Sentences with phrase «used by collection»

And finally, they're used by collection agencies to assist with their debt collection efforts.
During his 12 years in the industry, Mark witnessed many tactics used by collection agencies to get people to pay up....

Not exact matches

Taught by Kevin Hartman, Head of Industry at Google, this free marketing course on «Digital Analytics» focuses on the specific data collection, analysis and visualization techniques used by the world's top brands.
Big Data While the definitive source of the term big data — which is used describe a collection of analytics that companies use to predict customer behavior — is a little fuzzy, according to some digging done by New York Times reporter Steve Lohr, the person responsible for its popularization is a man named John Mashey, a computer scientists who was VP and chief scientist at company called Silicon Graphics in the early 1990s and 2000s.
By creating four engaging video advertisements and using influencers, such as Tyler Posey, Hannah Simone, Jana Kramer and Peyton List, the company was able to reach over 12 million customers across the world with its new collection.
MoviePass has responded to the backlash by removing some data collection capabilities it isn't currently using, and says «our members will always have the option to choose the location - based services that are right for them today and in the future.»
You can not outsource its collection, analysis or delivery,» said Bhakhri, whose employer EOG has been dubbed «the Apple of oil» by analysts because of its use of in - house technology and data analytics.
And Facebook's restrictions on the collection and use of personal information by applications are simply inadequate.
Practices regarding the collection, use, storage, transmission and security of personal information by companies operating over the Internet have recently come under increased public scrutiny.
The order does not call on regional authorities to shut down mining operations directly, but instead to put the squeeze on them by strictly enforcing policies on electricity consumption, land use, tax collection and environmental regulation.
This form is to be used by employers and / or taxpayers to report essential information for the collection and distribution of Local Earned Income Taxes (EIT) and must be used by employers when a new employee is hired or if a current employee has a name and / or address change.
In his view the company also needs to create systems to audit third party data collection and sharing «on an ongoing basis» — and thereby «hold third parties to their promises by engineering controls and contractual lockups» — including «effective remedies when third parties break the rules — including enforceable rights to audit, retrieve, delete and destroy data improperly acquired or used, and liquidated and actual damages for violations».
May 2008 — a complaint is filed with the Privacy Commissioner of Canada concerning the «unnecessary and non-consensual collection and use of personal information by Facebook».
By using this website, you agree to the collection, use and disclosure of your personal information in accordance with our Privacy Policy.
To formalize our conduct governing the collection, use and disclosure of our clients» personal information, we have adopted the following Privacy Principles (the «Principles») that will enable us to comply with the legislation passed by both the provincial and federal governments.
If you are a user accessing this Site from any region with regulations or laws governing personal data collection, use and disclosure, that differ from United States laws / regulations, please note that through your continued use of this Site, which is governed by U.S. Law, this Privacy Statement, and our Terms of Use, you are transferring Personal Information to the United States and you consent to that transfuse and disclosure, that differ from United States laws / regulations, please note that through your continued use of this Site, which is governed by U.S. Law, this Privacy Statement, and our Terms of Use, you are transferring Personal Information to the United States and you consent to that transfuse of this Site, which is governed by U.S. Law, this Privacy Statement, and our Terms of Use, you are transferring Personal Information to the United States and you consent to that transfUse, you are transferring Personal Information to the United States and you consent to that transfer.
BY USING OUR WEBSITES, YOU CONSENT TO THE COLLECTION AND USE OF INFORMATION AS SET FORTH IN THIS STATEMENT.
«The benefits of this high quality data accrue to the rural focused initiatives deployed by governments, by corporates for their brand of products and services, by non profits who want to understand the needs of their target groups, etc.» he shared while describing the use of such data collection.
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry (R) World (TM); risks related to the collection, storage, transmission, use and disclosure of confidential and personal information;
During the House committee hearing on Wednesday, Zuckerberg claimed not to know what «shadow profiles» are, even though this term has been used for years to describe Facebook's collection of data about people who don't use its services by harvesting the inboxes and smartphone contacts of active Facebook users.
