Con dentiality. The cuddle therapist undertakes to maintain con dentiality: everything mentioned and experienced during the session or in the follow-up discussion remains between the client and the cuddle therapist. An exception is the situation of supervision in which the cuddle session is discussed for a professional purpose. In this case the anonymity of the client is preserved. Other exceptions include information that legally obliges the cuddle therapist to revoke his or her promise of con dentiality. Photos and other forms of recording are prohibited.
Con dentiality. Finally we consider the con dentiality of message contents. We use SCS1 as an example, as discussions for SCS2 are similar. Given the signcrypted text (c; r; s) of a message m from Xxxxx, an attacker can obtain u = (ya gr)s = gx mod p. Thus to the attacker, data related to the signcrypted text of m include: q, p, g, ya = gxa mod p, yb = gxb mod p, u = gx mod p, c = Ek1 (m), r = KHk2 (m), and s = x=(r + xa) mod q. We wish to show that it is computationally infeasible for the attacker to nd out any partial information on the message m from the related data listed above. We will achieve our goal by reduction: we will reduce the con dentiality of another encryption scheme to be de xxx shortly (called Ckh for convenience) to the con dentiality of SCS1. 2 b The encryption scheme Ckh is based on ElGamal encryption scheme. With this encryp- tion scheme, the ciphertext of a message m to be sent to Bob is de xxx as ( c = Ek1 (m), u = gx mod p, r = KHk (m) ) where (1) x is chosen uniformly at random from [1; : : : ; q 1], and (2) (k1; k2) = k = hash(yx mod p), It turns out Ckh is a slightly xxxx xx version of a scheme that has received special attention in [53, 5]. (See also earlier work [59].) Us- ing a similar argument as that in [53, 5], we can show in the following that for Ckh, it is computationally infeasible for an adaptive attacker to gain any partial information on m. We assume that there is an attacker for SCS1. Call this attacker ASCS1. We show how ASCS1 can be translated into one for Ckh, called ACkh . Recall that for a message m, the input to ASCS1 includes q, p, g, ya = gxa mod p, yb = gxb mod p, u = gx mod p, c = Ek1 (m), r = KHk2 (m). With the attacker ACkh for Ckh, however, its input includes: q, p, g, yb = gxb mod p, u = gx mod p, c = Ek (m), and r = KHk (m). One immediately identi es that two numbers that correspond to ya and s which are needed by ASCS1 as part of its input are currently missing from the input to ACkh . Thus, in order for ACkh to \call" the attacker ASCS1 \as a sub-routine", ACkh has to create two numbers corresponding to a ya and s in the input to ASCS1. Call these two yet-to-be-created numbers y0 and s0. y0 and kh a s0 have to have the right form so that AC can \fool" ASCS1. It turns out that such y0 and kh s0 can be easily created by AC
Con dentiality. 1. Each Receiving Party agrees:
Con dentiality. 16.1 You and we each agree to keep confidential the other’s Confidential Information. You and we will not use or disclose the other’s Confidential Information for any purpose, other than:
Con dentiality. 7.1 We will keep all information in your direct debit request con dential. We will make reasonable efforts to keep any such information that we have about you secure and to ensure that any of our employees or agents who have access to information about you do not make any unauthorised use, modi cation, reproduction or disclosure of that information.
Con dentiality. 9.1 Subject to the provisions of Clause 2.9, each party (including any and all Authorised Users) (the “Restricted Party”) shall, and shall ensure that every other member of its Group shall keep con dential and shall not use for its own purposes, nor disclose any other party’s or Group member’s Con dential Information which becomes known to the Restricted Party unless such Con dential Information is already in the public domain otherwise than by reason of a breach by the Restricted Party of its obligations under this Clause.
Con dentiality. Except for the speci c rights granted by this Agreement, USER shall not possess, use or disclose any Con dential Information without ASCI's prior written consent, and shall use reasonable care to protect the Con dential Information. USER shall be responsible for any breach of con dentiality by its employees. Con dential Information shall not be disclosed to ASCI’s competitors (whether directly or through an agent). All ASCI quotations, Invoices and Product Documentation shall be considered to be Con dential Information as de xxx in this section.
Con dentiality. Licensee will hold in con dence all documents, records, materials and all other information it receives from HBI in connection with the PACT Program (whether received before or after the date of this License), including the Guide and Workbook, provided, however, Licensee shall be permitted to provide the Workbook to Students in hardcopy only. At the request of HBI, Licensee, except as provided herein, shall return to HBI all copies of nonpublic documents and materials that have been furnished to Licensee, including the Guide and Workbook, (“Con dential Materials”). Con dential Materials shall not be communicated, distributed, or provided to any third party. The obligation of Licensee to treat Con dential Materials in con dence shall not apply to any information which (i) is or becomes available to Licensee from a source other than HBI, (ii) is or becomes available to the public other than as a result of disclosure by Licensee or its agents, or (iii) is required to be disclosed under applicable law or judicial process, but only to the extent it must be disclosed. Notwithstanding the foregoing, in the event that Licensee is required to disclose any Con dential Materials or information by applicable law, judicial process or rule of governmental agency, it is agreed that Licensee shall provide HBI with prior notice of such requirement and HBI may seek an appropriate protective order if it so desires.
Con dentiality. Neither party will use or disclose any Con dential Information of the other party without such party’s prior wri en consent except for the purpose of performing the applicable party’s obligations under this Agreement or if required by law, regulation, or court order (in which case, the applicable party will give the other as much notice as is reasonably practicable before disclosing the Con dential Information to provide the other party the opportunity to seek a protective order of the equivalent). Each party must use reasonable care to protect any Con dential Information received from the other party, and will not disclose such information, except to employees who need to know it and who are obligated to keep such information con dential. Nothing in this Agreement, including in this clause, prevents any party from raising issues of non-compliance with the law with any relevant public authority.
Con dentiality. The USER agrees that it will treat as con dential the SOFTWARE, the accompanying documentation, and all clauses and commercial information contained in this agreement (the existence of the present agree- ment not being itself considered as a con dential information), the LICENSE FILE, proposals and invoices sent by INRIA, and any communication or document marked INFORMATIONS CONFIDENTIELLES or CONFIDENTIAL. Unless with the prior written approval of the INRIA TECHNICAL OFFICIAL listed in clause 11, the USER agrees that it will not disclose any con dential information to any person, with the exception of employees of the USER, in which case disclosure shall be limited to what is necessary for use consistent with the terms of this agreement. All disclosures will be accompanied by a reminder to the person receiving the con dential information of the obligation to keep the information in con dence. The USER will take all reasonable measures, both during the DURATION of this agreement and during the period while the obligation of con dentiality stated by the present article will remain, to ensure that no unauthorized person has access to all or part of the con dential information to copy, reproduce or disclose by any means all or part of this con dential information. The stipulations relating to con dentiality are not applicable to information: • that the USER already possessed or otherwise obtained legally from INRIA, • that was already in the public domain, or that subsequently enters the public domain without fault or negligence of the obligations on the behalf of the USER, • or that must be revealed because of French law or a request by the proper authorities, but only to the limit of what is requested. This obligation of con dentiality remains for the legal duration of the intellectual property rights applying to the SOFTWARE after the expiration of this agreement for whatever cause, without permitting, after this period, either of the PARTIES to exploit or make use of information con dential to the other PARTY without prior written consent.