Sentences with phrase «with access to your personal information»

We make a reasonable effort to provide you with access to your personal information and allow you to correct such data if it is inaccurate, when reasonably possible.
Upon written request, BlackBerry will inform you whether it holds personal information about you and provide you with access to your personal information within a reasonable timeframe and at minimal or no cost in accordance with applicable laws.
Even with robust credit monitoring, taking caution with access to your personal information remains important.
Examples of this type of position include managerial positions, positions with access to personal information not customarily provided in a retail transaction, positions with fiduciary responsibility, positions with an expense account or corporate credit card, or positions with access to confidential or proprietary information.
If we are unable to provide you with access to your personal information, we will advise you of the reason that we are unable to do so.
In most cases, we will be able to provide you with access to the personal information that we have about you.
If Tourism Australia refuses to provide you with access to your personal information or to correct that information as you request, it will provide you with reasons for that refusal and information about how to make a complaint.
7.3 All employees of Thomson Reuters Canada with access to Personal Information shall be required as a condition of employment to respect the confidentiality of Personal Information.
Among the included services with access to my personal information are a number of defunct or otherwise unpopular apps like Voxer and Viber, apps I've heard of maybe once years ago like RebelMouse and Rafflecopter, and apps I've never heard of at all like Indaba Music and Jagabo.
We will provide you with access to your personal information on reasonable request and subject to your agreement to pay our access charges if (a) it is practicable for us to do so and we have no other reasonable grounds for refusing access, (b) the request is not frivolous or vexatious, (c) access will not have an unreasonable impact on the privacy of others, (d) the information does not relate to existing or anticipated legal proceedings (other than information accessible through the discovery process), (e) access will not reveal our intentions in relation to any negotiations with you, (f) access is not unlawful (g) denying access is not required or authorised by law, and (h) access will not prejudice any prevention, detection, investigation or prosecution of possible unlawful or improper activity.
When You use the Service, we make good faith efforts to provide You with access to Your personal information and either to correct this data if it is inaccurate or to delete such data at Your request if it is not otherwise required to be retained by law or for legitimate business purposes.

