Sentences with phrase «access your personal information stored»

You can request to access your personal information stored by Canadian Cash Solutions at any time.

Not exact matches

Laptops, Personal Digital Assistants (PDAs), and Blackberries (wireless cell phone and PDA units) use wireless data transfer technologies to provide users with almost instant access to information stored on a company's computer networks and servers from just about anywhere within reach of a cell phone tower or wireless Internet transmitter.
If you were storing any access to their sites or personal information, you need to let them know so they, too, can change passwords.
The rise of the Internet and storing personal information online have made it easier for hackers to access your sensitive information.
Transfer of data to other countries Any information you provide to Wellington Management through use of the Site may be stored and processed, transferred between, and accessed from the US and other countries which may not guarantee the same level of protection of personal information as the one in which you reside.
We take steps to protect the security, integrity and confidentiality of the personal information and other sensitive information that we collect, store or transmit, but can not guarantee that inadvertent or unauthorized use or disclosure will not occur or that third parties will not gain unauthorized access to this information despite our efforts.
The actions will serve as settlement for FTC's charges against the ride - hailing company for deceiving customers by failing to monitor the access of Uber employees on personal information of riders and for failing to secure sensitive customer information that is stored in the cloud.
We protect personal information in a number of ways including securely storing paper records, using professional software systems, and password restricted access.
For example, we store the personal information you provide on computer systems with limited access, which are located in controlled facilities.
any unauthorized access to or use of our secure servers and / or any and all personal information stored therein,
(a) errors, mistakes, or inaccuracies of content; (b) personal injury or property damage, of any nature whatsoever, resulting from your access to and use of the Website; (c) any unauthorized access to or use of Science's secure servers and / or any and all personal information stored therein; (d) any interruption or cessation of transmission to or from the Website; (e) any bugs, viruses, trojan horses, or the like which may be transmitted to or through the Website by any third party; and / or (f) any errors or omissions in any content or for any loss or damage of any kind incurred as a result of the use of any content posted, e-mailed, transmitted, or otherwise made available via the Website.
(a) errors, mistakes, or inaccuracies of content; (b) personal injury or property damage, of any nature whatsoever, resulting from your access to and use of the Website; (c) any unauthorized access to or use of Science's secure servers and / or any and all personal information stored therein; (d) any interruption or cessation of transmission to or from the Website; (e) any bugs, viruses, trojan horses, or the like which may be transmitted to or through the Website by any third party; and / or (f) any errors or omissions in any content or for any loss or damage of any kind incurred as a result of the use of any content posted, e-mailed, transmitted, or otherwise made available via the Science Website.
Plus, all of your personal and financial information is safely stored, so no one will be able to access or see what you don't want them to access or see.
This personal electronic allows teachers to store their stuff electronically — with over 1G of cloud storage — allows users to save and access bookmarked information, digital files, media and resources from any computer.
Such parties only have access to the personal information needed to perform these functions and may not use or store the information for any other purpose.
• BlackBerry ® service with access to up to 10 supported business and personal email accounts, plus BlackBerry ® Enterprise Server support for corporate email installations • DataViz Docs To Go ® Premium suite preloaded, for editing Microsoft Word, Excel and PowerPoint files from anywhere • BlackBerry App WorldTM, the official app store for BlackBerry smartphones offering customization, fun and productivity • BlackBerry ® PlaybookTM support with BlackBerry BridgeTM (Bridge is available as a free download on BlackBerry App World) • Near Field Communications (NFC) support for a secure exchange of information between NFC - enabled devices over a very short distance • Augmented Reality using the built - in compass (magnetometer) to support augmented reality applications
IN NO EVENT SHALL EBOOK ARCHITECTS, ITS OFFICERS, DIRECTORS, EMPLOYEES, OR AGENTS, BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES WHATSOEVER RESULTING FROM ANY (I) ERRORS, MISTAKES, OR INACCURACIES OF CONTENT OR SOFTWARE, (II) PERSONAL INJURY OR PROPERTY DAMAGE, OF ANY NATURE WHATSOEVER, RESULTING FROM YOUR ACCESS TO AND USE OF OUR WEB SITE OR SOFTWARE, (III) ANY UNAUTHORIZED ACCESS TO OR USE OF OUR SECURE SERVERS OR SOFTWARE AND / OR ANY AND ALL PERSONAL INFORMATION AND / OR FINANCIAL INFORMATION STORED THEREIN, (IV) ANY INTERRUPTION OR CESSATION OF TRANSMISSION TO OR FROM OUR WEBSITE OR SOFTWARE, (IV) ANY BUGS, VIRUSES, TROJAN HORSES, OR THE LIKE, WHICH MAY BE TRANSMITTED TO OR THROUGH OUR WEB SITE OR SOFTWARE BY ANY THIRD PARTY, AND / OR (V) ANY ERRORS OR OMISSIONS IN ANY CONTENT OR FOR ANY LOSS OR DAMAGE OF ANY KIND INCURRED AS A RESULT OF YOUR USE OF ANY CONTENT POSTED, EMAILED, TRANSMITTED, OR OTHERWISE MADE AVAILABLE VIA THIS WEB SITE OR SOFTWARE, WHETHER BASED ON WARRANTY, CONTRACT, TORT, OR ANY OTHER LEGAL THEORY, AND WHETHER YOU HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The measures and safeguards include limiting access to the data to those persons who need it to complete their work for Oceanhouse Media, using a firewall protected environment, and storing personal information in secure operating environments.
