Sentences with phrase «unauthorized disclosures in»

Not exact matches

The disclosures signal that the bank's problematic sales practices go further than investors and analysts had expected after Wells Fargo reached a settlement with regulators in September over unauthorized customer accounts.
SEC Chairman Jay Clayton issued a carefully worded statement that left room for later disclosures regarding further damage: «We believe the intrusion did not result in unauthorized access to personally identifiable information (PII), jeopardize the operations of the Commission, or result in systemic risk.»
McCabe was forced out of the FBI earlier this year amid an internal investigation by the Office of Inspector General into his approval of unauthorized disclosures to the media in October 2016 about the bureau's Hillary Clinton email investigation.
The FBI made clear to the court that Steele was not let go as a source because the information he provided was inaccurate but because he made «unauthorized disclosures» to the media in September 2016, according to the Democratic memo.
Sessions said in a statement Friday that a «both the OIG and FBI OPR reports concluded that Mr. McCabe had made an unauthorized disclosure to the news med and lacked candor — including under oath — on multiple occasions.»
The FBI also made clear to the court that Steele was not let go as a source because the information he provided was inaccurate, but because he made «unauthorized disclosures» to the media in September 2016.
McCabe was forced out of the FBI earlier this year amid an internal investigation by the Office of Inspector General into his approval of unauthorized disclosures to the media in October 2016 about the bureau's Hillary Clinton email probe.
a) Steele was suspended and then terminated as an FBI source for what the FBI defines as the most serious of violations — an unauthorized disclosure to the media of his relationship with the FBI in an October 30, 2016, Mother Jones article by David Corn.
Factors that could cause actual results to differ materially from those expressed or implied in any forward - looking statements include, but are not limited to: changes in consumer discretionary spending; our eCommerce platform not producing the anticipated benefits within the expected time - frame or at all; the streamlining of the Company's vendor base and execution of the Company's new merchandising strategy not producing the anticipated benefits within the expected time - frame or at all; the amount that we invest in strategic transactions and the timing and success of those investments; the integration of strategic acquisitions being more difficult, time - consuming, or costly than expected; inventory turn; changes in the competitive market and competition amongst retailers; changes in consumer demand or shopping patterns and our ability to identify new trends and have the right trending products in our stores and on our website; changes in existing tax, labor and other laws and regulations, including those changing tax rates and imposing new taxes and surcharges; limitations on the availability of attractive retail store sites; omni - channel growth; unauthorized disclosure of sensitive or confidential customer information; risks relating to our private brand offerings and new retail concepts; disruptions with our eCommerce platform, including issues caused by high volumes of users or transactions, or our information systems; factors affecting our vendors, including supply chain and currency risks; talent needs and the loss of Edward W. Stack, our Chairman and Chief Executive Officer; developments with sports leagues, professional athletes or sports superstars; weather - related disruptions and seasonality of our business; and risks associated with being a controlled company.
Hackers or individuals who attempt to breach our network security or that of our vendors and partners could, if successful, cause the unauthorized disclosure, misuse, or loss of personally identifiable information or other confidential information, suspend our web - hosting operations or cause malfunctions or interruptions in our networks.
We secure the Personal Information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
To the extent permitted by law, we will disclose your information to government authorities or third parties if: (a) required to do so by law, or in response to a subpoena or court order; (b) we believe in our sole discretion that disclosure is reasonably necessary to protect against fraud, to protect the property or other rights of us or other users, third parties or the public at large; or (c) we believe that you have abused the Sites or the Applications by using them to attack other systems or to gain unauthorized access to any other system, to engage in spamming or otherwise to violate applicable laws.
Byrne Dairy secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Although we will use all reasonable efforts to safeguard the confidentiality of any personal information collected, we will not be liable for disclosure of personal information obtained due to errors in transmission or the unauthorized acts of third parties.
Security We will take reasonable steps to protect your personally identifiable information as you transmit your information from your computer to our Site and to protect such information from loss, misuse and unauthorized access, disclosure, alteration or destruction in accordance with this Privacy Policy and the Terms of Use.
Challenge Success secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
In order to prevent unauthorized access or disclosure, appropriate physical, electronic, and managerial procedures are in place to safeguard and secure the information collected onlinIn order to prevent unauthorized access or disclosure, appropriate physical, electronic, and managerial procedures are in place to safeguard and secure the information collected onlinin place to safeguard and secure the information collected online.
In real terms, these rules which exist in virtually every jurisdiction, include laws and regulations which forbid the unauthorized use of state resources for political purposes, contributions from dubious sources, violation of campaign funding limits as prescribed by enabling laws, the use of money to influence voters and election outcomes, non-disclosure of campaign spending, abuse of media, broadcasting and political advertising rules, and rules on declaration of assets, academic qualifications, health and other disclosures and internal party guidelines and ruleIn real terms, these rules which exist in virtually every jurisdiction, include laws and regulations which forbid the unauthorized use of state resources for political purposes, contributions from dubious sources, violation of campaign funding limits as prescribed by enabling laws, the use of money to influence voters and election outcomes, non-disclosure of campaign spending, abuse of media, broadcasting and political advertising rules, and rules on declaration of assets, academic qualifications, health and other disclosures and internal party guidelines and rulein virtually every jurisdiction, include laws and regulations which forbid the unauthorized use of state resources for political purposes, contributions from dubious sources, violation of campaign funding limits as prescribed by enabling laws, the use of money to influence voters and election outcomes, non-disclosure of campaign spending, abuse of media, broadcasting and political advertising rules, and rules on declaration of assets, academic qualifications, health and other disclosures and internal party guidelines and rules.
a. Licensee agrees to implement and maintain adequate and effective data security systems and measures, in line with international industry standards and best practice, to protect the security of the Licensed Materials from unauthorized disclosure or use.
