Sentences with phrase «against unauthorized disclosure»

You are also responsible for taking reasonable steps to protect your personal information against unauthorized disclosure or misuse.
Although we take appropriate measures to safeguard against unauthorized disclosures of information, we can not assure you that personally identifiable information that we collect will never be disclosed in a manner that is inconsistent with this Privacy Policy.
Although we take appropriate measures to safeguard against unauthorized disclosures of information, we can not assure you that personal information that we collect will never be disclosed in a manner that is inconsistent with this Policy.

Not exact matches

To the extent permitted by law, we will disclose your information to government authorities or third parties if: (a) required to do so by law, or in response to a subpoena or court order; (b) we believe in our sole discretion that disclosure is reasonably necessary to protect against fraud, to protect the property or other rights of us or other users, third parties or the public at large; or (c) we believe that you have abused the Sites or the Applications by using them to attack other systems or to gain unauthorized access to any other system, to engage in spamming or otherwise to violate applicable laws.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
Wellness Mama takes reasonable security measures to protect the security and confidentiality of your personal information that we collect and maintain against loss, theft, and misuse, as well as unauthorized access, disclosure, alteration, and destruction.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
The Pace Gallery uses reasonable administrative, technical, personnel, and physical measures (a) to safeguard personal information against loss, theft, unauthorized use, disclosure, or modification; and (b) to ensure the integrity of the personal information.
Climate Reality has established appropriate technical, physical, and organization security measures to protect Donors» personal information against loss, theft, unauthorized use, disclosure, or modification.
Comment 16 to the rule requires a lawyer to «act competently to safeguard information relating to the representation of a client against inadvertent or unauthorized disclosure by the lawyer or other persons who are participating in the representation of the client or who are subject to the lawyer's supervision.»
The standard in FIPPA is that public bodies must protect personal information by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or disposal.
We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Properties and via 3rd party applications.
Ransomware is a choice weapon against legal firms, as attackers understand that firms are highly motivated to protect the confidentiality of their data as well as obligated by ABA Model Rules to make reasonable efforts to prevent disclosure or unauthorized access to client data.
The comments advise that lawyers must «make reasonable efforts» to safeguard client information «against unauthorized access by third parties and against inadvertent or unauthorized disclosure
[16] A lawyer must act competently to safeguard information relating to the representation of a client against inadvertent or unauthorized disclosure by the lawyer or other persons who are participating in the representation of the client or who are subject to the lawyer's supervision.
In Formal Opinion 477, the Ethics Committee went one step further, concluding that «a lawyer may be required to take special security precautions to protect against the inadvertent or unauthorized disclosure of client information when required by an agreement with the client or by law, or when the nature of the information requires a higher degree of security.»
McInnes Cooper uses appropriate security measures to protect against loss, theft, unauthorized access, disclosure, use or modification of personal information.
Such restrictions would protect against, for example, the unauthorized disclosure of information during a workplace - wide feedback or evaluation session.
Accordingly, the Parties each agree and acknowledge that any such violation or threatened violation may cause irreparable injury to the Disclosing Party and that, in addition to any other remedies that may be available, in law, in equity, or otherwise, the Disclosing Party shall be entitled (a) to seek injunctive relief against the threatened breach of this Agreement or the continuation of any such breach by the Receiving Party, without the necessity of proving actual damages, and (b) to be indemnified by the Receiving Party from any loss or harm, including but not limited to attorney's fees, arising out of or in connection with any breach or enforcement of the Receiving Party's obligations under this Agreement or the unauthorized use or disclosure of the Disclosing Party's Confidential Information.
In addition, Equal Justice Works may disclose information we maintain (A) if in good faith we believe that such disclosure is necessary to (1) comply with the law or legal process; (2) protect and defend our rights and property; (3) protect against misuse or unauthorized use of the Web site; or (4) protect the personal safety, property, or rights of our users or the public, or (B) in connection with a corporate transaction, such as a divestiture, merger, consolidation, or asset sale.
The security standard authority applies to both the transmission and the maintenance of health information, and requires the entities described in section 1172 (a) to maintain reasonable and appropriate safeguards to ensure the integrity and confidentiality of the information, protect against reasonably anticipated threats or hazards to the security or integrity of the information or unauthorized uses or disclosures of the information, and to ensure compliance with part C by the entity's officers and employees.
34 (1) An organization must protect personal information that is in its custody or under its control by making reasonable security arrangements against risks such as unauthorized access, collection, use, disclosure, copying, modification, disposal or destruction.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
During the Term of this Agreement, IEC shall establish, implement and maintain commercially reasonable administrative, physical and technical measures that are designed to protect the security and integrity of Customer Data that is provided to IEC by Customer, and that are reasonably appropriate to the risks represented by the processing and nature of the provided Customer Data to be protected, and designed to guard against the accidental or unauthorized access, use, loss or disclosure of Customer Data while it is on IEC's network and systems.
Simply Hired maintains administrative, technical and physical safeguards designed to assist us in protecting the Personal Information we collect against accidental, unlawful or unauthorized disclosure or use or alteration.
Resume Prime deploys various information security technologies in order to protect our information against unauthorized access, alteration, or disclosure.
Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
Wellness Counseling Center takes precautions — including administrative, technical, and physical measures — to safeguard your personal information against loss, theft, and misuse, as well as unauthorized access, disclosure, alteration, and destruction.
a b c d e f g h i j k l m n o p q r s t u v w x y z