Confidentiality and Information Security Sample Clauses

Confidentiality and Information Security. A. BOSTON FINANCIAL agrees on behalf of itself, its affiliates, its officers and employees, except as provided in Section 19.D. hereof, or as otherwise required by law, BOSTON FINANCIAL will keep confidential all records and data of and information in its possession relating to the Trust or its shareholders or shareholder accounts in any form disclosed to BOSTON FINANCIAL hereunder, including but not limited to any data and information in any form disclosed by the Trust, anyone acting on behalf of the Trust, or the Trust’s customers, prospective customers, or employees to BOSTON FINANCIAL, BOSTON FINANCIAL Personnel or any Subcontractor including Consumer Information (as “Consumer Information” is defined in SEC Regulation S-P) and non-public information which is learned by BOSTON FINANCIAL without the Trust’s intentional disclosure to it. Such information includes all Trust software, specifications, documentation, product proposals, financial information, data, source or object code, documentation, manuals, studies, internally devised technology, system or network architecture or topology, security mechanisms, product or processing capacities, revenues, information relating to the business of the Trust (including internal procedures and policies, businesses plans, and products of the Trust), and all other trade secret, confidential or proprietary information and documentation of the Trust or its customers, prospective customers, employees, directors, outside directors, retirees and their respective spouses and families received in connection with this Agreement (whether or not it is designated as such) (collectively, the “Trust’s Confidential Information”). BOSTON FINANCIAL shall not disclose the same to any person except at the instruction (standing or specific), request or with the consent of the Trust. Notwithstanding the foregoing, BOSTON FINANCIAL shall be permitted in the ordinary course of business to provide such information to third parties providing services to BOSTON FINANCIAL which BOSTON FINANCIAL utilizes in connection with the services BOSTON FINANCIAL provides to the Trust under this Agreement or in accordance with Section 19.D. of this Agreement and where such third parties have entered into confidentiality agreements with BOSTON FINANCIAL that contain provisions at least as restrictive as those contained herein.
AutoNDA by SimpleDocs
Confidentiality and Information Security. Employee will apply approved safeguards, in accordance with agency policy, to protect agency or state records from unauthorized disclosure or damage, and will comply with all records and data privacy requirements set forth in state law, agency specific policies, and state policies. • Employee will conduct work at the alternate work location in compliance with all information security standards.
Confidentiality and Information Security. (1) SELLER shall keep confidential and secure at all times Personal Data relating to the Data Subjects.
Confidentiality and Information Security. 13.1 The parties shall keep confidential all information relating to this Agreement or the other party, its business, operations and customers unless such information has become public knowledge (otherwise than in breach of this clause) or disclosure is required by law or a party’s regulatory body or disclosure is made in confidence to a party’s professional advisers. This clause shall survive termination of this Agreement.
Confidentiality and Information Security. Processor shall keep Personal Data strictly confidential and represents that it has implemented adequate physical, technical and organizational measures, which are reasonable based upon the sensitivity of the Personal Data and/or necessary to secure the Personal Data and to prevent unauthorized access, disclosure, alteration or loss of the same in light of the relevant risks presented by the Processing. In particular, such measures shall include, but shall not be limited to: • Preventing access by unauthorized persons to Processing facilities and systems, where Personal Data is Processed or used (physical access control). • Preventing unauthorized use of Processing systems (admission control). • Ensuring that those persons authorized to use a Processing system are only able to access Personal Data within the scope of their access rights, and that Personal Data cannot be read, copied, modified or deleted without authorization during Processing or use and after recording (virtual access control). • Ensuring that, during electronic transfer, transportation or when being saved to data carriers, Personal Data cannot be read, copied, modified or deleted without authorization, and that it is possible to check and establish to which bodies the transfer of Personal Data by means of data transmission facilities is envisaged (transmission control). • Ensuring that it is possible to check and ascertain whether and by whom Personal Data has been accessed, modified or deleted from Processing systems (input control), and ensuring that such access, modification and deletion of Personal Data is, in fact, monitored for any unusual or suspicious activities. • Ensuring that Personal Data Processed under these Terms can only be Processed in accordance with the instructions issued by JCI (assignment control). • Ensuring that Personal Data is protected against accidental malfunctions or loss (availability control). • Ensuring that Personal Data collected for different purposes can be Processed separately (separation control). • Maintaining a process for regularly testing, assessing and evaluating the effectiveness of physical, technical and organizational measures to ensure the security of the Processing. • Ensuring that Processor has developed and implemented appropriate privacy and data protection policies and procedures, and that all Personnel who are involved in Processing the Personal Data have been appropriately trained to Process the Personal Data in accordance with such ...
