Sentences with phrase «used personal information about users»

Not exact matches

Laptops, Personal Digital Assistants (PDAs), and Blackberries (wireless cell phone and PDA units) use wireless data transfer technologies to provide users with almost instant access to information stored on a company's computer networks and servers from just about anywhere within reach of a cell phone tower or wireless Internet transmitter.
Of course, it'll be a great recruitment tool for the company; the more data women enter about their reproductive cycles — and Glow gets personal: It asks about the sexual positions couples use while attempting to conceive, for example — the better Glow will work as Levchin, Huang, and the team apply machine - learning to the information to develop a deeper understanding of how to advise future users on how and when to conceive.
He posed the question directly to Zuckerberg, asking if Facebook uses audio taken from mobile devices to «enrich personal information about its users
News about the data breach sparked a public outcry and prompted many of Facebook's 2.1 billion users to reevaluate how they use the massive social media platform, and whether the company should be trusted with so much personal information.
Pressed on why he didn't inform users, in 2015, when Facebook says it found out about this policy breach, Zuckerberg avoided a direct answer — instead fixing on what the company did (asked Cambridge Analytica and the developer whose app was used to suck out data to delete the data)-- rather than explaining the thinking behind the thing it did not do (tell affected Facebook users their personal information had been misappropriated).
Web site security and restrictions on use As a condition to your use of Services, you agree that you will not, and you will not take any action intended to: (i) access data that is not intended for you; (ii) invade the privacy of, obtain the identity of, or obtain any personal information about any other user of this web site; (iii) probe, scan, or test the vulnerability of this web site or Wellington Management's network or breach security or authentication measures without proper authorization; (iv) attempt to interfere with service to any user, host, or network or otherwise attempt to disrupt our business; or (v) send unsolicited mail, including promotions and / or advertising of products and services.
North Carolina Sen. Thom Tillis and the state's Republican Party paid $ 345,000 to a data company that is now under scrutiny for its use of personal information about Facebook users.
Web site Security As a condition to your use of this Web site, you agree that you will not, and you will not take any action intended to: (i) access data that is not intended for you; (ii) invade the privacy of, obtain the identity of, or obtain any personal information about any other user of this Web site; (iii) probe, scan or test the vulnerability of this Web site or MFS» network or breach security or authentication measures without proper authorization; (iv) attempt to interfere with service to any user, host or network or otherwise attempt to disrupt our business; or (v) send unsolicited mail, including promotions and / or advertising of products and services.
In addition to the uses identified elsewhere in this Privacy Policy, we may use your Personal Information to: (a) improve your browsing experience by personalizing the Websites and to improve the Subscription Services; (b) send information to you which we think may be of interest to you by post, email, or other means; (c) send you marketing communications relating to our business or the businesses of carefully - selected third parties which we think may be of interest to you, and (d) provide other companies with statistical information about our users — but this information will not be used to identify any indivInformation to: (a) improve your browsing experience by personalizing the Websites and to improve the Subscription Services; (b) send information to you which we think may be of interest to you by post, email, or other means; (c) send you marketing communications relating to our business or the businesses of carefully - selected third parties which we think may be of interest to you, and (d) provide other companies with statistical information about our users — but this information will not be used to identify any indivinformation to you which we think may be of interest to you by post, email, or other means; (c) send you marketing communications relating to our business or the businesses of carefully - selected third parties which we think may be of interest to you, and (d) provide other companies with statistical information about our users — but this information will not be used to identify any indivinformation about our users — but this information will not be used to identify any indivinformation will not be used to identify any individual user.
The following words used in these Terms shall have the following meanings: • «Personal Information» shall mean all data and / or information provided by and about User, including e-mail address (es), name, address, credit card, or other payment information, etc • «Company web site» shall mean all web sites on which Company provides products and / oInformation» shall mean all data and / or information provided by and about User, including e-mail address (es), name, address, credit card, or other payment information, etc • «Company web site» shall mean all web sites on which Company provides products and / oinformation provided by and about User, including e-mail address (es), name, address, credit card, or other payment information, etc • «Company web site» shall mean all web sites on which Company provides products and / oinformation, etc • «Company web site» shall mean all web sites on which Company provides products and / or services.
Thanks to technology that enables Google, Facebook and others to gather information about us and use it to tailor the user experience to our own personal tastes, habits and income, the Internet has become a different place for the rich and for the poor.
