Confidentiality and Information Security. A. BOSTON FINANCIAL agrees on behalf of itself, its affiliates, its officers and employees, except as provided in Section 19.D. hereof, or as otherwise required by law, BOSTON FINANCIAL will keep confidential all records and data of and information in its possession relating to the Trust or its shareholders or shareholder accounts in any form disclosed to BOSTON FINANCIAL hereunder, including but not limited to any data and information in any form disclosed by the Trust, anyone acting on behalf of the Trust, or the Trust’s customers, prospective customers, or employees to BOSTON FINANCIAL, BOSTON FINANCIAL Personnel or any Subcontractor including Consumer Information (as “Consumer Information” is defined in SEC Regulation S-P) and non-public information which is learned by BOSTON FINANCIAL without the Trust’s intentional disclosure to it. Such information includes all Trust software, specifications, documentation, product proposals, financial information, data, source or object code, documentation, manuals, studies, internally devised technology, system or network architecture or topology, security mechanisms, product or processing capacities, revenues, information relating to the business of the Trust (including internal procedures and policies, businesses plans, and products of the Trust), and all other trade secret, confidential or proprietary information and documentation of the Trust or its customers, prospective customers, employees, directors, outside directors, retirees and their respective spouses and families received in connection with this Agreement (whether or not it is designated as such) (collectively, the “Trust’s Confidential Information”). BOSTON FINANCIAL shall not disclose the same to any person except at the instruction (standing or specific), request or with the consent of the Trust. Notwithstanding the foregoing, BOSTON FINANCIAL shall be permitted in the ordinary course of business to provide such information to third parties providing services to BOSTON FINANCIAL which BOSTON FINANCIAL utilizes in connection with the services BOSTON FINANCIAL provides to the Trust under this Agreement or in accordance with Section 19.D. of this Agreement and where such third parties have entered into confidentiality agreements with BOSTON FINANCIAL that contain provisions at least as restrictive as those contained herein.
(1) BOSTON FINANCIAL acknowledges that any unauthorized use, misuse, disclosure or taking of the Trust’s Confidential Informatio...
Confidentiality and Information Security. ● Employee will apply approved safeguards, in accordance with agency policy, to protect agency or state records from unauthorized disclosure or damage, and will comply with all records and data privacy requirements set forth in state law agency specific policies, and state policies. ● Employee will conduct work at the alternate work location in compliance with all information security standards.
Confidentiality and Information Security. 8.01 You acknowledge that The Freedom of Information and Protection of Privacy Act (“FIPPA") and PHIA each impose obligations on the WCB to collect, use or disclose "personal information" and "personal health information", as those terms are defined in FIPPA and PHIA (collectively called "Personal Information"), in the strictest of confidence, and in accordance with those Acts. In performing the Services under the Agreement, you acknowledge that you may collect, use, or have access to Personal Information.
8.02 While the Agreement is in effect, and at all times thereafter, you agree to treat as confidential all information andmaterials acquired by you, or to which you have been given access, in the course of the performance of the Agreement (collectively called "Confidential Information"), excluding information that is in the public domain (for greater certainty, this does not include information in the public domain which was made public as a result of an unauthorized disclosure by a third party). For the purposes of the Agreement, Personal Information shall be considered to be Confidential Information.
8.03 You agree that during the Term of the Agreement and at all times thereafter:
(a) the Personal Information disclosed to you by the WCB may only be used by you in a manner expressly permittedby FIPPA or PHIA (as the case may be);
(b) you shall not disclose or permit the disclosure of Confidential Information, or any copies of it, in any format, to any third party without the express prior written consent of the WCB;
(c) you shall comply with all directives given to you by the WCB with respect to safeguarding, or otherwise ensuringthe confidentiality, of any Confidential Information disclosed to you by the WCB;
(d) you shall ensure that access to the Confidential Information by your Representatives is on a "need-to-know" basis, and that access, when given, shall be to the minimum amount of Confidential Information necessary to accomplish the task;
(e) you shall use the Confidential Information only for those purposes that have been expressly permitted by the WCB;
(f) you shall not reproduce Confidential Information, in any format, without the express prior written consent of the WCB, provided that you shall be able to reasonably reproduce the Confidential Information for internal use onlyin the normal performance of the Services;
(g) you shall ensure that you and your Representatives do not transport or store any Confidential Information outsideof Canada...
