fanatix (NOTE: crawling the Services is permissible if done in accordance with the provisions of the robots.txt file, however, scraping the Services without the prior consent of fanatix is expressly prohibited); (iv) forge any TCP / IP packet header or any part of the header information in any email or posting, or in any way use the Services to send altered, deceptive or false source - identifying information; or (v) interfere with, or disrupt, (or attempt to do so), the access of any user, host or network, including, without limitation, sending a virus, overloading, flooding, spamming, mail - bombing the Services, or by scripting the creation of Content in such a manner as to interfere with or create an undue burden on the Services.
In consideration for fanatix granting you access to and use of the Services, you agree that fanatix and its parent, third party providers and partners may place such advertising on the Services or in connection with the display of Content or information from the Services whether submitted by you or otherIn consideration for fanatix granting you access to and use of the Services, you agree that fanatix and its parent, third party providers and partners may place such advertising on the Services or in connection with the display of Content or information from the Services whether submitted by you or otherin connection with the display of Content or information from the Services whether submitted by you or others.
We may access and / or disclose your personal information if we believe such action is necessary to: (a) comply with the law or legal process served on Fantasy Labs; (b) protect and defend the rights or property of Fantasy Labs (including the enforcement of our agreements); or (c) act in urgent circumstances to protect the personal safety of users of Fantasy Labs services or members of the public.
For information on the latest apps that enable you to access streams and for information, help and tips relating to reliable streaming devices such as Kodi, we would suggest you seek help in the dedicated streaming forum on our members» website.
So I guess at the end of the day the best way to protect against online predation is to have an ongoing dialog with your children so that they understand that they can not share too much information and that in fact they have their privacy settings set in such a way that nobody can access any of their online profiles unless they are known to them and they are a real friend.
After completing this training if you are interested in further information regarding bullying, visit the additional resources link to find handy printouts, related articles and access to supplementary bullying prevention websites such as stopbullying.gov and eyesonbullying.org.
After completing this training if you are interested in further information regarding abuse protection, visit the additional resources link to find handy printouts, related articles and access to supplementary abuse websites such as the National Center for Missing & Exploited Kids, Child Help, Centers for Disease Control: Child Maltreatment Prevention and Darkness to Light.
I / we agree that if any material change (s) occur (s) in my / our financial condition that I / we will immediately notify BSHFC of said change (s) and unless Baby Safe Homes Franchise Corporation is so notified it may continue to rely upon the application and financial statement and the representations made herein as a true and accurate statement of my / our financial condition.nI / we authorize Baby Safe Homes Franchise Corporation to make whatever credit inquiries / background checks it deems necessary in connection with this application and financial statement.nI / we authorize and instruct any person or consumer reporting agency to furnish to BSHFC any information that it may have to obtain in response to such credit inquiries.nIn consideration of the ongoing association between Baby Safe Homes and the undersigned applicant (hereinafter u201cApplicantu201d), the parties hereto have entered into this Non-Disclosure and Non-Competition Agreement.nWHEREAS, in the course of its business operations, Baby Safe Homes provides its customers products and services which, by nature of the business, include trade secrets, confidential and proprietary information, and other matters deemed material or important enough to warrant protection; and WHEREAS, Applicant, by reason of his / her interest in Baby Safe Homes and in the course of his / her duties, has access to said secrets and confidential information; and WHEREAS, Baby Safe Homes has trade secrets and other confidential and proprietary information, including procedures, customer lists, and particular desires or needs of such customers to which Applicant has access in the course of his / her duties as an Applicant.nNow, therefore, in consideration of the premises contained herein, the parties agree as follows Applicant shall not, either during the time of his / her franchise evaluation with Baby Safe Homes or at any time thereafter either directly or indirectly, communicate, disclose, reveal, or otherwise use for his / her own benefit or the benefit of any other person or entity, any trade secrets or other confidential or proprietary information obtained by Employee by virtue of his / her employment with Baby Safe Homes, in any manner whatsoever, any such information of any kind, nature, or description concerning any matters affecting or relating to the Baby Safe Homes business, or in the business of any of its customers or prospective customers, except as required in the course of his / her employment by Baby Safe Homes or except as expressly authorized Baby Safe Homes Franchise Corporation, in writing.nDuring any period of evaluation with Baby Safe Homes, and for two (2) years thereafter, Applicant shall not, directly or indirectly, induce or influence, divert or take away, or attempt to divert or take away and, during the stated period following termination of employment, call upon or solicit, or attempt to call upon or solicit, any of the customers or patrons Baby Safe Homes including, but not limited to, those upon whom he / she was directly involved, or called upon, or catered to, or with whom became acquainted while engaged in the franchise evaluation process of a Baby Safe Homes franchise business.
