Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.
Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Proprietary Information Obligations You acknowledge your continuing obligations under your Proprietary Information and Inventions Agreement, a copy of which is attached hereto as Exhibit A.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it.
Disclosure of Account Information to Third Parties We will disclose information to third parties about your account or the transfers you make:
KYC Information (i) Upon the reasonable request of the Lender made at least 1 day prior to the Closing Date, the Borrower shall have provided to the Lender the documentation and other information so requested in connection with applicable “know your customer” and anti-money-laundering rules and regulations, including the PATRIOT Act, in each case at least five days prior to the Closing Date. (ii) [reserved].
PLACEMENT AGENT’S INFORMATION The parties hereto acknowledge and agree that, for all purposes of this Agreement, the Placement Agent’s Information consists solely of the following information in the Prospectus: (i) the last paragraph on the front cover page concerning the terms of the offering by the Placement Agent; and (ii) the statements concerning the Placement Agent contained in the first paragraph under the heading “Plan of Distribution.”
Confidentiality Obligations Each Party or third party whose Confidential Information has been disclosed retains ownership of its Confidential Information. Each Party agrees to (i) protect the Confidential Information received from the Disclosing Party in the same manner as it protects the confidentiality of its own proprietary and confidential materials but in no event with less than reasonable care; and (ii) use the Confidential Information received from the Disclosing Party solely for the purpose of the Agreement. Upon termination of the Agreement or upon written request submitted by the Disclosing Party, whichever comes first, the Receiving Party shall return or destroy, at the Disclosing Party’s choice, all of the Disclosing Party’s Confidential Information. Notwithstanding the foregoing, AVEVA shall not be required to return or destroy any such Confidential Information if such return or destruction is impracticable or technically infeasible. Except with respect to its Affiliates, employees, contractors, or agents who need to know Confidential Information in order to support the performance of such Party’s obligations related to the Agreement, and who are contractually bound by confidentiality obligations that are at least as protective as those contained in the Agreement, neither Party shall, disclose to any person any Confidential Information received from the Disclosing Party without the Disclosing Party’s prior written consent. The Receiving Party will be responsible for any breach of this Section 5 (Confidentiality) by its Affiliates, employees, contractors, and agents and any third party to whom it discloses Confidential Information in accordance with this Section 5 (Confidentiality). For Confidential Information that does not constitute a “trade secret” under applicable law, these confidentiality obligations will expire three (3) years after the termination or expiration of the Agreement. For Confidential Information that constitutes a “trade secret” under applicable law, these confidentiality obligations will continue until such information ceases to constitute a “trade secret” under such applicable law. However, the Receiving Party may disclose Confidential Information pursuant to an order of a court or governmental agency, provided, that, if permitted by applicable law, the Receiving Party shall first notify the Disclosing Party of such order and afford the Disclosing Party the opportunity to seek a protective order relating to such disclosure. Notwithstanding anything to the contrary contained in this Agreement, Customer authorizes AVEVA to collect, use, disclose, and modify in perpetuity information or data (including, but not limited to, general usage information and measurements) that is provided by Customer in connection with the use or receipt of the Products and Support Services (or generated or created in the course of AVEVA providing the Products and Support Services) for the purposes of developing, improving, optimizing, and delivering Products and Support Services; provided, however, that any disclosure of such data shall only include information or data that AVEVA develops or derives from such collected data or information (but such disclosure will not include the actual underlying Confidential Information of Customer).
Exceptions to Confidentiality Obligations 4.1 This Agreement imposes no obligation upon the Recipient with respect to the City’s Confidential Material received hereunder that (a) the Recipient can promptly demonstrate with documentary evidence was already legitimately known to the Recipient without a duty of confidentiality prior to the disclosure thereof by the City, (b) is lawfully received by the Recipient from a third party, other than a supplier introduced to the Recipient by the City, without a duty of confidentiality, (c) has become general public knowledge through no act or fault on the part of the Recipient or the Recipient’s Team, or (d) the Recipient can promptly demonstrate with documentary evidence was independently developed by or for the Recipient without the use of any Confidential Material.