Sentences with phrase «unauthorized use or disclosure»

Accordingly, the Parties each agree and acknowledge that any such violation or threatened violation may cause irreparable injury to the Disclosing Party and that, in addition to any other remedies that may be available, in law, in equity, or otherwise, the Disclosing Party shall be entitled (a) to seek injunctive relief against the threatened breach of this Agreement or the continuation of any such breach by the Receiving Party, without the necessity of proving actual damages, and (b) to be indemnified by the Receiving Party from any loss or harm, including but not limited to attorney's fees, arising out of or in connection with any breach or enforcement of the Receiving Party's obligations under this Agreement or the unauthorized use or disclosure of the Disclosing Party's Confidential Information.
Both Parties agree that any unauthorized use or disclosure by the Receiving Party of the Disclosing Party's Confidential Information in a manner inconsistent with the terms of this Agreement may cause the Disclosing Party irreparable damage for which remedies other than injunctive relief may be inadequate.
Receiving Party shall notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information by Receiving Party or its Representatives, or any other breach of this Non-Disclosure Agreement by Receiving Party or its Representatives, and will cooperate with efforts by the Disclosing Party to help the Disclosing Party regain possession of Confidential Information and prevent its further unauthorized use.
We take steps to protect the security, integrity and confidentiality of the personal information and other sensitive information that we collect, store or transmit, but can not guarantee that inadvertent or unauthorized use or disclosure will not occur or that third parties will not gain unauthorized access to this information despite our efforts.
The security standard authority applies to both the transmission and the maintenance of health information, and requires the entities described in section 1172 (a) to maintain reasonable and appropriate safeguards to ensure the integrity and confidentiality of the information, protect against reasonably anticipated threats or hazards to the security or integrity of the information or unauthorized uses or disclosures of the information, and to ensure compliance with part C by the entity's officers and employees.