The requirements are in line with recommendations last year from DOD's Inspector General, who concluded that the agency did not have «adequate processes to identify unclassified export - controlled technology and to prevent unauthorized disclosure to foreign nationals» (Science, 23 April 2004, p. 500).
Therefore, MRQE assumes no responsibility nor any liability for disclosure of your information (personally identifiable or otherwise) due to errors in transmission, unauthorized third - party access or other causes beyond MRQE's reasonable control.
Although we take appropriate measures to safeguard against unauthorized disclosures of information, we can not assure you that personally identifiable information that we collect will never be disclosed in a manner that is inconsistent with this Privacy Policy.
The Children's Internet Protection Act (CIPA), in addition to requiring districts to monitor student use of the Internet and to implement technology protection measures, mandates the development of an Internet safety plan that addresses the unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
CIPSEA is contained in Public Law 107 - 347, Title V. and includes fines and penalties for unauthorized disclosures of information collected under a pledge of confidentiality where the information is designated exclusively for statistical purposes.
Unauthorized disclosure Obviously, the safest way to write about real people is to get their permission in writing.
Legal limitations on your liability for unauthorized transactions are summarized in the «Electronic Funds Transfer (EFT) Disclosures» section.
Inadequate authentication of the identity of a caller could result in an «unauthorized disclosure» of return or return information.
Jacaranda Animal Hospital secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Accordingly, you transmit information at your own risk and Loving Pets Corporation assumes no responsibility or liability for disclosure of your information due to errors in transmission, unauthorized or illegal access or other causes beyond Loving Pets Corporation reasonable control.Disclosure of Information in Public Areas Personally identifiable information that you disclose in a public area of the Loving Pets Website, such as our share your story, may be collected and used by others who may then send you messages or other communications that you do not want to receive.
Gateway Miniature Schnauzer Club secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Maui Paddle Sports secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
The Hotel Erwin may monitor and, when we believe in good faith that disclosure is required, disclose information to protect the security, property, assets and / or rights of The Hotel Erwin from unauthorized use, or misuse, of the Site or anything found at the Site.
Please note that in an effort to prevent the unauthorized disclosure of your PII, you may be asked to provide proof of identity (or other authentication materials) together with the completed access request form.
The climate beat has kind of exploded over the past two weeks, with the normally intense run - up to treaty talks, which begin in Copenhagen on Monday, compounded by the unauthorized disclosure of thousands of e-mail messages and documents suggesting a back story behind efforts to chart the planet's past temperatures.
Appropriate measures will be undertaken when personal information is destroyed in order to prevent access to inadvertent disclosure to any unauthorized parties.
Stoller Family Estate secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
One key recommendation is that data is not just transmitted in encrypted form but rather is stored in an encrypted form in order that a breach of the cloud provider's systems does not result in the unauthorized disclosure of personal information.
Comment 16 to the rule requires a lawyer to «act competently to safeguard information relating to the representation of a client against inadvertent or unauthorized disclosure by the lawyer or other persons who are participating in the representation of the client or who are subject to the lawyer's supervision.»
The standard in FIPPA is that public bodies must protect personal information by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or disposal.
The NCBE claims that the poster violated U.S. copyright laws that protect the exam questions, as well as a warning on the exam that states that «unauthorized disclosure of the contents» can result in criminal penalties, cancellation of test scores or denial of a bar application.
Comment 18 in part (relating to safeguarding information): unauthorized access... does not constitute a violation of paragraph (c) if the lawyer has made reasonable efforts to prevent the access or disclosure.
The changes were based on the American Bar Association's modifications to the Comments of Rule 1.1 respecting Competence (``... a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with technology...») and Rule 1.6 respecting Confidentiality («(c) A lawyer shall make reasonable efforts to prevent the unintended disclosure of, or unauthorized access to, information relating to the representation of a client.»)
Lerner and Rowe Injury Attorneys secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
The early indications from ethics authorities are that storing client data in the cloud does not violate ethics rules, as long as the lawyer took appropriate steps to safeguard the information from inadvertent or unauthorized disclosure.
«In their present state, the impugned sections give the state the ability to arbitrarily protect whatever information it chooses to classify as «secret official» or «official» or unauthorized for disclosure — and to punish by way of a criminal offence those «speakers,» «receivers» and «listeners» who come within that protected sphere.
How can you «make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client» (Rule 1.6 (c)-RRB- if you don't even know when your clients» information is in a web - based service?
Most notably, regarding third - party applications, the Assistant Commissioner determined that Facebook did not have adequate safeguards in place to prevent unauthorized access by application developers to users» personal information, and furthermore was not doing enough to ensure that meaningful consent was obtained from individuals for the disclosure of their personal information to application developers.
[16] A lawyer must act competently to safeguard information relating to the representation of a client against inadvertent or unauthorized disclosure by the lawyer or other persons who are participating in the representation of the client or who are subject to the lawyer's supervision.
In Formal Opinion 477, the Ethics Committee went one step further, concluding that «a lawyer may be required to take special security precautions to protect against the inadvertent or unauthorized disclosure of client information when required by an agreement with the client or by law, or when the nature of the information requires a higher degree of security.»
If you are not the intended recipient, you are notified that you have received this document in error, and that any reading, distributing, copying or disclosure is unauthorized.
a b c d e f g h i j k l m n o p q r s t u v w x y z