Sentences with phrase «access your personal information under»

CSIRO is also subject to the Freedom of Information Act 1984 (Cth) and this operates alongside your right to access your personal information under the Privacy ACT.

Not exact matches

We use commercially reasonable security measures designed to protect against unauthorized access to Personal Information under our control, including physical, electronic and procedural safeguards.
Golubka Kitchen shall endeavor and shall take every precaution to maintain adequate physical, procedural and technical security with respect to its offices and information storage facilities so as to prevent any loss, misuse, unauthorized access, disclosure or modification of the user's personal information under our control.
Boston Parents Paper (and Parenting Media, Inc) shall endeavor and shall take every precaution to maintain adequate physical, procedural and technical security with respect to its offices and information storage facilities so as to prevent any loss, misuse, unauthorized access, disclosure or modification of the user's personal information under our control.
Applicable privacy laws may allow any individual the right to access and / or request the correction of errors or omissions in his or her personal information that is in our custody or under our control.
As per the privacy policies, the app collects your personal details that you provide as well as access information that you provide on other sites which come under the purview of the IAC family.
The longstanding interpretation of the law prohibited anyone not under the direct control of education agencies from access to personal information; even other state agencies.
We may access and / or disclose your personal information if required to do so by law or in the good faith belief that such action is necessary to: (a) conform to the edicts of the law or comply with legal process served on us; (b) protect and defend our rights or property; or (c) act under exigent circumstances to protect the personal safety of our users or the public.
The Trust, the Adviser and the Distributor have each adopted codes of ethics (each a «Code») under Rule 17j - 1 under the 1940 Act that governs the personal securities transactions of their board members, officers and employees who may have access to current trading information of the Trust.
Under the Privacy Act, you have the right to seek access to the records of personal information that Tourism Australia holds about you.
RFID Security, Protect your personal information safe with inside Rfid blocking shield material under frequency 13.56 MH, prevents E-thefts unauthorized access to your privacy
Rocco Forte Hotels reserves the right to decline access to your Personal Information under certain circumstances, as permitted by law.
You agree not to engage in any of the following prohibited activities: (i) copying, distributing, or disclosing any part of the Service in any medium, including without limitation by any automated or non-automated «scraping»; (ii) using any automated system, including without limitation «robots,» «spiders,» «offline readers,» etc., to access the Service in a manner that sends more request messages to the Company servers than a human can reasonably produce in the same period of time by using a conventional on - line web browser (except that Humble Bundle grants the operators of public search engines revocable permission to use spiders to copy materials from Humble Bundle for the sole purpose of and solely to the extent necessary for creating publicly available searchable indices of the materials, but not caches or archives of such materials); (iii) transmitting spam, chain letters, or other unsolicited email; (iv) attempting to interfere with, compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (v) taking any action that imposes, or may impose in our sole judgment an unreasonable or disproportionately large load on our infrastructure; (vi) uploading invalid data, viruses, worms, or other software agents through the Service; (vii) collecting or harvesting any personally identifiable information, including account names, from the Service; (viii) using the Service for any commercial solicitation purposes; (ix) impersonating another person or otherwise misrepresenting your affiliation with a person or entity, conducting fraud, hiding or attempting to hide your identity; (x) interfering with the proper working of the Service; (xi) accessing any content on the Service through any technology or means other than those provided or authorized by the Service; (xii) bypassing the measures we may use to prevent or restrict access to the Service, including without limitation features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (xiii) sell, assign, rent, lease, act as a service bureau, or grant rights in the Products, including, without limitation, through sublicense, to any other entity without the prior written consent of such Products» (defined below) licensors; (xiv) circumventing Service limitations on the number of Products you may purchase, including, without limitation, creating multiple accounts and purchasing a total number of Products through such multiple accounts which exceed the per - user limitations; or (xv) except as otherwise specifically set forth in a licensor's end user license agreement, as otherwise agreed upon by a licensor in writing or as otherwise allowed under applicable law, distributing, transmitting, copying (other than re-installing software or files previously purchased by you through the Service on computers, mobile or tablet devices owned by you, or creating backup copies of such software or files for your own personal use) or otherwise exploiting the Products (defined below) in any manner other than for your own private, non-commercial, personal use.
Under the Privacy Act you have the right of access to, and correction of, personal information we hold.
The Court of Justice of the EU has held that the «examination script» i.e. the answers to examination questions, constitutes the personal information of the student, and therefore it must be made available to the student on request under access to information and privacy laws.
Note that under privacy laws, a physician must have a patient's permission to share personal health information, so consider getting a medical Power of Attorney to access this information.
Please note that in certain circumstances we may withhold access to your personal information where we have the right to do so under current data protection legislation.
Under the proposed Privacy Shield, the U.S. will implement an ombudsperson mechanism through which the ombudsperson will handle complaints of EU individuals regarding unauthorized access of their personal information by national intelligence authorities.
He says the definition of personal data is important to public authorities responding to access requests made under the Freedom of Information Act 2000 (FIA 2000).