Parenting Ideas collects non-personal information in aggregate form to track data such as (but not limited to), the total number of visits to our Service, the number of visits to specific areas of our Service, the sources of referral to our Service, and devices used to access our Service.
For all visitors that browse on our website, we do collect information such as IP address and access times in order to collect statistics such as products that customers view more often, where customers come from, etc..
EHE advisers do not work in environments where sensitive information relating to families and students can be shared with visitors who are not permitted to have access to such data.
In any country, but particularly in a country such as Bangladesh where antenatal education is minimal, and where access to other sources of information is limited, the messages new mothers get from doctors, nurses and midwives are cruciaIn any country, but particularly in a country such as Bangladesh where antenatal education is minimal, and where access to other sources of information is limited, the messages new mothers get from doctors, nurses and midwives are cruciain a country such as Bangladesh where antenatal education is minimal, and where access to other sources of information is limited, the messages new mothers get from doctors, nurses and midwives are crucial.
In addition to a probable lack of information the reason is twofold and points to Israel: Gazans have been living in an open air prison since 2006 where Israel unilaterally locked them up; Gazans suffer constant shortages, a blockade on all kinds of goods monitored at checkpoints such as Kerem Shalom and are barred from accessing their own maritime enclave; frustration is a euphemism for six years of deprivation and economic meltdowIn addition to a probable lack of information the reason is twofold and points to Israel: Gazans have been living in an open air prison since 2006 where Israel unilaterally locked them up; Gazans suffer constant shortages, a blockade on all kinds of goods monitored at checkpoints such as Kerem Shalom and are barred from accessing their own maritime enclave; frustration is a euphemism for six years of deprivation and economic meltdowin an open air prison since 2006 where Israel unilaterally locked them up; Gazans suffer constant shortages, a blockade on all kinds of goods monitored at checkpoints such as Kerem Shalom and are barred from accessing their own maritime enclave; frustration is a euphemism for six years of deprivation and economic meltdown.
«The Federal Government has a constitutional and statutory obligation to contribute to the eradication of corrupt practices and abuse of power, ensure proper organization and maintenance of all information in its custody in a manner that facilitates public access to such information, and make readily this available to applicants whenever it is sought.»
There are a number of controversial issues surrounding the adoption process, such as the rights of the child to access information on their past, and the issue of parents» rights in adoption proceedings.
However, the UK will have to agree to EU rules on data sharing, subject to ECJ jurisdiction, in order to maintain access to crime databases such as the Schengen information system, which allows police forces to share real - time alerts on suspects, vehicles and firearms.
In order to ensure rural dwellers have increased access to ICT devices such as smartphones, the National Information Technology Development Agency (NITDA) has created an IT Innovation hub, which has the capacity to produce e-literate groups from low skilled or low paid workers, unemployed people, and those with disabilities who do not have access to these ICTs.
«The outcome of the Auriga Project is that astronomers will now be able to use our work to access a wealth of information, such as the properties of the satellite galaxies and the very old stars found in the halo that surrounds the galaxy.»
In addition, at the time of registration for certain services, such as Science Careers Job Alerts, or free partial access to any of the Science Websites, you have the option to elect to receive additional communications, information, newsletters, and promotions relating to topics that may be of special interest to you.
We do not disclose to third parties your personal information, combined personal and demographic information, or information about your use of the Science Websites (such as the areas you visit or the services you access), except as set forth in the following four subparagraphs.
A direct affiliation with the Licensee may include, for example, (a) current employees whether on a permanent, temporary, contract, or visiting basis, but excluding employees at a foreign affiliate or constituent university and (b) individuals who are: (1) officially enrolled as a registered student at the Licensee's institution; (2) authorized to use the library network from within the library premises or from such other places where such persons work or study (including but not limited to offices and homes, halls of residence, and student dormitories) and who have been issued by the Licensee with a password or other authentication method for such use of the library network, but (3) excluding students at a foreign affiliate or constituent university; or (c) walk - in users who are permitted to use Licensee's library or information service and permitted to access the library network but only from computer terminals within the Licensee's library premises («Authorized Users»).
Neither threats of nor actual discrimination based on genetic information should be allowed to impede access to therapies based on the discoveries of such genetic research or the ability and willingness of persons to participate in critical studies.
I have an easy - to - use Filemaker template that I use for just such a database, and any information that I pick up in my daily networking goes directly into that file so that I can access it later.
But I can now get involved in areas that were previously outside my narrow research focus, such as biosafety for capacity development — bringing into the public domain information and recent developments that allow developing countries access to advanced technology so that they can evaluate its effectiveness in a safe and sustainable way.
Others such as Connotea store reference information online, allowing access while scientists travel, and include commentary features such as social bookmarking, which allows a scientist's contacts to read his or her comments in a dedicated feed.
a b c d e f g h i j k l m n o p q r s t u v w x y z