Public Domain if at the time of receipt by the party the Confidential Information is in the public domain or if, after the time of receipt by either party, the Confidential Information enters the public domain (except where it does so as a result of a breach by either party of its obligations under this clause 20 or a breach by any other person of that person’s obligation of confidence);
Excluded Confidential Information The obligations of the Receiving Party pursuant to the provisions of this Agreement shall not apply to any Confidential Information that: 8.1 is known to, or in the possession of the Receiving Party prior to disclosure thereof by the Disclosing Party; 8.2 is or becomes publicly known, otherwise than as a result of a breach of this Agreement by the Receiving Party; 8.3 is developed independently of the Disclosing Party by the Receiving Party in circumstances that do not amount to a breach of the provisions of this Agreement; 8.4 is disclosed by the Receiving Party to satisfy an order of a court of competent jurisdiction or to comply with the provisions of any law or regulation in force from time to time; provided that in these circumstances, the Receiving Party shall advise the Disclosing Party to enable the Disclosing Party to take whatever steps it deems necessary to protect its interests in this regard and provided further that the Receiving Party will disclose only that portion of the Confidential Information which it is legally required to disclose and the Receiving Party will use its reasonable endeavours to protect the confidentiality of such Confidential Information to the greatest extent possible in the circumstances; 8.5 is disclosed to a third party pursuant to the prior written authorisation and Ltd to the extent of such approval of the Disclosing Party; 8.6 is received from a third party in circumstances that do not result in a breach of the provisions of this Agreement.
Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.
Protected Information 5.3.1 In this Section "Protected Information" means:
Confidential or Proprietary Information The term "Confidential --------------------------------------- or Proprietary Information" for purposes of this Agreement shall mean any secret, confidential, or proprietary information of SunTrust or a SunTrust Affiliate (not otherwise included in the definition of Trade Secret in (S) 1.23 of this Agreement) that has not become generally available to the public by the act of one who has the right to disclose such information without violating any right of SunTrust or a SunTrust Affiliate.
E4 Confidential Information Except to the extent set out in this clause or where disclosure is expressly permitted elsewhere in this Contract, each Party shall:
Proprietary and Confidential Information The Distributor agrees on behalf of itself and its managers, officers, and employees to treat confidentially and as proprietary information of the Trust, all records and other information relative to the Trust and prior, present or potential shareholders of the Trust (and clients of said shareholders), and not to use such records and information for any purpose other than the performance of its responsibilities and duties hereunder, except (i) after prior notification to and approval in writing by the Trust, which approval shall not be unreasonably withheld and may not be withheld where the Distributor may be exposed to civil or criminal contempt proceedings for failure to comply, (ii) when requested to divulge such information by duly constituted authorities, or (iii) when so requested by the Trust. Records and other information which have become known to the public through no wrongful act of the Distributor or any of its employees, agents or representatives, and information that was already in the possession of the Distributor prior to receipt thereof from the Trust or its agent, shall not be subject to this paragraph. Further, the Distributor will adhere to the privacy policies adopted by the Trust pursuant to Title V of the Gxxxx-Xxxxx-Xxxxxx Act, as may be modified from time to time. In this regard, the Distributor shall have in place and maintain physical, electronic and procedural safeguards reasonably designed to protect the security, confidentiality and integrity of, and to prevent unauthorized access to or use of, records and information relating to the Trust and its shareholders.
Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.
Non-Confidential Information The term “Confidential Information” shall not include any information which: (i) is in the public domain at the time of disclosure or enters the public domain following disclosure through no fault of the receiving Party, (ii) the receiving Party, through competent evidence, can demonstrate knowledge prior to disclosure, (iii) is disclosed to the receiving Party by a third party legally entitled to make such disclosure without violation of any obligation of confidentiality or (iv) is independently developed by the receiving Party without reference to the disclosing Party’s Confidential Information as evidenced by the written records of the receiving Party.
Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.