Confidential Institutional Information Sample Clauses

Confidential Institutional Information. Supplier agrees to hold UC’s Confidential Institutional Information, and any information derived therefrom, in strict confidence. Confidential Institutional Information shall be defined as any Institutional Information which is (i) marked as “Confidential” at the time of disclosure; (ii) if disclosed orally, identified at the time of such oral disclosure as confidential, and reduced to writing as “Confidential” within thirty (30) days of such oral disclosure; and (iii) if not marked as “Confidential,” information that would be considered by a reasonable person in the relevant field to be confidential given its content and the circumstances of its disclosure. Confidential Information will not be considered confidential to the extent that: (i) Supplier can demonstrate by written records was known to Supplier prior to the effective date of the Agreement; (ii) is currently in, or in the future enters, the public domain other than through a breach of the Agreement or through other acts or omissions of Supplier; (iii) is obtained lawfully from a third party; or (iv) is disclosed under the California Public Records Act or legal process. For the avoidance of doubt, as applicable to Supplier’s Services, Confidential Institutional Information may include any information that identifies or is capable of identifying a specific individual, including but not limited to:
AutoNDA by SimpleDocs
Confidential Institutional Information. Supplier agrees to hold UC’s Confidential Institutional Information, and any information derived therefrom, in strict confidence. Confidential Institutional Information shall be defined as any Institutional Information that is:

Related to Confidential Institutional Information

  • Prime Confidential Information The following shall constitute Confidential Information of the Contractor and should not be disclosed to third (3rd) parties: the deliverables, discoveries, ideas, concepts, software [in various stages of development], designs, drawings, specifications, techniques, models, data, source code, source files, object code, documentation, diagrams, flow charts, research, development, processes, procedures, “know-how”, marketing techniques and materials, marketing and development plans, customer names and other information related to customers, price lists, pricing policies and financial information, this Agreement and the existence of this Agreement, the relationship between the Contractor and Subcontractor, and any details of the Service under this Agreement. Subcontractor agrees not to use or reference the Contractor and/or their names, likenesses, or logos (“Identity”). Subcontractor will not use or reference Contractor or their Identity, directly or indirectly, in conjunction with any other third (3rd) parties.

  • Treatment of Confidential Information (a) The Parties shall not, and shall cause all other Persons providing Services or having access to information of the other Party that is known to such Party as confidential or proprietary (the “Confidential Information”) not to, disclose to any other Person or use, except for purposes of this Agreement, any Confidential Information of the other Party; provided, however, that the Confidential Information may be used by such Party to the extent that such Confidential Information has been (i) in the public domain through no fault of such Party or any member of such Group or any of their respective Representatives or (ii) later lawfully acquired from other sources by such Party (or any member of such Party’s Group), which sources are not themselves bound by a confidentiality obligation; provided, further, that each Party may disclose Confidential Information of the other Party, to the extent not prohibited by applicable Law: (A) to its Representatives on a need-to-know basis in connection with the performance of such Party’s obligations under this Agreement; (B) in any report, statement, testimony or other submission required to be made to any Governmental Authority having jurisdiction over the disclosing Party; or (C) in order to comply with applicable Law, or in response to any summons, subpoena or other legal process or formal or informal investigative demand issued to the disclosing Party in the course of any litigation, investigation or administrative proceeding. In the event that a Party becomes legally compelled (based on advice of counsel) by deposition, interrogatory, request for documents subpoena, civil investigative demand or similar judicial or administrative process to disclose any Confidential Information of the other Party, such disclosing Party shall provide the other Party with prompt prior written notice of such requirement, and, to the extent reasonably practicable, cooperate with the other Party (at such other Party’s expense) to obtain a protective order or similar remedy to cause such Confidential Information not to be disclosed, including interposing all available objections thereto, such as objections based on settlement privilege. In the event that such protective order or other similar remedy is not obtained, the disclosing Party shall furnish only that portion of the Confidential Information that has been legally compelled, and shall exercise its commercially reasonable efforts (at such other Party’s expense) to obtain assurance that confidential treatment will be accorded such Confidential Information.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Confidential Information Each party agrees that all code, inventions, know-how, business, technical and financial information it obtains (“Receiving Party”) from the disclosing party (“Disclosing Party”) constitutes the confidential information of the Disclosing Party (“Confidential Information”), provided that it is identified as confidential at the time of disclosure or should be reasonably known by the Receiving Party to be Confidential Information due to the nature of the information disclosed and the circumstances surrounding the disclosure. The Services and any updates, upgrades, modifications, derivatives, specifications, technical guides, other software, or other documentation provided by Xxxxxx (or its agents) shall be deemed Confidential Information of Xxxxxx without any marking or future designation. Except as expressly authorized herein, the Receiving Party will hold in confidence and not use or disclose any Confidential Information. The Receiving Party’s nondisclosure obligation shall not apply to information which the Receiving Party can document: (i) was rightfully in its possession or known to it prior to receipt of the Confidential Information; (ii) is or has become public knowledge through no fault of the Receiving Party; (iii) is rightfully obtained by the Receiving Party from a third party without breach of any confidentiality obligation; (iv) is independently developed by employees of the Receiving Party who had no access to such information; or (v) is required to be disclosed pursuant to the regulation, law, or court order (but only to the minimum extent required to comply with such regulation or order and with advance notice to the Disclosing Party). The Receiving Party acknowledges that disclosure of Confidential Information would cause substantial harm for which damages alone may not be a sufficient remedy, and therefore that upon any such disclosure by the Receiving Party the Disclosing Party shall be entitled to seek appropriate equitable relief in addition to whatever other remedies it might have at law. Upon termination or expiration of this Agreement, if Xxxxxx is in possession of any Customer Materials, Xxxxxx shall delete, return, or make available to Customer all Customer Materials then in its possession. Upon request by Customer within thirty (30) days after any expiration or termination of the applicable Order Form, Xxxxxx will either make Customer Materials available to Customer through the Services on a limited basis solely for the purposes of data retrieval or will reasonably assist Customer with such retrieval. After such thirty (30) day period, Xxxxxx will have no obligation to maintain or provide any Customer Materials and, unless legally prohibited, may delete all Customer Materials. Customer acknowledges that certain Xxxxxx Services do not store or maintain Customer Materials.

  • Security of Confidential Information 36.1 In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Contract, the Contractor undertakes to maintain security systems approved by the Authority. Any such approval shall not however thereby relieve the Contractor of any liability.

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Protection of Confidential Information (a) Contractor and Contractor Parties, at their own expense, have a duty to and shall protect from a Confidential Information Breach any and all Confidential Information which they come to possess or control, wherever and however stored or maintained, in a commercially reasonable manner in accordance with current industry standards.

  • Confidential Information and Privacy (a) All non-public, confidential or proprietary information of Service Provider or Customer, as applicable, including, but not limited to, trade secrets, technology, inventions, samples, research, product designs, business plans, implementation plans, processes, document templates, information pertaining to business operations, methodologies, and strategies, and information pertaining to customers, pricing, and marketing (collectively, "Confidential Information"), disclosed by Service Provider or Customer (in such role the “Disclosing Party”) or Disclosing Party’s officers, directors or employees, whether disclosed orally or disclosed or accessed in written, electronic or other form or media, and whether or not marked, designated or otherwise identified as "confidential," in connection with the provision of the Services and this Agreement is confidential, and shall not be disclosed or copied by recipient Customer or Service Provider (in such role the “Recipient”), or Recipient’s officers, directors or employees, without the prior written consent of the Disclosing Party. Confidential Information does not include information that is:

  • Disclosure of Confidential Information Any Finance Party may disclose:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!