(b) the ability of the custodians that are subject to the order made under this subsection to provide individuals with reasonable access to their personal health information;
Identity theft, under 530 PC usually occurs when: a defendant unlawfully gained unauthorized access to a computer's information or someone else's sensitive personal information and used that information for financial or personal gain.
If the attorney is the personal representative under the rule, he may obtain a copy of the protected health information relevant to such personal representation under the individual's right to access.
Additionally, persons that have been the subject of violations of the collection of electronic addresses or accessing a computer system to collect personal information (i.e., email harvesting and use) provisions in s. 7.1 (2) and (3) of PIPEDA in contravention of s. 5 (PIPEDA violations) or has suffered conduct that is reviewable under s. 74.011 of the Competition Act, i.e., been the recipient of false or misleading electronic messages (Competition Act violations), can also apply to a court for justice.
(b) provide an individual notice under subsection (2), if it was not reasonable for the organization to have been satisfied that the personal information that was stolen, lost or accessed in an unauthorized manner would not be used unlawfully.
34 (1) An organization must protect personal information that is in its custody or under its control by making reasonable security arrangements against risks such as unauthorized access, collection, use, disclosure, copying, modification, disposal or destruction.
European Union residents seeking access to their entire troves of personal information under privacy law suggest (and some have found) this includes items marked for deletion.
For example, we may be forced to disclose information to the government or third parties under certain circumstances, third parties may unlawfully intercept or access transmissions or private communications, or Users may abuse or misuse your personal information that they collect from the Site.
You may not access or correct personal information of others unless you have been authorised by their express consent or otherwise under law, or unless they are your dependants under 16 years of age.
STUDENT authorizes the SCHOOL OWNER to utilize biometric voice authentication and authorizes access to personal information under the condition that it be used for the exclusive purpose of student validation.
Under GDPR, people who have consented to their personal data being processed also have a suite of associated rights — including the right to access data held about them (a copy of the data must be provided to them free of charge, typically within a month of a request); the right to request rectification of incomplete or inaccurate personal data; the right to have their data deleted (another so - called «right to be forgotten» — with some exemptions, such as for exercising freedom of expression and freedom of information); the right to restrict processing; the right to data portability (where relevant, a data subject's personal data must be provided free of charge and in a structured, commonly used and machine readable form).
That would not necessarily mean that companies would be under obligation report every personal data leak, but that they will have to employ measures to prevent manipulation techniques from gaining access to personal information, and if such techniques are occasionally successful, that they notify users and consumers in due course, and that appropriate legal action is authorized to ensure compliance.
How do I handle requests for such references?Thank you so much for your help!CherylCHERYL M. EARLE3407 Old Dobbin Road, Montgomery, Alabama 36116 - 1903Home Phone: 334-215-3706 Cell Phone: 334-233-2631 Fax: 334-273-0477 E-mail: [email protected] position managing legal discovery and document review with opportunity to assist attorneys with civil litigationBAR ADMISSIONAlabama State Bar, 1999LAW - RELATED EXPERIENCELaw Firm, AlabamaResearch Attorney for Special Projects, Mass Torts Department, November 2001 — February 2008 • Managed Multi-District Litigation (MDL) Document Depository (September 2002 to February 2008) o Reviewed more than 1 million pages of evidentiary documents for litigation purposes and for inclusion in electronic databaseso Coordinated document review assignments with attorneys at local depository and at other sites across the USo Retrieved, reviewed and coded documents in Concordance and Summation legal databaseso Prepared memoranda and spreadsheets providing detailed analysis of discovery materials • Aided attorneys and support staff with processing and preparation of personal injury claims and litigationo Conducted legal research and drafted pleadingso Conducted supplementary online research for additional documents and information pertinent to litigationo Assisted with preparation of correspondence to clients and referring attorneyso Contacted clients for additional information needed in case preparation, litigation, and potential settlementso Prepared and input case intakes and referrals into databaseLaw School, AlabamaStudent Intern, Alabama Disabilities Advocacy Program (ADAP), August 1996 — June 1997 • Participated in law school clinical program under third - year law student practice rule (as authorized by Alabama Supreme Court) o Assisted attorneys and advocates in cases involving mentally ill patients confined to state mental health facilitieso Interviewed clients in person (at state facilities) and over the phoneo Worked with clients, attorneys, and social workers to investigate and resolve issues concerning involuntary confinement and treatmento Aided in legal research on an appellate brief submitted to the U. S. Court of Appeals for the Eleventh Circuit (ruling granted in favor of our client) Faculty Research Assistant for Library Services, Bounds Law Library, March 1996 — June 1997 • Prepared research and teaching materials for law school faculty; worked 20 hours per week while matriculating 10 - 15 hours per semester) o Investigated copyright issues related to procuring and