Sentences with phrase «use of your personal information as»

By visiting a Kraft Heinz Foodservice (Canada) website or participating in Kraft Heinz Foodservice (Canada) activities you consent to the collection and use of your personal information as described in this Privacy Promise.
YOUR CONSENT When You choose to provide us with Your personal information You consent to the use of Your personal information as identified in this Policy and as may be further identified at the time of collection.
By using our Website, you consent to our collection and use of your personal information as described in this Privacy Policy.
By using our Site you consent to our collection and use of your personal information as described in this Privacy Policy.

Not exact matches

Use of Name and Likeness: By posting User Content on the online services, you consent to the recording, use and reuse by NBCUniversal, its licensees, successors and assigns, of your voice, actions, likeness, name, appearance, profile photograph, performance, biographical material, and any other identifying information, including, without limitation, any information contained in your User Content (collectively, «Personal Elements»), as used, edited, altered, fictionalized or modified by NBCUniversal, in its sole discretion, in any and all media now known or hereafter devised, throughout the world, in perpetuity, including, without limitation, in and in connection with NBCUniversal, or related Sites or online services, in and in connection with any television programs and other productions, and in and in connection with advertising, promotion and publiciUse of Name and Likeness: By posting User Content on the online services, you consent to the recording, use and reuse by NBCUniversal, its licensees, successors and assigns, of your voice, actions, likeness, name, appearance, profile photograph, performance, biographical material, and any other identifying information, including, without limitation, any information contained in your User Content (collectively, «Personal Elements»), as used, edited, altered, fictionalized or modified by NBCUniversal, in its sole discretion, in any and all media now known or hereafter devised, throughout the world, in perpetuity, including, without limitation, in and in connection with NBCUniversal, or related Sites or online services, in and in connection with any television programs and other productions, and in and in connection with advertising, promotion and publiciuse and reuse by NBCUniversal, its licensees, successors and assigns, of your voice, actions, likeness, name, appearance, profile photograph, performance, biographical material, and any other identifying information, including, without limitation, any information contained in your User Content (collectively, «Personal Elements»), as used, edited, altered, fictionalized or modified by NBCUniversal, in its sole discretion, in any and all media now known or hereafter devised, throughout the world, in perpetuity, including, without limitation, in and in connection with NBCUniversal, or related Sites or online services, in and in connection with any television programs and other productions, and in and in connection with advertising, promotion and publicity.
Though the FBI did not recommend charges against Clinton for mishandling classified information, Comey was blisteringly critical of her decision to use a personal email account and private internet server during her four years as secretary of state.
Hackers have been known to find general information about an individual online — we do, after all, share everything about ourselves on social media — and use this information to manipulate employees of companies, such as banks, to disclose personal and sensitive information.
Adding in information from personal assistants such as Google Assistant and Android cell phone movement and use, Google can map much of a person's activity throughout the day.
com for business use and for online activities that require the disclosure of personal information such as shopping or banking.
Of course, it'll be a great recruitment tool for the company; the more data women enter about their reproductive cycles — and Glow gets personal: It asks about the sexual positions couples use while attempting to conceive, for example — the better Glow will work as Levchin, Huang, and the team apply machine - learning to the information to develop a deeper understanding of how to advise future users on how and when to conceivOf course, it'll be a great recruitment tool for the company; the more data women enter about their reproductive cycles — and Glow gets personal: It asks about the sexual positions couples use while attempting to conceive, for example — the better Glow will work as Levchin, Huang, and the team apply machine - learning to the information to develop a deeper understanding of how to advise future users on how and when to conceivof how to advise future users on how and when to conceive.
GDPR is likely to hurt profit at Facebook because it could reduce the value of ads if the company can not use personal information as freely and the added expense of hiring lawyers to ensure compliance with the new law.
Some areas of the Site however, such as registration forms, questionnaires and submissions to our Careers section require you to provide accurate and up to date personal information and your choice is to not use such areas and features.
