Requested Information with reasonable promptness, such other data and information relating to the business, operations, affairs, financial condition, assets or properties of the Company or any of its Subsidiaries or relating to the ability of the Company to perform its obligations hereunder and under the Notes as from time to time may be reasonably requested by any such holder of Notes.
Protected Information 5.3.1 In this Section "Protected Information" means:
Excluded Information For purposes of this Agreement, the term “confidential and proprietary information” shall not include (i) information already known or independently developed by the recipient without the use of any confidential and proprietary information, or (ii) information known to the public through no wrongful act of the recipient.
Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.
Other Requested Information Promptly following any request therefor, such other information regarding the operations, business affairs and financial condition of the Borrower or any Subsidiary (including, without limitation, any Plan or Multiemployer Plan and any reports or other information required to be filed under ERISA), or compliance with the terms of this Agreement or any other Loan Document, as the Administrative Agent or any Lender may reasonably request.
Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.
Competitive Activities During the term of this Agreement, Consultant will not, directly or indirectly, in any individual or representative capacity, engage or participate in or provide services to any business that is competitive with the types and kinds of business being conducted by Company.
Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.
Permitted Activities The purpose of the Issuer is, and the Issuer will have the power and authority, and is authorized, to engage in the following activities: (i) to acquire the Receivables and other Sold Property under the Sale and Servicing Agreement from the Depositor in exchange for the Notes; (ii) to Grant the Collateral to the Indenture Trustee under the Indenture; (iii) to enter into and perform its obligations under the Transaction Documents; (iv) to issue the Notes under the Indenture and to facilitate the sale of the Notes by the Depositor; (v) to pay principal of and interest on the Notes; (vi) to administer and manage the Trust Property; (vii) to make payments to the Noteholders and distributions to the holder of the Residual Interest; and (viii) to take other actions necessary or advisable to accomplish the activities listed above or that are incidental to the activities listed above.
Additional Submissions – Information Access The claimant shall then have the opportunity to submit written comments, documents, records and other information relating to the claim. The Plan Administrator shall also provide the claimant, upon request and free of charge, reasonable access to, and copies of, all documents, records and other information relevant (as defined in applicable ERISA regulations) to the claimant’s claim for benefits.