Ability to Ensure Employees Protect Confidential Information Sample Clauses

Ability to Ensure Employees Protect Confidential Information. Our clients and other parties with whom we do business entrust the company with important information relating to their businesses. It is our policy that all information considered confidential will not be disclosed to external parties or to employees without a “need to know.” If an employee questions whether certain information is considered confidential, he/she should first check with his/her Center Director. All files connected with an employee are considered strictly confidential. Access will be limited only to those who have a job-related need to know the information, and who have been authorized to see the file in question. Company computers and e-mail system are company property. All employees are expected to use good judgment in using electronic mail and to avoid indiscretions such as offensive or inappropriate messages or any other message, Company deems inappropriate. E-mail messages should be used for business and not for soliciting outside business ventures or other matters unrelated to E-Logic’s affairs. Misuse of e-mail may result in disciplinary action up to and including termination.
AutoNDA by SimpleDocs
Ability to Ensure Employees Protect Confidential Information. All personnel working for DCI undergo fingerprint and background-check screening before being offered full-time employment. All DCI personnel continue to be fingerprint and background-checked every two years. To DCI’s knowledge, no employees, agents, or independent contractors that will provide work on a contract pursuant to this proposal, have been convicted of, pled guilty to, or pled nolo contendere to any felony. All DCI technical specialists have signed security addendums with the FBI Criminal Justice Information Systems (CJIS) Security Policy, and all employees also have certificates from completing the CJIS Security & Awareness Course: Level 3 CJIS Security Test. DCI’s employees are required to read and familiarize themselves with the latest version of the CJIS Security Policy (5.3) as well as the DCI Internal Information Security Repository which is updated whenever an Information Security Notification (ISNs) are added to company policy. DCI employees are trained to handle sensitive information and use Virtual Private Networks combined with two-factor authentication solutions when accessing in-house or customer-critical data.
Ability to Ensure Employees Protect Confidential Information. BI understands the importance of protecting confidential information or private information for our clients. We follow all privacy and security measures and expectations details in our client’s contract agreements, and we create standard operating procedures (SOPs) that speak to the handling of sensitive or confidential information for employees. These SOPs are readily accessible and updated to include any new process or procedures.
Ability to Ensure Employees Protect Confidential Information. We understand the critical nature of the need to protect confidential information. As the custodian of millions of records of confidential and personal health information, the Project Team has an extensive program of training and security procedures intended to protect confidential information. For example, all PCG employees are required to take annual classes and exams regarding the protection of confidential information, as well as compliance with the laws and regulations related to the Health Insurance Portability and Accountability Act (HIPAA). As part of the employment and training process, each employee is required to sign a confidentiality agreement in which each individual acknowledges his or her responsibility to protect confidential information from unauthorized release. We also bring set procedures to timely accommodate a Customer’s designation of a job as one of special trust that requires a background screening. We will conduct background screening with each candidate who reaches the offer letter stage, and will keep all other finalists in our pipeline if the background screening is not favorable. Our background screening will be tailored to FL DMS’ needs. The standard background screening includes education, criminal history, ability to work in the United States, terrorist screening, etc. Additional background criteria will be established with FL DMS upon engagement. The Project Team will conduct a robust background check on all employees for whom it is required, which can include industry-specific verifications. We utilize industry leading firms, such as Alliance Investigative, March 19, 2019 Florida Department of Management Services Information Technology Staff Augmentation Services 3rd Bid RFP No. 15-80101507-SA-D to confirm an applicant’s credentials such as educational background and professional experience. We also check terrorist watch lists, sex offender registries and criminal backgrounds. We tailor our background check services to meet each of our client’s strict guidelines. By doing so we mitigate the risk of errors in verifying education and the cost of a bad hire through consistent research methodologies that achieve fast results. The background check is the final step before an employee is able to begin the onboarding process, which includes e-Verify and I-9 verification, confirming a candidate’s legal ability to work, as well as providing important employer information to validate the new employee’s career decision and facilita...

Related to Ability to Ensure Employees Protect Confidential Information

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Proprietary and Confidential Information The Distributor agrees on behalf of itself and its managers, officers, and employees to treat confidentially and as proprietary information of the Trust, all records and other information relative to the Trust and prior, present or potential shareholders of the Trust (and clients of said shareholders), and not to use such records and information for any purpose other than the performance of its responsibilities and duties hereunder, except (i) after prior notification to and approval in writing by the Trust, which approval shall not be unreasonably withheld and may not be withheld where the Distributor may be exposed to civil or criminal contempt proceedings for failure to comply, (ii) when requested to divulge such information by duly constituted authorities, or (iii) when so requested by the Trust. Records and other information which have become known to the public through no wrongful act of the Distributor or any of its employees, agents or representatives, and information that was already in the possession of the Distributor prior to receipt thereof from the Trust or its agent, shall not be subject to this paragraph. Further, the Distributor will adhere to the privacy policies adopted by the Trust pursuant to Title V of the Gxxxx-Xxxxx-Xxxxxx Act, as may be modified from time to time. In this regard, the Distributor shall have in place and maintain physical, electronic and procedural safeguards reasonably designed to protect the security, confidentiality and integrity of, and to prevent unauthorized access to or use of, records and information relating to the Trust and its shareholders.

