Sentences with phrase «where access to personal data»

Not exact matches

By submitting information to us you acknowledge, consent and agree that United Way of the Southern Tier, Inc., may access, read, preserve and disclose the personal information you provide to us as a donor, along with your usage history, submitted messages or data and similar information regarding your use of the website in order to: (a) comply with any applicable law, regulation, legal process, or governmental request; (b) detect, prevent, or otherwise address fraud, security, or technical issues; (c) respond to your requests for customer service; (d) protect the rights, property, or personal safety of United Way of the Southern Tier, Inc., its visitors, or the public, (e) where we sell any or all our business assets; or (f) as otherwise set forth herein.
Since 1998, telecoms companies have been forced to provide the security services with regular access to BCD — the who, what, where and when of personal communications data, including information such as the location and time of a communication made by phone or over the internet, but not the content of the message.
Your meditation session data is then safely and securely uploaded to your personal MUSE portal in the cloud where you can access this information at anytime, from anyplace.
«Schools should make sure that if they were to suffer a security breach (where personal data was accessed outside of the organisation without authorisation) it would be able report this to the regulator (the Information Commissioner's Office) within 72 hours of becoming aware of this breach.
This means that we will only allow third parties to access your personal information where those third parties (a) are in countries that have been confirmed by the European Commission to provide adequate protection to personal information; or (b) have agreed to provide all protections to your personal information as set out in the Data Protection Legislation (such as by entering into the European Commission's Model Clauses).
This can include human resource functions where employees have access to Social Security numbers, banking information and other personal data of co-workers or it could include those with access to client or customer credit card or account information.
While the fate of cloud client data may not be as much of a concern for lawyers who work in firms where someone else can take over, no matter what size firm you practice in, you probably have both personal and professional information online that you may or may not want others to have access to.
Because JAMS provides alternative dispute resolution mechanisms that operate in accordance with judicial procedures, we may also deny or limit access to personal data in the following contexts: (i) interference with law enforcement or with private causes of action, including the prevention, investigation or detection of offenses or the right to a fair trial, arbitration or mediation; (ii) disclosure where the legitimate rights or important interests of others would be violated; (iii) breaching a legal or other professional privilege or obligation; (iv) prejudicing employee security investigations or grievance proceedings or in connection with employee succession planning and corporate reorganizations; or (v) prejudicing the confidentiality necessary in monitoring, inspection or regulatory functions connected with sound management, or in future or ongoing negotiations involving JAMS.
I know that one of the first legal issues that comes up in discussing cloud computing is where the data are (business and personal data) and whose law applies to the operator of the cloud — meaning often what governmental authorities might have a right to get access to the data.
Please note that in certain circumstances we may withhold access to your personal information where we have the right to do so under current data protection legislation.
Intended to harmonize the governance of information that relates to individuals (personal data) across European Union (EU) member states, the GDPR requires greater oversight of where and how personal data — including credit card, banking and health information — is stored and transferred, and how access to it is policed and audited by organizations.
In circumstances where Onit acts as a Data Processor, individuals should submit any requests to access their Personal Information or complaints concerning the processing of their Personal Information to the Onit customer that originally collected their information in accordance with the customer's relevant dispute resolution mechanism (if available).
GDPR requires that data controllers report any security incidents where personal data has been lost, stolen or otherwise accessed by unauthorized third parties to their DPA within 72 hours of them becoming aware of it.
Under GDPR, people who have consented to their personal data being processed also have a suite of associated rights — including the right to access data held about them (a copy of the data must be provided to them free of charge, typically within a month of a request); the right to request rectification of incomplete or inaccurate personal data; the right to have their data deleted (another so - called «right to be forgotten» — with some exemptions, such as for exercising freedom of expression and freedom of information); the right to restrict processing; the right to data portability (where relevant, a data subject's personal data must be provided free of charge and in a structured, commonly used and machine readable form).
Guest mode is something where you give a limited access to the apps when passing your phone to someone known, whom you don't want to give the access to every personal data of yours.
The plaintiff, a law student and vocal data privacy activist, filed the complaint against Facebook's Irish operation, which serves as headquarters for its European business, claiming that his personal data could be shipped illegally to the U.S., where American government agencies and others would have access to his otherwise protected information.
That includes other companies that have a lot of access to your personal data, like your family photos and where you were when you took those photos.
It's generally easier to break into someone's car to steal something than to break into a home, so you want to make sure that your valuables and items with personal data are locked up in a place where criminals can't easily access.
a b c d e f g h i j k l m n o p q r s t u v w x y z