Confidentiality and Information Security. We have implemented and will maintain appropriate technical and organizational security measures for the Processing of Personal Data designed to prevent accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data. These security measures govern all areas of security applicable to the Integrations, including physical access, system access, data access, transmission and encryption, input, data backup, data segregation and security oversight, enforcement, and other security controls and measures. All Xxxxxxxxxxxxx.xx employees, as well as any Sub-Processors that Process Personal Data, are subject to appropriate written confidentiality arrangements or are otherwise bound by statutory obligations of confidentiality. Data Breach Incidents. If we become aware of a Personal Data Breach while providing the Integrations under the Agreement, we will inform you without undue delay. We will take appropriate measures to address the Personal Data Breach, including, where appropriate, securing Personal Data, and will work in good faith to reduce risk to the Data Subjects whose Personal Data was involved. Applicable Data Protection Laws may impose a duty to inform the competent authorities or affected Data Subjects in the event of the loss or unlawful disclosure of Personal Data or access to it, and we agree to provide you with sufficient information to allow you to meet any obligations to report or inform Data Subjects of the Personal Data Breach under applicable Data Protection Laws. We will cooperate with you and take reasonable steps as necessary to assist in the investigation, mitigation, and remediation of each Personal Data Breach. You agree that you are responsible for and will coordinate the messaging related to any privacy violation, security breach, or data breach incident with us prior to making any public disclosures. Deletion of Customer Data. Xxxxxxxxxxxxx.xx will, except to the extent provided in the Agreement or prohibited by applicable law, destroy and delete all Customer Data subject to Processing in accordance with the timeframes set forth in our Product Specific Terms, and the right to have Customer Data returned to you shall expire after such date or time frame. Legal Requirements. We may be required by law to provide access to Personal Data, such as to comply with a subpoena or other legal process, or to respond to government requests, including public and government authorities for national security a...
Confidentiality and Information Security. A. Except as required by law (including federal or state securities laws or regulations) or by the rules and regulations of any stock exchange or association on which securities of either party or any of its affiliates are traded, or in any proceeding to enforce the provisions of this Agreement, United and Contractor hereby agree not to publicize or disclose to any third party the terms or conditions of this Agreement or any of the Related Agreements without the prior written consent of the other parties thereto.
AutoNDA by SimpleDocs
Confidentiality and Information Security. 8.01 You acknowledge that The Freedom of Information and Protection of Privacy Act (“FIPPA") and PHIA each impose obligations on the WCB to collect, use or disclose "personal information" and "personal health information", as those terms are defined in FIPPA and PHIA (collectively called "Personal Information"), in the strictest of confidence, and in accordance with those Acts. In performing the Services under the Agreement, you acknowledge that you may collect, use, or have access to Personal Information.
Confidentiality and Information Security. (a) Confidentiality of Agreement. Purchaser and Seller shall employ proper procedures and standards designed to maintain the confidential nature of the terms of this Agreement, except to the extent: (a) the disclosure thereof is reasonably believed by such party to be required in connection with regulatory requirements or other legal requirements relating to its affairs; (b) disclosed to any one or more of such party’s employees, officers, directors, agents, attorneys or accountants who would have access to the contents of this Agreement and such data and information in the normal course of the performance of such person’s duties for such party, to the extent such party has procedures in effect to inform such person of the confidential nature thereof; (c) disclosed in a prospectus, prospectus supplement or private placement memorandum relating to a securitization of the Mortgage Loans by Purchaser (or an affiliate assignee thereof) or to any Person in connection with the resale or proposed resale of all or a portion of the Mortgage Loans by such party in accordance with the terms of this Agreement; or (d) reasonably believed by such party to be necessary for the enforcement of such party’s rights under this Agreement.
Confidentiality and Information Security. (a) Subject to Section 16(b), the Bank will hold all Confidential Information in confidence and will not disclose any Confidential Information except as may be required by Applicable Law, a regulator with jurisdiction over the Bank’s business, or with the consent of the Customer.
Time is Money Join Law Insider Premium to draft better contracts faster.