Classified Information Security Officer Sample Clauses

Classified Information Security Officer. In any pro- ceeding in a criminal case or appeal therefrom in which classified information is within, or is reasonably ex- pected to be within, the custody of the court, the court will designate a ‘‘classified information security offi- cer.’’ The Attorney General or the Department of Jus- xxxx Security Officer will recommend to the court a person qualified to serve as a classified information se- curity officer. This individual will be selected from the Litigation Security Group, Security and Emergency Planning Staff, Department of Justice, to be detailed to the court to serve in a neutral capacity. The court may designate, as required, one or more alternate clas- sified information security officers who have been rec- ommended in the manner specified above. The classified information security officer must be an individual with demonstrated competence in security matters. Prior to designation, the Department of Jus- xxxx Security Officer must certify in writing that the classified information security officer is properly cleared, i.e., possesses the necessary clearance for the level and category of classified information involved. The classified information security officer will be re- sponsible to the court for the security of all classified information in the court’s custody, including, but not limited to, any pleadings or other filings created in connection with the proceedings, and any form of infor- mation contained in any format, including testimony, notes, photographs, transcripts, documents, digital files, audio files or video files, stored on any type of equipment (e.g., computers, electronic storage devices, etc.). In addition, any matters relating to personnel, in- formation, or communications security will be the re- sponsibility of the classified information security offi- cer who will take measures reasonably necessary to ful- fill these responsibilities. The classified information security officer must notify the court and the Depart- ment of Justice Security Officer of any actual, at- tempted, or potential violation of security procedures.
AutoNDA by SimpleDocs

Related to Classified Information Security Officer

  • Classified Information In no event shall any of the Copyright Collateral, Patent Collateral or Trademark Collateral include any Copyright, Patent or Trademark, any application for a Copyright, Patent or Trademark, or any license or right under any Copyright, Patent or Trademark that is “classified” for reasons of national security or foreign policy under applicable laws or with respect to which Pledgor is not entitled to pledge, sublicense or assign pursuant to its terms or applicable law or regulation.

  • De-identified Information De-identified Information may be used by the Operator only for the purposes of development, product improvement, to demonstrate or market product effectiveness, or research as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Operator agrees not to attempt to re-identify De-identified Information and not to transfer De-identified Information to any party unless (a) that party agrees in writing not to attempt re- identification, and (b) prior written notice has been given to LEA who has provided prior written consent for such transfer. Operator shall not copy, reproduce or transmit any De-identified Information or other Data obtained under the Service Agreement except as necessary to fulfill the Service Agreement.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Requested Information with reasonable promptness, such other data and information relating to the business, operations, affairs, financial condition, assets or properties of the Company or any of its Subsidiaries or relating to the ability of the Company to perform its obligations hereunder and under the Notes as from time to time may be reasonably requested by any such holder of Notes.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Information The Buyer and its advisors, if any, have been, and for so long as the Note remain outstanding will continue to be, furnished with all materials relating to the business, finances and operations of the Company and materials relating to the offer and sale of the Securities which have been requested by the Buyer or its advisors. The Buyer and its advisors, if any, have been, and for so long as the Note remain outstanding will continue to be, afforded the opportunity to ask questions of the Company. Notwithstanding the foregoing, the Company has not disclosed to the Buyer any material nonpublic information and will not disclose such information unless such information is disclosed to the public prior to or promptly following such disclosure to the Buyer. Neither such inquiries nor any other due diligence investigation conducted by Buyer or any of its advisors or representatives shall modify, amend or affect Buyer’s right to rely on the Company’s representations and warranties contained in Section 3 below. The Buyer understands that its investment in the Securities involves a significant degree of risk. The Buyer is not aware of any facts that may constitute a breach of any of the Company's representations and warranties made herein.

  • Security of Confidential Information Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.

  • Excluded Information For purposes of this Agreement, the term “confidential and proprietary information” shall not include (i) information already known or independently developed by the recipient without the use of any confidential and proprietary information, or (ii) information known to the public through no wrongful act of the recipient.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!