reproducing texts for academic useo Conducted legal research using WESTLAW, LEXIS and the InternetADDITIONAL RELEVANT EXPERIENCEManufacturing Company (MC), Montgomery, AlabamaAdministrative Assistant and Cost Analyst, Materials Purchasing Department, April 1999 — September 2001 • Assisted materials buyers in negotiating and preparing commodities contracts between raw materials suppliers and MC for manufacturing plants in the US and Mexicoo Assisted Legal Department at MC's corporate headquarters with coordination and preparation of documents for litigationo Notified and educated suppliers about MC's freight - on - board policy and its corresponding Uniform Commercial Code (UCC) provisions; result was the reduction of freight claims for both the company and its supplierso Prepared contracts and purchase orders for raw materials and capital projects involving plant maintenanceo Solicited price quotations from current vendors and established Excel spreadsheet format which simplified quote submission process and allowed MC to track and compare usage volumes and costs over timeo Prepared and analyzed cost reports used by materials buyers and production planners in purchasing decisions, including cost reductions, materials consolidation, and selection of vendorso Acted as liaison between vendors and the Purchasing, Transportation and Accounting Departments on issues concerning inbound freight, commercial carriers, and payment terms for commodities, resulting in reductions in freight costs and greater payment discounts for raw materialso Established online databases and printed directories for the Purchasing Department, allowing buyers to have easier and faster access to current vendor informationo Completed Year 2000 (Y2K) compliance project, which involved data collection and communication with MC's past, present, and potential materials suppliers and service providersNot - For - Profit Organization, AlabamaAdministrative Assistant, Combined Federal Campaign, September 1998 — January 1999 • Aided Campaign Director with 1998 Federal Campaigns (CFCs) in City 1 and City 2, which together generated nearly $ 700,000 for more than 1,000 local, national and international charitieso Prepared weekly reports on donations using WordPerfect, Microsoft Word, Excel and dBase IVo Wrote script for Talent Showcase at City 1's 1998 CFC Kickoffo Assisted Director with merger of the City 1 and City 2 CFCs in 1999Regional Bank, AlabamaAdministrative Assistant, Year 2000 (Y2K) Department, March — June 1998 • Worked with Vice President of Corporate Projects on short - term project for the bank's Y2K Departmento Analyzed and processed data on Y2K readiness for all branches of Bank throughout the southeastern USo Organized meetings for personnel of Banko Communicated with vendors of computer hardware, software, and office equipment to request information on Y2K complianceo Prepared compliance files for Federal Reserve auditso Prepared in - house memoranda and reports using Microsoft Word and ExcelRecord / Music Promotion Company, AlabamaRecord Pool Co-Founder; Office Manager, September 1990 — December 1991 • Co-founded record pool to enhance promotion of music in Alabama and the southeastern USo Procured and distributed records from major and independent labels for club, radio and mobile disc jockeyso Coordinated jointly sponsored promotional events with record companies, radio stations and clubso Designed, wrote, and published bi-weekly reports and brochures to inform the music industry of the progress and popularity of music and performers in the region, with specific focus on the Alabama music sceneMajor University, AlabamaGraduate Research Assistant, AUM Department of Marketing, June 1989 — August 1990 • Worked 13 - 20 hours per week as a research assistant to Marketing faculty while carrying a full course load in the MBA programo Analyzed consumer surveys used in academic researcho Assisted Conference Chairperson with coordination for Atlantic Marketing Association (AMA) annual meeting (October 1989) o Co-authored five - year index and classification of AMA Proceedings (published Fall 1991) EDUCATIONLaw School, AlabamaJuris Doctor (JD), 1997 • Scholarshipso Seybourn H. Lynne Scholarship, 1996 - 97o Dexter C. Hobbs Memorial Scholarship, 1995 - 96o E. W. Godbey Memorial Scholarship, 1994 - 95 • Honorso Who's Who Among American Law School Students, 1996 - 94o Arthur Davis Shores Award, 1997 • Activitieso Frederick Douglass Moot Court Team Manager, 1996 - 97 Southern Regional Competition, Second Place National Competition, Eighth Placeo John A. Campbell Moot Court Competition, Spring 1996o Black Law Students Association Delegate, BLSA National Convention, 1997 Co-Chairperson, Public Relations Committee, 1996 - 97 Chairperson, Public Relations Committee, 1995 - 96 BLSA President's Award, 1996 and 1997o American Bar Association, 1996 - 97 Entertainment and Sports Industries Forum Intellectual Property Section Law Student Divisiono LAWS Student Group Leader, 1995 - 96Major University, AlabamaMaster of Business Administration (MBA), 1990Bachelor of Science in Business Administration (B.S.B.A.), 1988 (Major: Marketing — Advertising and Promotion Track) • Honorso Dean's List • Activitieso National Student Advertising Competition Team, 1988 - 90 Seventh District Competition: Third Place, 1990o Marketing Club, 1987 - 90 Vice President — Career Development, 1988 - 89o Public Relations / Advertising (PR / AD) Club, 1988 - 90 Charter Member, 1988 Active in fund - raising and membership driveso Theater Guild, 1988 - 90 Screening Committee, 1989REFERENCESAvailable upon request
facilitate access to open period Commonwealth records in the custody of Australian Archives relating to Aboriginal people, including records or information which would otherwise be exempt under s. 33 (1)(g) of the Archives Act 1983 [that is, unreasonable disclosure of the personal affairs of an individual].
Twitter happens to be one of the sites that doesn't use age - screening mechanisms, meaning that kids under 13 who access Twitter via your site might input personal information, which would violate COPPA.
a b c d e f g h i j k l m n o p q r s t u v w x y z