Confidential Information Reporting Sample Clauses

Confidential Information Reporting. The Employer shall not give any confidential information about an employee to anyone without the permission of the employee concerned. The Employer shall restrict the transfer of all information related to the matter to seated members of the Council. If discussion is necessary in a meeting of the Council, it shall be “in camera”. If consultation or legal advice is desired, a lawyer and/or management representatives of the Employer may be approached. It is understood that the Employer will impress upon such management representatives that the matter remain confidential.
AutoNDA by SimpleDocs
Confidential Information Reporting. The Employer shall not give any confidential information about an Employee to anyone without the permission of the Employee concerned. The Employer shall restrict the transfer of all confidential Employee information to seated members of Council. Such information will be provided only when absolutely necessary. If discussion is necessary in a meeting of Council, it shall be “in camera”. If consultation or legal advice is desired, a lawyer and/or management representatives of the Employer may be approached. It is understood that the Employer will impress upon such management representatives that the matter remains confidential. The Employer will assume responsibility for any breach of confidentiality relating to this clause [Article 7(10(c)].

Related to Confidential Information Reporting

  • E4 Confidential Information Except to the extent set out in this clause or where disclosure is expressly permitted elsewhere in this Contract, each Party shall:

  • Maintaining Confidential Information Executive reaffirms his obligations under the Confidentiality Agreement. Executive acknowledges and agrees that the payments provided in Section 3 above shall be subject to Executive’s continued compliance with Executive’s obligations under the Confidentiality Agreement.

  • Prime Confidential Information The following shall constitute Confidential Information of the Contractor and should not be disclosed to third (3rd) parties: the deliverables, discoveries, ideas, concepts, software [in various stages of development], designs, drawings, specifications, techniques, models, data, source code, source files, object code, documentation, diagrams, flow charts, research, development, processes, procedures, “know-how”, marketing techniques and materials, marketing and development plans, customer names and other information related to customers, price lists, pricing policies and financial information, this Agreement and the existence of this Agreement, the relationship between the Contractor and Subcontractor, and any details of the Service under this Agreement. Subcontractor agrees not to use or reference the Contractor and/or their names, likenesses, or logos (“Identity”). Subcontractor will not use or reference Contractor or their Identity, directly or indirectly, in conjunction with any other third (3rd) parties.

  • Trade Secrets and Confidential Information (i) Executive represents and warrants that Executive (A) is not subject to any legal or contractual duty or agreement that would prevent or prohibit Executive from performing the duties contemplated by this Agreement or otherwise complying with this Agreement, and (B) is not in breach of any legal or contractual duty or agreement, including any agreement concerning trade secrets or confidential information owned by any other party. (ii) Executive agrees that Executive will not (A) use, disclose or reverse engineer Trade Secrets or Confidential Information for any purpose other than the Company’s Business, except as authorized in writing by the Company; (B) during Executive’s employment with the Company, use, disclose or reverse engineer (1) any confidential information or trade secrets of any former employer or third party or (2) any works of authorship developed in whole or in part by Executive during any former employment or for any other party, unless authorized in writing by the former employer or third party; or (C) upon Executive’s resignation or termination with the Company (1) retain Trade Secrets or Confidential Information, including any copies existing in any form (including electronic form), which are in Executive’s possession or control or (2) destroy, delete or alter Trade Secrets or Confidential Information without the Company’s prior written consent. (iii) The obligations under this Section 8 shall remain in effect as long as Trade Secrets and Confidential Information constitute trade secrets or confidential information under applicable law. The confidentiality, property and proprietary rights protections available in this Agreement are in addition to, and not exclusive of, any and all other rights to which the Company is entitled under federal and state law, including, but not limited to, rights provided under copyright laws, trade secret and confidential information laws and laws concerning fiduciary duties.

  • Confidential Information; Non-Disclosure In consideration of your access to certain Confidential Information (as defined below) of the Company, in connection with your business relationship with the Company, you hereby represent and agree as follows:

  • Confidential Information of Others Executive certifies that Executive has not, and will not, disclose or use during Executive’s time as an employee of the Company, any confidential information which Executive acquired as a result of any previous employment or under a contractual obligation of confidentiality or secrecy before Executive became an employee of the Company.

  • Return of Confidential Information Subject to Section 4.2(e) of this Agreement, upon the request of a party, the other party shall return all Confidential Information to the other; provided, however, (i) each party shall be permitted to retain copies of the other party’s Confidential Information solely for archival, audit, disaster recovery, legal and/or regulatory purposes, and (ii) neither party will be required to search archived electronic back-up files of its computer systems for the other party’s Confidential Information in order to purge the other party’s Confidential Information from its archived files; provided further, that any Confidential Information so retained will (x) remain subject to the obligations and restrictions contained in this Agreement, (y) will be maintained in accordance with the retaining party’s document retention policies and procedures, and (z) the retaining party will not use the retained Confidential Information for any other purpose.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Treatment of Confidential Information (A) Each party agrees that at all times during and after the terms of this Agreement, it shall use, handle, collect, maintain, and safeguard Confidential Information in accordance with (1) the confidentiality and non-disclosure requirements of this Agreement; (2) the GLB Act, as applicable and as it may be amended; and (3) such other Applicable Law, whether in effect now or in the future. (B) Without limiting the foregoing, the Receiving Party shall apply to any Confidential Information at least the same degree of reasonable care used for its own confidential and proprietary information to avoid unauthorized disclosure or use of Confidential Information under this Agreement. (C) Each party further agrees that: (1) The Receiving Party will hold all Confidential Information it obtains in strictest confidence and will use and permit use of Confidential Information solely for the purposes of this Agreement or as otherwise provided for in this Agreement, and consistent therewith, may disclose or provide access to its responsible employees or agents who have a need to know and are under adequate confidentiality agreements or arrangements and make copies of Confidential Information to the extent reasonably necessary to carry out its obligations under this Agreement; (2) Notwithstanding the foregoing, the Receiving Party may release Confidential Information as permitted or required by law or approved in writing by the Disclosing party, which approval shall not be unreasonably withheld and may not be withheld where the Receiving Party may be exposed to civil or criminal liability or proceedings for failure to release such information; (3) Additionally, Ultimus may provide Confidential Information typically supplied in the investment company industry to companies that track or report price, performance or other information regarding investment companies; and (4) The Receiving Party will immediately notify the Disclosing Party of any unauthorized disclosure or use, and will cooperate with the Disclosing Party to protect all proprietary rights in any Confidential Information.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!