In the wake of revelations that the personal information of as many as 87 million Facebook users was used by data analysis firm Cambridge Analytica in 2016 for political purposes, reports indicate Facebook will contribute raw, anonymized data to a new Social Data Initiative via what is described as an independent, transparent and peer — reviewed process.
Transfer of data to other countries Any information you provide to Wellington Management through use of the Site may be stored and processed, transferred between, and accessed from the US and other countries which may not guarantee the same level of protection of personal information as the one in which you reside.
No such measure is ever 100 % effective though, so we do not guarantee that your personal and other information will be secure from theft, loss, or unauthorized access or use, and we make no representation as to the reasonableness, efficacy, or appropriateness of the measures we use to safeguard such information.
Web site security and restrictions on use As a condition to your use of Services, you agree that you will not, and you will not take any action intended to: (i) access data that is not intended for you; (ii) invade the privacy of, obtain the identity of, or obtain any personal information about any other user of this web site; (iii) probe, scan, or test the vulnerability of this web site or Wellington Management's network or breach security or authentication measures without proper authorization; (iv) attempt to interfere with service to any user, host, or network or otherwise attempt to disrupt our business; or (v) send unsolicited mail, including promotions and / or advertising of products and services.
Personal Branding Blog makes no representations as to accuracy, completeness, currentness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.
We require that these Outside Contractors agree to (1) protect the privacy of your personal information consistent with this Privacy Policy, or the Data Protection Amendment and (2) not use or disclose your personal information for any purpose other than providing us with the products or services for which we contracted or as required by law.
MaRS may also disclose some of your personal information (such as your gender, age, location and interests) to the providers of targeted advertising services to help adjust the advertisements to your preferences; however, in that case, MaRS will contractually obligate the service providers to maintain the security of your information and only use it for the purpose of targeting MaRS's ads to you.
User is solely responsible for verifying the information as being appropriate for user's personal use, including without limitation, seeking the advice of a qualified professional regarding any specific financial questions a user may have.
Identity theft is committed when someone steals your personal information — such as your name, Social Security number, and date of birth — typically to hijack your credit and use it to open up new credit accounts.
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry ® World ™; risks related to the collection, storage, transmission, use and disclosure of confidential and personal information; BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry.
Help Scout complies with the EU-U.S. Privacy Shield Framework and the Swiss - U.S. Privacy Shield Framework as set forth by the US Department of Commerce regarding the collection, use, and retention of personal information from European Union and Switzerland to the United States, respectively.
Shi described to me how personal banking and credit information «is being used as part of the anti-corruption campaign to identify the networks of corrupt officials», who in China often hide their graft — whether it's property or cash — by putting it in the names of friends or family.
As increasing amounts of personal, business, and other forms of information are collected, firms are using computers to harness this data, and are creating machine - learning predictive software for various purposes, including helping consumers make better buying decisions.
Web site Security As a condition to your use of this Web site, you agree that you will not, and you will not take any action intended to: (i) access data that is not intended for you; (ii) invade the privacy of, obtain the identity of, or obtain any personal information about any other user of this Web site; (iii) probe, scan or test the vulnerability of this Web site or MFS» network or breach security or authentication measures without proper authorization; (iv) attempt to interfere with service to any user, host or network or otherwise attempt to disrupt our business; or (v) send unsolicited mail, including promotions and / or advertising of products and services.
As always how and when to use the information as given by the indicator as an indication of future price development is a matter of personal trading system, preference and experiencAs always how and when to use the information as given by the indicator as an indication of future price development is a matter of personal trading system, preference and experiencas given by the indicator as an indication of future price development is a matter of personal trading system, preference and experiencas an indication of future price development is a matter of personal trading system, preference and experience.