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry ® World ™; risks related to the collection, storage, transmission, use and disclosure of confidential and personal information; BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry.
Of course it is not the only data generated by messaging: entailed in the ease - of - use that comes from relying on centralized servers for key exchange is the necessary collection by those servers of metadata.
Help Scout complies with the EU-U.S. Privacy Shield Framework and the Swiss - U.S. Privacy Shield Framework as set forth by the US Department of Commerce regarding the collection, use, and retention of personal information from European Union and Switzerland to the United States, respectively.
Not merely a collection of good ideas, this book spells out the 67 timeless principles and practices used by the world's most successful men and women — proven principles and strategies that can be adapted for your own life, whether you want to be the best salesperson in your company, become a leading architect, score top grades in school, lose weight, buy your dream home, make millions, or just get back in the job market.
By using our Site you agree to the collection and use of your information in accordance with this policy.
Specifically, Defendants made false and / or misleading statements and / or failed to disclose that: (i) the Company was engaged in predatory lending practices that saddled subprime borrowers and / or those with poor or limited credit histories with high - interest rate debt that they could not repay; (ii) many of the Company's customers were using Qudian - provided loans to repay their existing loans, thereby inflating the Company's revenues and active borrower numbers and increasing the likelihood of defaults; (iii) the Company was providing online loans to college students despite a governmental ban on the practice; (iv) the Company was engaged overly aggressive and improper collection practices; (v) the Company had understated the number of its non-performing loans in the Registration Statement and Prospectus; (vi) because of the Company's improper lending, underwriting and collection practices it was subject to a heightened risk of adverse actions by Chinese regulators; (vii) the Company's largest sales platform and strategic partner, Alipay, and Ant Financial, could unilaterally cap the APR for loans provided by Qudian; (viii) the Company had failed to implement necessary safeguards to protect customer data; (ix) data for nearly one million Company customers had been leaked for sale to the black market, including names, addresses, phone numbers, loan information, accounts and, in some cases, passwords to CHIS, the state - backed higher - education qualification verification institution in China, subjecting the Company to undisclosed risks of penalties and financial and reputational harm; and (x) as a result of the foregoing, Qudian's public statements were materially false and misleading at all relevant times.
Recently a collection of interested parties is calling for banning the use of the term «advisor» by anyone who is not a «practicing» fiduciary.
We're expanding the number of resources available in our API, but not at the cost of increasing complexity — we're making everything available using familiar REST principles, with each resource uniquely identified in its collection by a single resource identifier (an URI) and interactable via standard HTTP verbs, GET, POST, PUT, and DELETE.
That, as it turns out, is the number reported by a New York Times story on Facebook and Cambridge Analytica published Saturday, citing documents and people familiar with the collection and use of the data.
By using this website, you consent to the collection and use of the information as described herein.
RFID tags are primarily used for electronic toll collection, but it could be used by the government to track any vehicles, even without the consent of the vehicle's owner.
If after you opt - in, you change your mind, you may withdraw your consent for us to contact you, for the continued collection, use or disclosure of your information, at anytime, by contacting us at [email protected] or mailing us at: Corporation for Social Security Claiming Strategies 74 Taunton Street Plainville MA USA 02762
By visiting a Kraft Heinz Foodservice (Canada) website or participating in Kraft Heinz Foodservice (Canada) activities you consent to the collection and use of your personal information as described in this Privacy Promise.
The donation details can be found on the cryptocurrency exchange's blog: «Join this campaign and help the efforts made by the RED CROSS in Mexico by using the hashtag #BitcoinAidMexico and make a donation to one of the following accounts: Bitcoin (BTC) 1DaHfXsoPfZ2jznJhB62vR3QEVFhhZ2tMREthereum (ETH) 0x88B6021aE4BB9830f2E9D5BB38B83427b9D7ffEcRipple (XRP) rEFMdiTbLmZq5ZiMGrWGoyP48DMFqXjNkM [No Destination Tag required]» The Red Cross thus far has been able to set up collection and relief centers in several areas affected by the earthquake, especially in the southern states of Oaxaca and Chiapas, benefiting around 24,000 people.