Digit claims it does not store any banking login information and that all personal information is «anonymized, encrypted and securely stored,» but there's still that thought in the back of your mind that someone has access to your bank accounts.
When hackers exploited a flaw in a tool for building web applications to access information stored by Equifax, one of the three major credit bureaus, millions of consumers had personal and financial info exposed.
While this technology is great for keeping family photos and other information accessible, think carefully before storing personal documents that could give a hacker access to your bank accounts and other personal details.
For information on how we collect, store, share, or otherwise use your personal information when obtained in connection with your application for or use of our financial products or services, please see the Privacy Policy associated with that product or service; however this Privacy Statement will apply to our collection, storage, sharing, or use of information from and about you, obtained in connection with your access to and use of our websites and / or mobile applications.
Our PCI DSS compliant platform uses 256 - bit Secure Socket Layer (SSL) encryption to ensure personal information is protected, and all data is stored in highly secure data centers with state - of - the art electronic surveillance and multi-factor access control systems.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
At your request, we will provide you with an opportunity to access and if necessary, correct the personal information that you submitted via the online form and that is stored in our database.
If stored electronically, the information will be protected, and accessed only by authorized personal.
In compliance with the French law dated 6th January 1978 on information technology and data protection, Members have the right to access, query, change, and oppose the use of stored personal information about them for legitimate reasons or, in particular, to oppose commercial prospection.
If you are accessing the Site (s) or Undead Labs Features from outside the United States and the European Union, note that data and personal information you submit will be transferred to and stored in servers in the United States or other countries.
For example, we store any personal information you provide on computer systems with limited access.
In addition to the requirement for public bodies to protect personal information no matter where it is, FIPPA also requires public bodies to ensure that, subject to three exceptions listed in s. 30.1 of FIPPA, personal information is only stored in and accessed from inside Canada.
We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Properties and via 3rd party applications.
The U.S. has challenged the data storage laws of British Columbia and Nova Scotia, saying they do not align with the United States in that they allow personal information collected by governments, such as health records, to be stored on domestic servers to prevent it from being accessed for reasons other than those for which it was collected.
Any party using or accessing the Website («User») is entitled to copy any such information for their own personal use but may not re-publish, store or re-produce any such information in any manner, including without limitation electronic reproduction by «uploading» or «downloading», without the prior written consent of Global Legal Group.
These technologies and applications allow users to communicate, share, request, store and access personal information online in ways not previously imagined.
Intended to harmonize the governance of information that relates to individuals (personal data) across European Union (EU) member states, the GDPR requires greater oversight of where and how personal data — including credit card, banking and health information — is stored and transferred, and how access to it is policed and audited by organizations.
The security of your Personal Information is important to us, and we strive to implement and maintain reasonable, commercially acceptable security procedures and practices appropriate to the nature of the information we store, in order to protect it from unauthorized access, destruction, use, modification, or Information is important to us, and we strive to implement and maintain reasonable, commercially acceptable security procedures and practices appropriate to the nature of the information we store, in order to protect it from unauthorized access, destruction, use, modification, or information we store, in order to protect it from unauthorized access, destruction, use, modification, or disclosure.
The site is also complying with rules about access to stored personal data with a new «access your information» tool, that allows people to find, download and delete Facebook data.
Furthermore, the Plaso app allegedly addresses privacy issues since banks and merchants do not have access to customers» personal details, whilst with NFC this information is stored on - device and can theoretically be retrieved.
You should acknowledge and consent that we shall not be responsible for any claims or expenses, including but not limited to, attorney fees that might arise from the use of our products or services being offered on this website, infringement of your property rights or unauthorized access to your account, personal identity or any information stored on any portion of our website.
Personal information will be stored securely in databases and only accessed by authorised representatives of Career Tip To Go.
Anglicare Victoria takes measures to ensure that your personal information — whether stored in computer systems or within paper files — is securely protected from unauthorised access, loss, misuse, disclosure or alteration.
All personal information that is collected is stored securely and made safe from unauthorised access, loss, misuse, modification or disclosure.
Physical access to areas where Personal Information is gathered, processed, or stored is limited to authorized employees.
a b c d e f g h i j k l m n o p q r s t u v w x y z