Confidentiality and Information Security. (1) SELLER shall keep confidential and secure at all times Personal Data relating to the Data Subjects.
(2) SELLER shall take reasonable steps to ensure the reliability of any SELLER personnel who have access to the Personal Data.
(3) SELLER shall ensure that all SELLER personnel required to access the Personal Data are informed of the confidential nature of the Personal Data and comply with the obligations set out in this Contract.
(4) SELLER shall ensure that none of the its personnel publish, disclose or divulge any of the Personal Data to any third party unless directed in writing to do so by LOCKHEED XXXXXX.
Confidentiality and Information Security. Processor shall keep Personal Data strictly confidential and represents that it has implemented adequate physical, technical and organizational measures, which are reasonable based upon the sensitivity of the Personal Data and/or necessary to secure the Personal Data and to prevent unauthorized access, disclosure, alteration or loss of the same in light of the relevant risks presented by the Processing. In particular, such measures shall include, but shall not be limited to: • Preventing access by unauthorized persons to Processing facilities and systems, where Personal Data is Processed or used (physical access control). • Preventing unauthorized use of Processing systems (admission control). • Ensuring that those persons authorized to use a Processing system are only able to access Personal Data within the scope of their access rights, and that Personal Data cannot be read, copied, modified or deleted without authorization during Processing or use and after recording (virtual access control). • Ensuring that, during electronic transfer, transportation or when being saved to data carriers, Personal Data cannot be read, copied, modified or deleted without authorization, and that it is possible to check and establish to which bodies the transfer of Personal Data by means of data transmission facilities is envisaged (transmission control). • Ensuring that it is possible to check and ascertain whether and by whom Personal Data has been accessed, modified or deleted from Processing systems (input control), and ensuring that such access, modification and deletion of Personal Data is, in fact, monitored for any unusual or suspicious activities. • Ensuring that Personal Data Processed under these Terms can only be Processed in accordance with the instructions issued by JCI (assignment control). • Ensuring that Personal Data is protected against accidental malfunctions or loss (availability control). • Ensuring that Personal Data collected for different purposes can be Processed separately (separation control). • Maintaining a process for regularly testing, assessing and evaluating the effectiveness of physical, technical and organizational measures to ensure the security of the Processing. • Ensuring that Processor has developed and implemented appropriate privacy and data protection policies and procedures, and that all Personnel who are involved in Processing the Personal Data have been appropriately trained to Process the Personal Data in accordance with such ...
Confidentiality and Information Security. 13.1 The parties shall keep confidential all information relating to this Agreement or the other par- ty, its business, operations and customers unless such information has become public knowledge (otherwise than in breach of this clause) or disclosure is required by law or a party’s regulatory body or disclosure is made in confidence to a party’s professional advisers. This clause shall survive termination of this Agreement.
13.2 The Service Provider acknowledges that the Borsa Italiana may record telephone calls and emails between the Service Provider and the Borsa Italiana for regulatory or security purposes.
13.3 In storing and processing personal information for the purposes of this Agreement, each Party shall comply with the provisions of the Legislative Decree 196 dated 30 June 2003. Each party agrees to indemnify the other in respect of any claims, demands or losses incurred by the non- defaulting party in respect of any breach of this Article.