(CNN)- A New Jersey church - already a bit different in that its three congregations gather weekly at two hotels and a middle school - put a new spin on the collection plate Sunday by having congregants take cash - filled envelopes from the plate in hopes that the money will be put to charitable use.
Using «The 77 Branches of Islamic «faith» a collection compiled by Imam Bayhaqi as a starting point.
(2) Some of the sayings, however, were detached; and if we find them used in other connections by Luke and Matthew, and conclude that these later evangelists derived them from their common source, Q, the possibility is still open that Mark also drew them from this source — which was either a written collection or, more probably, still an oral collection, quoted by Mark from memory and therefore not always in the form followed by Luke or Matthew.
Some may wish to use it as an historical book; after all, it is a collection of writings bound up together in one volume, telling us of the way in which the Jewish people came by God's self - disclosure to a deeper understanding of the God they worshipped and a more adequate conception of his purpose for his «chosen» race.
The fact that Matthew and Luke use these sayings in other connections, and then repeat them when following Mark, together with the fact of the sometimes divergent form of the sayings in Mark, seems best to be explained by the hypothesis that Mark also is drawing from the common stock — either the collection Q or its equivalent in some common cycle of «sayings of the Lord.»
It may be no coincidence that a century and a half ago, as this rediscovery of Jesus was just getting under way, there came to light a collection of Jesus» sayings used by Matthew and Luke in composing their Gospels.
Since the bible is a collection of individual books and letters, etc., written over the span of many years, by many different authors, some of which who wrote anonymously (including the authors of all four gospels), then we might say that it has no purpose other than what people use it for.
Then, after Matthew and Luke used it in their enlarged, improved Gospels, that primitive collection of Jesus» sayings was itself no longer copied and transmitted by Christian scribes, since the church of course — unfortunately — preferred those more up - to - date and complete Gospels.
Six orthodox collections of Traditions are generally recognized as authentic, though there are several others of which use is frequently made by Moslems.
Following this come three collections of extracts from later portions of the book, designed for devotional use by Sikhs, particularly for evening prayer and before retiring for the night.
The shortest collection is used by the Synagogue.
Some highlights of this collection are Khaled Abou El Fadl's eloquent explication of the complexities and restraints behind implementation of the death penalty under Islamic law; an interesting intersection between Fadl's discussion of reticence in the use of the death penalty and David Novak's review of capital cases in Jewish tradition; Stanley Hauerwas's unequivocal claim that the cross is justice (negatively in terms of Jesus» execution according to human law and positively in terms of the ultimate meaning of the cross as mercy and forgiveness); and, conversely, the claim by Beth Wilkinson, prosecutor in the Timothy McVeigh case, that «Even as a Christian, I felt nothing for Mr. McVeigh.»
o Using «The 77 Branches of Islamic «faith» a collection compiled by Imam Bayhaqi as a starting point.
I do not think that it's the inability to bridge the gap between science and religion — it's that more of us are educated, and see the Bible for what it truly is — a collection of stories, used throughout history, to ensure that populations were «kept in check» by a threat from a so - called higher power.
And just as (to use a very coarse figure) the stubs remain in a check - book whenever a check is used, to register the transaction, so these impressions on the transcendent self might constitute so many vouchers of the finite experiences of which the brain had been the mediator; and ultimately they might form that collection within the larger self of memories of our earthly passage, which is all that, since Locke's day, the continuance of our personal identity beyond the grave has by psychology been recognized to mean.
Others would see in L Luke's own collection of information from more extensive oral sources, and others again a series of short written «fly - sheets» used by Christian missionaries.
a b c d e f g h i j k l m n o p q r s t u v w x y z