ACCESS TO ELECTRONIC INFORMATION SYSTEMS OR COMPANY’S CONFIDENTIAL INFORMATION Sample Clauses

ACCESS TO ELECTRONIC INFORMATION SYSTEMS OR COMPANY’S CONFIDENTIAL INFORMATION. In the event Provider or its Representatives (or such similar term in the Agreement), including any Subcontractors, have access to Company’s Electronic Information Systems (“EIS”) or access to Company’s Confidential Information that is collected, transferred, or stored by Company, Provider shall at all times implement Security (as such term is defined herein. For purposes of this Information Security Schedule, the term “Security” means Provider’s technological, physical, administrative and procedural safeguards, including but not limited to policies, procedures, standards, controls, hardware, software, firmware and physical security measures, the function or purpose of which is, in whole or part, to protect the confidentiality, integrity or availability of information and data) satisfactory to Company to protect EIS and Company’s Confidential Information.
AutoNDA by SimpleDocs
ACCESS TO ELECTRONIC INFORMATION SYSTEMS OR COMPANY’S CONFIDENTIAL INFORMATION. In the event Provider or its Representatives (or such similar term in the Agreement), including any Subcontractors, have access to Company’s Electronic Information Systems (“EIS”) or access to Company’s Confidential Information that is collected, transferred, or stored by Company, Provider shall at all times implement Security (as such term is defined herein. For purposes of this Information Security Schedule, the term “Security” means Provider’s technological, physical, administrative and procedural safeguards, including but not limited to policies, procedures, standards, controls, hardware, software, firmware and physical security measures, the function or purpose of which is, in whole or part, to protect the confidentiality, integrity or availability of information and data) satisfactory to Company to protect EIS and Company’s Confidential Information. 2. ACCESSO A SISTEMI INFORMATIVI ELETTRONICI O ALLE INFORMAZIONI RISERVATE DELLA SOCIETÀ. Nel caso in cui il Fornitore o i suoi Rappresentanti (o termini simili utilizzati xxxx’Accordo), inclusi eventuali subappaltatori, abbiano accesso ai sistemi informativi della Società (“SI”) o accedano alle Informazioni riservate della Società che vengono raccolte, trasferite o archiviate dalla Società, devono sempre applicare standard di Sicurezza (come definito nel presente documento; ai fini del presente Programma relativo alla sicurezza delle informazioni, il termine “Sicurezza” indica le misure di sicurezza tecnologiche, fisiche, amministrative e procedurali messe in atto dal Fornitore, incluse ma non limitate a politiche, procedure, standard, controlli, hardware, software, firmware e misure di sicurezza fisica, la cui funzione o il cui scopo è, in tutto o in parte, proteggere la riservatezza, l’integrità o la disponibilità di informazioni e dati) soddisfacenti per la Società per proteggere gli SI e le Informazioni riservate della Società.

Related to ACCESS TO ELECTRONIC INFORMATION SYSTEMS OR COMPANY’S CONFIDENTIAL INFORMATION

  • Treatment of Proprietary and Confidential Information A. Both parties agree that it may be necessary to provide each other during the term of this Agreement with certain confidential information, including trade secret information, including but not limited to, technical and business plans, technical information, proposals, specifications, drawings, procedures, customer account data and like information (hereinafter collectively referred to as “Information”). Both parties agree that all Information shall either be in writing or other tangible format and clearly marked with a confidential, private or proprietary legend, or, when the Information is communicated orally, it shall also be communicated that the Information is confidential, private or proprietary. The Information will be returned to the owner within a reasonable time. Both parties agree that the Information shall not be copied or reproduced in any form. Both parties agree to receive such Information and not disclose such Information. Both parties agree to protect the Information received from distribution, disclosure or dissemination to anyone except employees of the parties with a need to know such Information and which employees agree to be bound by the terms of this Section. Both parties will use the same standard of care to protect Information received as they would use to protect their own confidential and proprietary Information. B. Notwithstanding the foregoing, both parties agree that there will be no obligation to protect any portion of the Information that is either: 1) made publicly available by the owner of the Information or lawfully disclosed by a nonparty to this Agreement; 2) lawfully obtained from any source other than the owner of the Information; or 3) previously known to the receiving party without an obligation to keep it confidential.

  • Confidential Information Protections 4.1 At all times during and after the Employee’s employment, the Employee will hold in confidence and will not disclose, use, lecture upon, or publish any of Company’s Confidential Information (defined below), except as may be required in connection with the Employee’s work for Company, or as expressly authorized by the Board. The Employee will obtain the written approval of the Board before publishing or submitting for publication any material (written, oral, or otherwise) that relates to the Employee’s work at Company and/or incorporates any Confidential Information. The Employee hereby assigns to Company any rights the Employee may have or acquire in any and all Confidential Information and recognize that all Confidential Information shall be the sole and exclusive property of Company and its assigns.