  • Prime Confidential Information The following shall constitute Confidential Information of the Contractor and should not be disclosed to third (3rd) parties: the deliverables, discoveries, ideas, concepts, software [in various stages of development], designs, drawings, specifications, techniques, models, data, source code, source files, object code, documentation, diagrams, flow charts, research, development, processes, procedures, “know-how”, marketing techniques and materials, marketing and development plans, customer names and other information related to customers, price lists, pricing policies and financial information, this Agreement and the existence of this Agreement, the relationship between the Contractor and Subcontractor, and any details of the Service under this Agreement. Subcontractor agrees not to use or reference the Contractor and/or their names, likenesses, or logos (“Identity”). Subcontractor will not use or reference Contractor or their Identity, directly or indirectly, in conjunction with any other third (3rd) parties.

  • Treatment of Proprietary and Confidential Information A. Both parties agree that it may be necessary to provide each other during the term of this Agreement with certain confidential information, including trade secret information, including but not limited to, technical and business plans, technical information, proposals, specifications, drawings, procedures, customer account data and like information (hereinafter collectively referred to as “Information”). Both parties agree that all Information shall either be in writing or other tangible format and clearly marked with a confidential, private or proprietary legend, or, when the Information is communicated orally, it shall also be communicated that the Information is confidential, private or proprietary. The Information will be returned to the owner within a reasonable time. Both parties agree that the Information shall not be copied or reproduced in any form. Both parties agree to receive such Information and not disclose such Information. Both parties agree to protect the Information received from distribution, disclosure or dissemination to anyone except employees of the parties with a need to know such Information and which employees agree to be bound by the terms of this Section. Both parties will use the same standard of care to protect Information received as they would use to protect their own confidential and proprietary Information.

  • Exceptions to Confidential Information The obligations set forth in Section 13.1 (Confidential Information) shall not apply to the extent that Confidential Information includes information which is: (a) now or hereafter, through no unauthorized act or failure to act on the Receiving Party’s part, in the public domain; (b) was in the Receiving Party’s possession before receipt from the Disclosing Party and obtained from a source other than the Disclosing Party and other than through the prior relationship of the Disclosing Party and the Receiving Party before the Separation Date; (c) hereafter furnished to the Receiving Party by a third party as a matter of right and without restriction on disclosure; (d) furnished to others by the Disclosing Party without restriction on disclosure; or (e) independently developed by the Receiving Party without use of the Disclosing Party’s Confidential Information. Nothing in this Agreement shall prevent the Receiving Party from disclosing Confidential Information to the extent the Receiving Party is legally compelled to do so by any governmental, investigative or judicial agency pursuant to proceedings over which such agency has jurisdiction; provided, however, that prior to any such disclosure, the Receiving Party shall: (i) assert the confidential nature of the Confidential Information to the agency; (ii) immediately notify the Disclosing Party in writing of the agency’s order or request to disclose; and (iii) cooperate fully with the Disclosing Party in protecting against any such disclosure and/or obtaining a protective order narrowing the scope of the compelled disclosure and protecting its confidentiality.

  • Confidential Information and Privacy (a) All non-public, confidential or proprietary information of Service Provider or Customer, as applicable, including, but not limited to, trade secrets, technology, inventions, samples, research, product designs, business plans, implementation plans, processes, document templates, information pertaining to business operations, methodologies, and strategies, and information pertaining to customers, pricing, and marketing (collectively, "Confidential Information"), disclosed by Service Provider or Customer (in such role the “Disclosing Party”) or Disclosing Party’s officers, directors or employees, whether disclosed orally or disclosed or accessed in written, electronic or other form or media, and whether or not marked, designated or otherwise identified as "confidential," in connection with the provision of the Services and this Agreement is confidential, and shall not be disclosed or copied by recipient Customer or Service Provider (in such role the “Recipient”), or Recipient’s officers, directors or employees, without the prior written consent of the Disclosing Party. Confidential Information does not include information that is:

  • Access to Confidential Information Each party acknowledges that the other party, its employees or agents, may be given access to Confidential Information relating to the other parties' business or the operation of this Agreement or any negotiations relating to this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!