Not exact matches

Unauthorized use, disclosure or copying of this information or any part thereof is strictly prohibited and may be unlawful.
We secure the Personal Information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Sapphire Ventures uses a combination of industry - standard security technologies, procedures, and organizational measures to help protect your personal data from unauthorized access, use or disclosure.
To the extent permitted by law, we will disclose your information to government authorities or third parties if: (a) required to do so by law, or in response to a subpoena or court order; (b) we believe in our sole discretion that disclosure is reasonably necessary to protect against fraud, to protect the property or other rights of us or other users, third parties or the public at large; or (c) we believe that you have abused the Sites or the Applications by using them to attack other systems or to gain unauthorized access to any other system, to engage in spamming or otherwise to violate applicable laws.
Byrne Dairy secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Although we will use all reasonable efforts to safeguard the confidentiality of any personal information collected, we will not be liable for disclosure of personal information obtained due to errors in transmission or the unauthorized acts of third parties.
Security We will take reasonable steps to protect your personally identifiable information as you transmit your information from your computer to our Site and to protect such information from loss, misuse and unauthorized access, disclosure, alteration or destruction in accordance with this Privacy Policy and the Terms of Use.
Challenge Success secures your personal information from unauthorized access, use or disclosure.
Challenge Success secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
a. Licensee agrees to implement and maintain adequate and effective data security systems and measures, in line with international industry standards and best practice, to protect the security of the Licensed Materials from unauthorized disclosure or use.
We implement reasonable technical and organizational measures designed to secure your personal information from accidental loss and from unauthorized access, use, alteration, or disclosure.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
Although we make good faith efforts to maintain the security of such Personal Information, we can not guarantee that it will remain free from unauthorized access, use, disclosure, or alteration.
Nebraska School Nurses Association secures your personal information from unauthorized access, use or disclosure.
We use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure.
You agree to notify us promptly of any unauthorized use of your account and of any loss, theft or disclosure of your password.
The presentation may contain confidential information and unauthorized use, disclosure, copying, dissemination, or redistribution is strictly prohibited.
Jacaranda Animal Hospital secures your personal information from unauthorized access, use or disclosure.
Jacaranda Animal Hospital secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Accordingly, you transmit information at your own risk and Loving Pets Corporation assumes no responsibility or liability for disclosure of your information due to errors in transmission, unauthorized or illegal access or other causes beyond Loving Pets Corporation reasonable control.Disclosure of Information in Public Areas Personally identifiable information that you disclose in a public area of the Loving Pets Website, such as our share your story, may be collected and used by others who may then send you messages or other communications that you do not want to receive.
Gateway Miniature Schnauzer Club secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
Gateway Miniature Schnauzer Club secures your personal information from unauthorized access, use or disclosure.
Fear Free secures your personal information from unauthorized access, use or disclosure.
Maui Paddle Sports secures your personal information from unauthorized access, use or disclosure.
Maui Paddle Sports secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
To prevent unauthorized access or disclosure, maintain data accuracy and facilitate the appropriate use of information, Telegraph Cove Resort uses physical, technological and administrative procedures to attempt to protect the personally identifiable information we collect through the website.
The Hotel Erwin may monitor and, when we believe in good faith that disclosure is required, disclose information to protect the security, property, assets and / or rights of The Hotel Erwin from unauthorized use, or misuse, of the Site or anything found at the Site.
The Pace Gallery uses reasonable administrative, technical, personnel, and physical measures (a) to safeguard personal information against loss, theft, unauthorized use, disclosure, or modification; and (b) to ensure the integrity of the personal information.
Climate Reality has established appropriate technical, physical, and organization security measures to protect Donors» personal information against loss, theft, unauthorized use, disclosure, or modification.
Stoller Family Estate secures your personal information from unauthorized access, use or disclosure.
Stoller Family Estate secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
The standard in FIPPA is that public bodies must protect personal information by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or disposal.
Lerner and Rowe Injury Attorneys secures your personal information from unauthorized access, use or disclosure.
Those obtaining personally identifiable information and / or personal health information from consumers are still required to use appropriate technical measures to protect it from unauthorized disclosure.
Lerner and Rowe Injury Attorneys secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
These stakeholders say this program is offensive and invasive; areas of concern include unauthorized or unnecessary data collection, use and disclosure of personal information, forensic usage, usage as unique identifier — which can identify a person and his or her day - to - day activities through the linkage of various activities and databases — as well as function creep or biometric information collected being used for different or additional purposes than originally stated by the authorities.
McInnes Cooper uses appropriate security measures to protect against loss, theft, unauthorized access, disclosure, use or modification of personal information.
Colorado Lawyers Helping Lawyers secures the personally identifiable information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use or disclosure.
This includes assisting clients with matters related to the unauthorized access, use or disclosure of health, financial, or personally identifiable information.
The Personal Information Protection and Electronic Documents Act («PIPEDA») requires organizations to take reasonable steps to safeguard the personal information in their custody or control from such risks as unauthorized access, collection, use, disclosure, copying, modification, disposal or destruction.
Remedies for misappropriation of a trade secret under the federal Act include injunctive relief, damages for actual loss caused by the misappropriation, damages for any unjust enrichment caused by the misappropriation of the trade secret that is not addressed in computing damages for actual loss; or in lieu of damages measured by any other methods, the damages caused by the misappropriation measured by imposition of liability for a reasonable royalty for the misappropriator's unauthorized disclosure or use of the trade secret.
In addition, Equal Justice Works may disclose information we maintain (A) if in good faith we believe that such disclosure is necessary to (1) comply with the law or legal process; (2) protect and defend our rights and property; (3) protect against misuse or unauthorized use of the Web site; or (4) protect the personal safety, property, or rights of our users or the public, or (B) in connection with a corporate transaction, such as a divestiture, merger, consolidation, or asset sale.
34 (1) An organization must protect personal information that is in its custody or under its control by making reasonable security arrangements against risks such as unauthorized access, collection, use, disclosure, copying, modification, disposal or destruction.
We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
a b c d e f g h i j k l m n o p q r s t u v w x y z