Confidentiality and Information Security. We have implemented and will maintain appropriate technical and organizational security measures for the Processing of Personal Data designed to prevent accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data. These security measures govern all areas of security applicable to the Integrations, including physical access, system access, data access, transmission and encryption, input, data backup, data segregation and security oversight, enforcement, and other security controls and measures. All Xxxxxxxxxxxxx.xx employees, as well as any Sub-Processors that Process Personal Data, are subject to appropriate written confidentiality arrangements or are otherwise bound by statutory obligations of confidentiality. Data Breach Incidents. If we become aware of a Personal Data Breach while providing the Integrations under the Agreement, we will inform you without undue delay. We will take appropriate measures to address the Personal Data Breach, including, where appropriate, securing Personal Data, and will work in good faith to reduce risk to the Data Subjects whose Personal Data was involved. Applicable Data Protection Laws may impose a duty to inform the competent authorities or affected Data Subjects in the event of the loss or unlawful disclosure of Personal Data or access to it, and we agree to provide you with sufficient information to allow you to meet any obligations to report or inform Data Subjects of the Personal Data Breach under applicable Data Protection Laws. We will cooperate with you and take reasonable steps as necessary to assist in the investigation, mitigation, and remediation of each Personal Data Breach. You agree that you are responsible for and will coordinate the messaging related to any privacy violation, security breach, or data breach incident with us prior to making any public disclosures. Deletion of Customer Data. Xxxxxxxxxxxxx.xx will, except to the extent provided in the Agreement or prohibited by applicable law, destroy and delete all Customer Data subject to Processing in accordance with the timeframes set forth in our Product Specific Terms, and the right to have Customer Data returned to you shall expire after such date or time frame. Legal Requirements. We may be required by law to provide access to Personal Data, such as to comply with a subpoena or other legal process, or to respond to government requests, including public and government authorities for national security a...
Confidentiality and Information Security. (a) Confidentiality of Agreement. Purchaser and Seller shall employ proper procedures and standards designed to maintain the confidential nature of the terms of this Agreement, except to the extent: (a) the disclosure thereof is reasonably believed by such party to be required in connection with regulatory requirements or other legal requirements relating to its affairs; (b) disclosed to any one or more of such party’s employees, officers, directors, agents, attorneys or accountants who would have access to the contents of this Agreement and such data and information in the normal course of the performance of such person’s duties for such party, to the extent such party has procedures in effect to inform such person of the confidential nature thereof; (c) disclosed in a prospectus, prospectus supplement or private placement memorandum relating to a securitization of the Mortgage Loans by Purchaser (or an affiliate assignee thereof) or to any Person in connection with the resale or proposed resale of all or a portion of the Mortgage Loans by such party in accordance with the terms of this Agreement; or (d) reasonably believed by such party to be necessary for the enforcement of such party’s rights under this Agreement.
Confidentiality and Information Security. (a) Subject to Section 16(b), the Bank will hold all Confidential Information in confidence and will not disclose any Confidential Information except as may be required by Applicable Law, a regulator with jurisdiction over the Bank’s business, or with the consent of the Customer.
(b) The Customer authorizes the Bank to disclose Confidential Information to:
(i) any Subcustodian, subcontractor, agent, Securities Intermediary, securities exchange, broker, third party agent, proxy solicitor, issuer, or any other person that the Bank believes is reasonably required in connection with the Bank’s provision of relevant services under this Agreement;
(ii) its professional advisors, auditors or public accountants;
(iii) its branches and Affiliates; and
(iv) any revenue authority or any governmental entity in relation to the processing of any tax claim.
(c) Except as otherwise required by Applicable Law or as needed to enforce the terms of this Agreement, the parties shall hold the terms and conditions, including, without limitation, any commercial terms, of this Agreement in confidence.
(d) The Bank shall maintain an information technology risk and data security management program (the “Information Security Program”) which meets or exceeds industry standards and Applicable Law. The Information Security Program is designed to: • Provide security and protect the confidentiality of Personal Information; • Protect against anticipated threats or risks to the security or integrity of Personal Information; • Protect against unauthorized access to, or use of, such Personal Information that could result in harm or inconvenience to any customer or employee; • Provide direction for proper storage, transport and disposal of Personal Information; • Help employees understand their responsibilities with respect to the protection of Personal Information and security of the Bank’s systems; • Require that the Bank’s key third-party service providers adhere to specific security policies and standards, as well as regulatory obligations as applicable; and • Adhere to all applicable legal and regulatory requirements regarding the protection of Personal Information.
(e) The Bank shall respond to Customer’s reasonable requests for information concerning the Information Security Program. The Bank also agrees, when requested, to complete the security questionnaire provided by Customer.
(f) The Bank has incident response policies and processes in place for responding to any suspected unauthor...
Confidentiality and Information Security. The Power Team Member agrees to give Synergy Success Network access to certain confidential information relating to the affairs of the business solely for the purpose of fulfilment of the agreement.