Data Protection The Administrator shall implement and maintain a comprehensive written information security program that contains appropriate security measures to safeguard the personal information of the Trust’s shareholders, employees, directors and/or officers that the Administrator receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.
Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.
Whistleblower Provision Nothing herein shall be construed to prohibit Executive from communicating directly with, cooperating with, or providing information to, any government regulator, including, but not limited to, the U.S. Securities and Exchange Commission, the U.S. Commodity Futures Trading Commission, or the U.S. Department of Justice. Executive acknowledges that the Company has provided Executive with the following notice of immunity rights in compliance with the requirements of the Defend Trade Secrets Act: (i) Executive shall not be held criminally or civilly liable under any Federal or State trade secret law for the disclosure of proprietary information that is made in confidence to a Federal, State, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, (ii) Executive shall not be held criminally or civilly liable under any Federal or State trade secret law for the disclosure of proprietary information that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal and (iii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the proprietary information to Executive’s attorney and use the proprietary information in the court proceeding, if Executive files any document containing the proprietary information under seal, and does not disclose the proprietary information, except pursuant to court order.
Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.
Application of Law The referee shall be required to determine all issues in accordance with existing case law and the statutory laws of the State of California. The rules of evidence applicable to proceedings at law in the State of California will be applicable to the reference proceeding. The referee shall be empowered to enter equitable as well as legal relief, enter equitable orders that will be binding on the parties and rule on any motion which would be authorized in a court proceeding, including without limitation motions for summary judgment or summary adjudication. The referee shall issue a decision at the close of the reference proceeding which disposes of all claims of the parties that are the subject of the reference. Pursuant to CCP § 644, such decision shall be entered by the Court as a judgment or an order in the same manner as if the action had been tried by the Court and any such decision will be final, binding and conclusive. The parties reserve the right to appeal from the final judgment or order or from any appealable decision or order entered by the referee. The parties reserve the right to findings of fact, conclusions of laws, a written statement of decision, and the right to move for a new trial or a different judgment, which new trial, if granted, is also to be a reference proceeding under this provision.
Incorporation of Software Code I agree that I will not incorporate into any Company software or otherwise deliver to Company any software code licensed under the GNU General Public License or Lesser General Public License or any other license that, by its terms, requires or conditions the use or distribution of such code on the disclosure, licensing, or distribution of any source code owned or licensed by Company except in strict compliance with Company’s policies regarding the use of such software.
Privacy Act To protect Customer Information (as defined below) and to comply as may be necessary with the requirements of the Xxxxx-Xxxxx-Xxxxxx Act, the relevant state and federal regulations pursuant thereto and state privacy laws, the parties wish to include the confidentiality and non-disclosure obligations set forth herein.
Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.
Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.
Application of Takeover Protections The Company and the Board of Directors have taken all necessary action, if any, in order to render inapplicable any control share acquisition, business combination, poison pill (including any distribution under a rights agreement) or other similar anti-takeover provision under the Company’s certificate of incorporation (or similar charter documents) or the laws of its state of incorporation that is or could become applicable to the Purchasers as a result of the Purchasers and the Company fulfilling their obligations or exercising their rights under the Transaction Documents, including without limitation as a result of the Company’s issuance of the Securities and the Purchasers’ ownership of the Securities.