That was a very interesting read many comments caught my attention I've recently been diagnosed with Bipolar I have hallucinations and hear voices in my ear's when I hallucinate it's likes they are trying to get me thousands of them I can only describe them as dark shadows and they are trying to get me just as they are about to get me a brilliant white light surrounds me and there's three entities humanly shaped but like this brilliant white light they are also glowing this brilliant whiteness I can't understand what they are saying the only way I can explain it is emotions comfort joy love is what I feel emanating from these entities the voices I hear aren't evil telling me to do bad things to people when I get put into a mode of fear I live in a rough area of Scotland and everytime I've got into a fight something possesses me I know this for a fact as I can't control myself I'm an observer watching my family / Friends say I change they say my eyes change and I look evil I personally do think possibly through my own personal experience I» am possessed as I act out of character I've lost interest in many things I've recently I decided it's time for change I've lost my faith I've been trying to connect with God and feel his love which I used to feel the presence of the holy spirit everytime I try connect I get a feeling of abandonment I just think if I am possessed could these entities stop me connecting with «God» I can say from my heart of hearts «JESUS CHRIST HAS COME IN THE FLESH» I think it's more to do with the persons own personal fears which I have noticed my fears have changed if I had to be truthfully with myself I fear God which I know I'm not supposed to just I can't explain it I guess if you ever need a test subject I'm up for the challenge like I said I'm on journey to find myself and my travels have brought me hear I'm going to hang around for a wee while there's lots of good information to be plundered loll
In a church, as in a marriage, we aspire to be the sort of people who know a great deal of very personal information about one another without using that information to destroy one another.
We all have our biases and personal health journey — this kind of exchange of information the internet offers can be used as way to grow and learn.
By using our web site, you consent to the collection and use of your personal information by Atlantic Coca - Cola Bottling Company as explained below.
By using the Site, you agree to the collection, use, and disclosure of your personal information as described in this Privacy Notice.
Those third parties shall be strictly prohibited from making use of your personal information, other than to deliver those services which you requested, and as such they are thus required in accordance with this agreement to maintain the confidentiality of all your information.
When personal information (such as a credit card number) is transmitted to other Web sites, it is protected through the use of encryption, such as the Secure Socket Layer (SSL) protocol.
Although many will suggest that Robson has a personal vendetta of sorts aimed squarely at the Grinch who stole soccer, that doesn't make his words any less truthful... such tactics are nothing new... in the U.S.this business practice has become so common that even the players regularly use the media to manipulate public opinion (LeBron James did likewise to rally public support for himself and away from his teammate, Kyrie Irving, who has asked to be traded)... whether for contract leverage or to rally support for or against certain players, this strategy can be incredibly effective at times, but when it misses the mark it can be dangerously divisive... for a close - to - the - vest team like Arsenal to use such nefarious means to manufacture a wedge between the fans and it's best player (again), is absolutely despicable... for the sanctimonious higher - ups who demand that it's players adhere to a certain protocol regarding information deemed «in house» or else to intentionally spread «fake» news or to provide certain outlets with privileged information for such purposes is pretty low indeed... no moral high ground here, just a big club pretending to be a small club so that they can continue to pull the wool over the eyes of a dedicated, albeit somewhat naive, fan base... so not only does this club no give a shit about it's fans, this clearly shows that clubs primary interests aren't even soccer related... for all intent and purposes Kroenke doesn't care if we're a soccer club or a tampon factory as long as we continue to maximized his investment... stay woke people... great to see more and more people commenting on the state of the franchise... this club needs to be held accountable for it's actions
When personal information (such as a credit card number) is transmitted to other websites, it is protected through the use of encryption, such as the Secure Socket Layer (SSL) protocol.
Also, as mentioned above, we may correlate your personal information with automatically collected information through the use of backend analytical tools.
What I liked best about this format for presenting information was the «360 degree» perspective it offered: Casey gave the issue a framework, with useful advice on how to persuade principals and administrators to implement in - classroom breakfast programs; Nora followed, sharing her personal story with using free / reduced programs when her children were young, and stressing the importance of taking care of «the whole child»; Rosario charmed the crowd with her experiences implementing in - classroom breakfast in her district, sharing a story about how excited her kids got about breakfast after a power outage — not how excited they were about the return of electricity, but about getting breakfast; Barry inspired the group by explaining how he took his successes as a school food director as a springboard to a new career as a consultant, replicating and spreading that success in other classrooms.
We will collect and use of personal information solely with the objective of fulfilling those purposes specified by us and for other compatible purposes, unless we obtain the consent of the individual concerned or as required by law.