  • Trade Secrets and Confidential Information (i) Executive represents and warrants that Executive (A) is not subject to any legal or contractual duty or agreement that would prevent or prohibit Executive from performing the duties contemplated by this Agreement or otherwise complying with this Agreement, and (B) is not in breach of any legal or contractual duty or agreement, including any agreement concerning trade secrets or confidential information owned by any other party. (ii) Executive agrees that Executive will not (A) use, disclose or reverse engineer Trade Secrets or Confidential Information for any purpose other than the Company’s Business, except as authorized in writing by the Company; (B) during Executive’s employment with the Company, use, disclose or reverse engineer (1) any confidential information or trade secrets of any former employer or third party or (2) any works of authorship developed in whole or in part by Executive during any former employment or for any other party, unless authorized in writing by the former employer or third party; or (C) upon Executive’s resignation or termination with the Company (1) retain Trade Secrets or Confidential Information, including any copies existing in any form (including electronic form), which are in Executive’s possession or control or (2) destroy, delete or alter Trade Secrets or Confidential Information without the Company’s prior written consent. (iii) The obligations under this Section 8 shall remain in effect as long as Trade Secrets and Confidential Information constitute trade secrets or confidential information under applicable law. The confidentiality, property and proprietary rights protections available in this Agreement are in addition to, and not exclusive of, any and all other rights to which the Company is entitled under federal and state law, including, but not limited to, rights provided under copyright laws, trade secret and confidential information laws and laws concerning fiduciary duties.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • KYC Information (i) Upon the reasonable request of the Lender made at least 1 day prior to the Closing Date, the Borrower shall have provided to the Lender the documentation and other information so requested in connection with applicable “know your customer” and anti-money-laundering rules and regulations, including the PATRIOT Act, in each case at least five days prior to the Closing Date. (ii) [reserved].

  • Electronic Information Each Member hereby agrees that all current and future notices, confirmations and other communications may be made by the Company via email, sent to the email address of record of the Member provided to the Company as changed or updated from time to time, without necessity of confirmation of receipt, delivery or reading, and such form of electronic communication is sufficient for all matters regarding the relationship between the Company and the Members except as otherwise required by law. If any such electronically sent communication fails to be received for any reason, including but not limited to such communications being diverted to the recipients spam filters by the recipients email service provider, or due to a recipient’s change of address, or due to technology issues by the recipients service provider, the parties agree that the burden of such failure to receive is on the recipient and not the sender, and that the sender is under no obligation to resend communications via any other means, including but not limited to postal service or overnight courier, and that such communications shall for all purposes, including legal and regulatory, be deemed to have been delivered and received. Except as required by law, no physical, paper documents will be sent to Members, and a Member desires physical documents then such Member agrees to be satisfied by directly and personally printing, at such Member’s own expense, the electronically sent communication(s) and maintaining such physical records in any manner or form that a Member desires.

  • - CLEC INFORMATION 3.1 Except as otherwise required by law, CenturyLink will not provide or establish Interconnection, Unbundled Network Elements, ancillary services and/or resale of Telecommunications Services in accordance with the terms and conditions of this Agreement prior to CLEC's execution of this Agreement. The Parties shall complete CenturyLink's "New Customer Questionnaire," as it applies to CLEC's obtaining of Interconnection, Unbundled Network Elements, ancillary services, and/or resale of Telecommunications Services hereunder. 3.2 Prior to placing any orders for services under this Agreement, the Parties will jointly complete the following sections of CenturyLink's "New Customer Questionnaire:" General Information Billing and Collection (Section 1) Credit Information Billing Information Summary Billing OSS and Network Outage Notification Contact Information System Administration Contact Information Ordering Information for LIS Trunks, Collocation, and Associated Products (if CLEC plans to order these services) Design Layout Request – LIS Trunking and Unbundled Loop (if CLEC plans to order these services) 3.2.1 The remainder of this questionnaire must be completed within two (2) weeks of completing the initial portion of the questionnaire. This questionnaire will be used to: Determine geographical requirements; Identify CLEC identification codes; Determine CenturyLink system requirements to support CLEC's specific activity; Collect credit information; Obtain Billing information; Create summary bills; Establish input and output requirements; Create and distribute CenturyLink and CLEC contact lists; and Identify CLEC hours and holidays. 3.2.2 CLECs that have previously completed a Questionnaire need not fill out a New Customer Questionnaire; however, CLEC will update its New Customer Questionnaire with any changes in the required information that have occurred and communicate those changes to CenturyLink. Before placing an order for a new product, CLEC will need to complete the relevant New Product Questionnaire and amend this Agreement.

  • Company Creation and Use of Confidential Information The Executive understands and acknowledges that the Company has invested, and continues to invest, substantial time, money and specialized knowledge into developing its resources, creating a customer base, generating customer and potential customer lists, training its employees, and improving its product offerings in the field of financial services. The Executive understands and acknowledges that as a result of these efforts, the Company has created, and continues to use and create Confidential Information. This Confidential Information provides the Company with a competitive advantage over others in the marketplace.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Protection of Confidential Information The Servicer shall keep confidential and shall not divulge to any party, without the Seller’s prior written consent, any nonpublic information pertaining to the Mortgage Loans or any borrower thereunder, except to the extent that it is appropriate for the Servicer to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies or it is otherwise in accordance with Accepted Servicing Practices.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!