Not exact matches

Malware interferes with your computer's normal operation and gives hackers a chance to gain access to your computer and collect sensitive personal information, such as the sites you visit, the e-mail you send, and the financial records you keep.
Laptops, Personal Digital Assistants (PDAs), and Blackberries (wireless cell phone and PDA units) use wireless data transfer technologies to provide users with almost instant access to information stored on a company's computer networks and servers from just about anywhere within reach of a cell phone tower or wireless Internet transmitter.
Hackers and unscrupulous fraudsters are using increasingly sophisticated ways to gain access to your personal information via email, infect your software with viruses, and compromise your financial security.
In 2009, the worm automatically could create bogus accounts complete with pictures and personal information, then befriend strangers, earning access to their details.
Protect Your Personal Information In order to effectively use most personal finance apps, you must enter sensitive information, such as your bank login and password, with which criminals can gain access to your aPersonal Information In order to effectively use most personal finance apps, you must enter sensitive information, such as your bank login and password, with which criminals can gain access to youInformation In order to effectively use most personal finance apps, you must enter sensitive information, such as your bank login and password, with which criminals can gain access to your apersonal finance apps, you must enter sensitive information, such as your bank login and password, with which criminals can gain access to youinformation, such as your bank login and password, with which criminals can gain access to your accounts.
This has made already uncertain internet users even more hesitant to share their personal data with you — like their email and contact information or even logging onto your website by allowing you to access their information on their social media profile.
When an employee with access to trade secrets leaves your company, either because the employee quit or has been fired, he or she could take this information and use it to personal advantage (at your expense).
Foundation personnel are authorized to access personal information only as required to deal with the information for the reason (s) for which it was obtained.
signing a deal with the data company but says the information never got to their hands and there is no evidence that the company had any access to personal data from Mexicans or Colombians, according to the same article.
If you are a user accessing this Site from any region with regulations or laws governing personal data collection, use and disclosure, that differ from United States laws / regulations, please note that through your continued use of this Site, which is governed by U.S. Law, this Privacy Statement, and our Terms of Use, you are transferring Personal Information to the United States and you consent to that tpersonal data collection, use and disclosure, that differ from United States laws / regulations, please note that through your continued use of this Site, which is governed by U.S. Law, this Privacy Statement, and our Terms of Use, you are transferring Personal Information to the United States and you consent to that tPersonal Information to the United States and you consent to that transfer.
You acknowledge, consent and agree that we may access, preserve, and disclose your registration and any other information you provide if required to do so by law or in a good faith belief that such access preservation or disclosure is reasonably necessary to: (a) comply with legal process; (b) enforce this Agreement; (c) respond to claims of a violation of the rights of third - parties; (d) respond to your requests for customer service; or (e) protect the rights, property, or personal safety of The Defense Alliance of Minnesota, The Defense Alliance of Minnesota Affiliates, its users and the public.
Web site security and restrictions on use As a condition to your use of Services, you agree that you will not, and you will not take any action intended to: (i) access data that is not intended for you; (ii) invade the privacy of, obtain the identity of, or obtain any personal information about any other user of this web site; (iii) probe, scan, or test the vulnerability of this web site or Wellington Management's network or breach security or authentication measures without proper authorization; (iv) attempt to interfere with service to any user, host, or network or otherwise attempt to disrupt our business; or (v) send unsolicited mail, including promotions and / or advertising of products and services.
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry (R) World (TM); risks related to the collection, storage, transmission, use and disclosure of confidential and personal information;
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry ® World ™; risks related to the collection, storage, transmission, use and disclosure of confidential and personal information; BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry.
Joseph R. Swedish, president and CEO of Indianapolis, Ind. - based Anthem, says the organization was hit with a «very sophisticated external cyber attack» which gave the intruders unauthorized access to Anthem's IT system, resulting in the compromise of personal information of current and former customers and employees.
Web site Security As a condition to your use of this Web site, you agree that you will not, and you will not take any action intended to: (i) access data that is not intended for you; (ii) invade the privacy of, obtain the identity of, or obtain any personal information about any other user of this Web site; (iii) probe, scan or test the vulnerability of this Web site or MFS» network or breach security or authentication measures without proper authorization; (iv) attempt to interfere with service to any user, host or network or otherwise attempt to disrupt our business; or (v) send unsolicited mail, including promotions and / or advertising of products and services.
Oxfam Canada staff and select support volunteers are authorized to collect and access personal information based only on their need to deal with the information for the reason (s) for which it was obtained.
It is disappointing, however, that with so much space and access to personal information, Dinshaw fails to describe how Runciman actually worked.
Golubka Kitchen shall endeavor and shall take every precaution to maintain adequate physical, procedural and technical security with respect to its offices and information storage facilities so as to prevent any loss, misuse, unauthorized access, disclosure or modification of the user's personal information under our control.
Any person may seek access to personal information which AFGC holds about that person and we will provide access to that information in accordance with the Act.
We may access and / or disclose your personal information if we believe such action is necessary to: (a) comply with the law or legal process served on Fantasy Labs; (b) protect and defend the rights or property of Fantasy Labs (including the enforcement of our agreements); or (c) act in urgent circumstances to protect the personal safety of users of Fantasy Labs services or members of the public.
momstown disposes of personal information with care to prevent unauthorized parties from gaining access to the information.
MomLifeTV will limit access to personal information about you to employees who we believe reasonably need to come into contact with that information to provide products or services to you or in order to do their jobs.
Collection of Personal Information When visiting What Baby Needs List, the IP address used to access the site will be logged along with the dates and times of access.
Orland Park Health & Fitness Center encourages you to read and familiarize yourself with the privacy statements available on any third party site, which you may access before providing data or personal identifiable information to any third party.
If you are a consumer accessing the Site from the European Union, Asia, or any other region with laws or regulations governing personal data collection, use, and disclosure that differ from U.S. laws, please be advised that, through your continued use of the Site, which is governed by U.S. law and this Policy, you are transferring your Personal Information and other information to the U.S., and you consent to such tpersonal data collection, use, and disclosure that differ from U.S. laws, please be advised that, through your continued use of the Site, which is governed by U.S. law and this Policy, you are transferring your Personal Information and other information to the U.S., and you consent to such tPersonal Information and other information to the U.S., and you consent to sucInformation and other information to the U.S., and you consent to sucinformation to the U.S., and you consent to such transfer.
Boston Parents Paper (and Parenting Media, Inc) shall endeavor and shall take every precaution to maintain adequate physical, procedural and technical security with respect to its offices and information storage facilities so as to prevent any loss, misuse, unauthorized access, disclosure or modification of the user's personal information under our control.
By posting images of the wide diversity there is in infant and toddler feeding, we can help remind ourselves and the rest of the world that we are people with feelings just trying to do our best in the normal act of feeding our children and we can be trusted to make the best decisions about that according to information, our personal circumstances, and our access to resources.
On criticisms that personal liberty would be undermined, he said individuals «will have the right to see what information is held on them; the register will not contain medical records, tax or benefits information and full accreditation will be required for any organisation to access the data with the individual's consent».
By submitting information to us you acknowledge, consent and agree that United Way of the Southern Tier, Inc., may access, read, preserve and disclose the personal information you provide to us as a donor, along with your usage history, submitted messages or data and similar information regarding your use of the website in order to: (a) comply with any applicable law, regulation, legal process, or governmental request; (b) detect, prevent, or otherwise address fraud, security, or technical issues; (c) respond to your requests for customer service; (d) protect the rights, property, or personal safety of United Way of the Southern Tier, Inc., its visitors, or the public, (e) where we sell any or all our business assets; or (f) as otherwise set forth herein.
Since 1998, telecoms companies have been forced to provide the security services with regular access to BCD — the who, what, where and when of personal communications data, including information such as the location and time of a communication made by phone or over the internet, but not the content of the message.
Imagine a social media company with access to its clients» personal information and interactions.
«Genomics combined with global access to information via personal devices promises a transformation of healthcare.
The Institute is committed to managing personal information, including «subject access requests», in compliance with the Data Protection Act 1998.
In our online access area, you may be asked to provide personal information that is necessary for us to communicate with you, to provide you with your training program and any other information that shop.thebettyrocker.com and The Betty Rocker, Inc. consider may be valuable to you.
In our online access area, you may be asked to provide personal information that is necessary for us to communicate with you, to provide you with your training program and any other information that thebettyrocker.com and The Betty Rocker, Inc. consider may be valuable to you.
If you choose not to provide the Personal Information we request, you can still visit most of XYMOGEN's Web sites, but you may be unable to access certain options, offers, and services that involve our interaction with you.
Wherever your Personal Information may be held within XYMOGEN or on its behalf, we intend to take reasonable and appropriate steps to protect the Personal Information that you share with us from unauthorized access or disclosure.
Confidentiality and Security * We limit access to personal information about you to employees who we believe reasonably need to come into contact with that information to provide products or services to you or in order to do their jobs.
a b c d e f g h i j k l m n o p q r s t u v w x y z