This document outlines the types of personal information we receive and collect when you use homemade-baby-food-recipes.com, as well as some of the steps we take to safeguard information.
By submitting information to us you acknowledge, consent and agree that United Way of the Southern Tier, Inc., may access, read, preserve and disclose the personal information you provide to us as a donor, along with your usage history, submitted messages or data and similar information regarding your use of the website in order to: (a) comply with any applicable law, regulation, legal process, or governmental request; (b) detect, prevent, or otherwise address fraud, security, or technical issues; (c) respond to your requests for customer service; (d) protect the rights, property, or personal safety of United Way of the Southern Tier, Inc., its visitors, or the public, (e) where we sell any or all our business assets; or (f) as otherwise set forth herein.
By imposing third - party reporting of expenses, a VAT system reduces tax evasion relative to a self - reported income tax system like that used in the U.S. where the IRS periodically audits business expenses, but there is widespread abuse in the area of business expenses (especially in small businesses that often treat what should be considered personal expenses as business expenses) due to a lack of third - party reporting of business expenses the way that it has third - party reporting of business income via 1099 information tax returns.
This policy will pertain to all personal web pages or internet sites where there is any reference to the Buffalo Police Department, to ensure employees use appropriate discretion in the use of references to the Buffalo Police Department so as not to discredit the Department; to ensure that the release of information concerning crimes, accidents, or violations of ordinances or statues to persons outside the Department is not disseminated, either directly or indirectly; and that all employees treat as confidential the official business of the Department.
Cyber-bullying (cyberbullying, online bullying) is the use of electronic information and communication devices such as e-mail, instant messaging, text messages, mobile phones, pagers and defamatory websites to bully or otherwise harass an individual or group through personal attacks or other means, and it may constitute a computer crime.
(a) errors, mistakes, or inaccuracies of content; (b) personal injury or property damage, of any nature whatsoever, resulting from your access to and use of the Website; (c) any unauthorized access to or use of Science's secure servers and / or any and all personal information stored therein; (d) any interruption or cessation of transmission to or from the Website; (e) any bugs, viruses, trojan horses, or the like which may be transmitted to or through the Website by any third party; and / or (f) any errors or omissions in any content or for any loss or damage of any kind incurred as a result of the use of any content posted, e-mailed, transmitted, or otherwise made available via the Website.
To measure risky online self - presentation the research team, which also included PhD student Clara Cutello, Dr Michaela Gummerum and Professor Yaniv Hanoch from the School of Psychology, designed a risk exposure scale relating to potentially inappropriate images or texts, such as drug and alcohol use, sexual content, personal information, and offensive material.
(a) errors, mistakes, or inaccuracies of content; (b) personal injury or property damage, of any nature whatsoever, resulting from your access to and use of the Website; (c) any unauthorized access to or use of Science's secure servers and / or any and all personal information stored therein; (d) any interruption or cessation of transmission to or from the Website; (e) any bugs, viruses, trojan horses, or the like which may be transmitted to or through the Website by any third party; and / or (f) any errors or omissions in any content or for any loss or damage of any kind incurred as a result of the use of any content posted, e-mailed, transmitted, or otherwise made available via the Science Website.
We do not disclose to third parties your personal information, combined personal and demographic information, or information about your use of the Science Websites (such as the areas you visit or the services you access), except as set forth in the following four subparagraphs.
Please remember that if you post any of your personal information in public and / or Social Network areas of the Science Websites, such as in online forums or chat rooms, such information may be displayed to other users of these services and may be collected and used by others over whom we have no control.
I would divide distance education via the World Wide Web into three categories, each of which incorporates the previous category: The Web can be used as an electronic textbook to disseminate information for users to read (my own personal Web site is a good example); as an electronic textbook with quizzes, which also fosters interactions between the user and the machine, typically in the form of multiple - choice or true / false tests; and as an electronic conference, which goes beyond the electronic textbook to foster interactions between users and teachers.
a b c d e f g h i j k l m n o p q r s t u v w x y z