By submitting User Materials to or using the Site, you represent that you have the full legal right to provide the User Materials, that such User Materials will not: (a) divulge any protected health information or infringe any intellectual property rights of any person or entity or any rights of publicity, personality, or privacy of any person or entity, including without limitation as a result of your failure to obtain consent to post personally identifying or otherwise private information about a person or which impersonates another person; (b) violate any law, statute, ordinance, or regulation; (c) be defamatory, libelous or trade libelous, unlawfully threatening, or unlawfully harassing or embarrassing; (d) be obscene, child pornographic, or indecent; (e) violate any community or Internet standard; (f) contain any viruses, Trojan horses, worms, time bombs, cancelbots, or other computer programming routines that damage, detrimentally interfere with, surreptitiously intercept, or expropriate any system, data or personal information, or that facilitate or enable such or that are intended to do any of the foregoing; (g) result in product liability, tort, breach of contract, personal injury, death, or property damage; (h) constitute misappropriation of any trade secret or know - how; or (i) constitute disclosure of any confidential information owned by any third party.
If you believe that any user of this Website is harassing you or is otherwise using personal information about you for unlawful purposes, we encourage you to first inform local law enforcement authorities and then to contact us via The Feedback Form so that we may take appropriate action to block further use of the Website by any user who is using this Website and information obtained from it for improper purposes.
You further agree that you will not use personal information about other users of this Website for any reason without the express prior consent of the user that has provided such information to you.
Users of Korean sites may to fill in personal information about yourself, you can use video chats, phone chat.
Except as set forth in this Privacy Policy, our Terms of Use Agreement («Terms of Use»), and other published guidelines, we do not release personal information about our users without obtaining their written permission.
The way it handles data can take two distinctive forms: personal information about the user who purchased the eBook (such as an email address) or an ID number that the distributor can use to look up the user or transaction in a database.
The way it handles data can take two distinctive forms: personal information about the user who purchased the eBook (such as an email address) or an ID number that the distributor can use to look up the user or transaction in a database and is otherwise meaningless.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
Also for purposes of this Privacy Policy, personal information does not include «aggregate» information, or data we collect about a group of users, «de-identified» data from which individual identities or other personal information has been removed, or any other information that does not identify the person to whom the information relates, such as IP addresses, usage statistics, browsing history, type of computer operating system you use (e.g., Microsoft Windows or Mac OS), the type of browser you use (e.g., Firefox, Chrome, Internet Explorer), and the domain name of your internet service provider.
Baker Donelson will not monitor, edit, or disclose any personal information about You, including your use of the Site, without your prior consent unless Baker Donelson has a good faith belief that such action is necessary to: (i) comply with legal process or other legal requirements of any governmental authority; (ii) protect and defend the rights or property of Baker Donelson; (iii) enforce this Agreement; (iv) protect the interests of users of the Site other than You or any other person; or (v) operate or conduct maintenance and repair of Baker Donelson's services or equipment, including the Site as authorized by law.
Facebook agreed to changes to help users to better understand how their personal information will be used and, ultimately, to make more informed decisions about how widely to share that information.
In coming to this conclusion the Court made some very important observations about how computers and the information they contain are used and viewed by contemporary Canadian society: Specifically, it found that computers that are reasonably used for personal purposes — whether at work or at home — contain information that is meaningful, intimate, and which «touch [es] on the user's biographical core».
We do not use cookies to collect information about individual user behavior on our website, and usage of a cookie is in no way linked to any personal information while on our website.
Users of the tool provide some personal information — name, email, company name — and, optionally, some details about which law firm they're using.
As part of their mandate, GPEN partners assessed more than 2,000 private sector websites to see what companies were telling users about the amount and type of personal information being collected, used and disclosed.
If you are known to Hicks Morley as a registered user of an online service, we may combine and store personal information about your use of our website and the online information you have provided with certain other online and offline information we may have collected.
Can you tell me more about the methods that the Bartlett Illinois online traffic school uses for ensuring the safety of users» personal information?
If you are using any of our Driver Improvement *, Driver Education, or Seller Server courses, or if you purchase our Practice Test or Driving Records **, then we offer you participation in our Refer - a-Friend Program which may require users to submit personal information about themselves and their friends (collectively «Users»), including name and email addusers to submit personal information about themselves and their friends (collectively «Users»), including name and email addUsers»), including name and email address.
Can you tell me more about the methods that the Birmingham Michigan online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Jonesborough Tennessee online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Arlington Washington online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Madison West Virginia online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Troy Montana online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Oconee Georgia online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Norwalk California online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Deer Park Texas online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the St. Ann Missouri online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Aberdeen Maryland online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Mentor Ohio online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Woodford Illinois online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Reading Pennsylvania online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Central Falls Rhode Island online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Bethel Park Pennsylvania online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Kannapolis North Carolina online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Harahan Louisiana online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Chanute Kansas online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Eufaula Alabama online traffic school uses for ensuring the safety of users» personal information?
Can you tell me more about the methods that the Enid Oklahoma online traffic school uses for ensuring the safety of users» personal information?
a b c d e f g h i j k l m n o p q r s t u v w x y z