Confidentiality and integrity Sample Clauses
Confidentiality and integrity. (1) The Contractor is obligated to obligate the employees involved in the implementation of the work in writing to confidentiality in accordance with Article 5 para. 1 lit. f) GDPR. Furthermore, the Contractor shall ensure that the personnel deployed by it are sufficiently informed about GDPR regulations as well as other data protection requirements and are familiar with the instructions of the Client. The Contractor shall monitor compliance with data protection regulations.
(2) The obligation to confidentiality and integrity shall continue even after the activity has ended.
(3) The Client is obligated to treat any knowledge of the Contractor's business secrets and data security measures as confidential under the terms of the contract.
Confidentiality and integrity. 7.1 During your employment under this Agreement, you will not:-
7.1.1 directly or indirectly receive or obtain any discount, rebate, commission or other inducement (whether in cash or in kind) which is not authorised by regulations or guidelines from time to time governing dealings by executives on behalf of the Company, or, if you do, you will account immediately to the Company for the amount so received;
7.1.2 directly or indirectly disclose or make use of any Confidential Information for any purpose other than a legitimate purpose of the Company;
7.1.3 (except in the proper course of your duties under this Agreement) remove from Company premises or copy or allow others to copy the contents of any document, computer disk, tape or other tangible item which contains any Confidential Information or which belongs to the Company; or
7.1.4 at any time make any untrue or misleading statement relating to the Group.
Confidentiality and integrity. 1.1. We will ensure the Regional Procurement Team maintain the highest standards of confidentiality at the request of the YatH Region, an individual force, or an individual customer.
Confidentiality and integrity. Confidentiality allows two peers to exchange information with the guarantee that no third party will be able to access that information, even if it intercepts the communication. Integrity allows to peers to communicate with the guarantee that the messages they exchange will not be modified by a third party while in transit, or if they are modified the receiving party will detect it. Confiden- tiality is achieved via cryptographic algorithms that provide encryption services; while integrity is achieved via pseudo-random functions that make use of several hashing algorithms. Confidential- ity and integrity are usually implemented within the same protocol. Again, the differentiation in different protocols of this class is due to i) the strength of the encryption/message integrity algo- rithms and cryptographic procedures; ii) the length of the cryptographic material they use; and iii) the different protocols they are protecting. Some representative examples are: Authentication Header (AH) and Encapsulating Security Payload (ESP). They are part of the IPsec suite. AH is used to guarantee the integrity of the data sent in the IP packets, it does not provided confidentiality. It uses a keyed hash function (at least HMAC-MD5 and HMAC-SHA-1 have to be supported). EPS ensures confidentiality of the data with optional integrity. At least it must support HMAC-SHA1 for message authentication and AES in CBC mode for message encryption. Non Access Stratum (NAS) and PDCP (Packed Data Convergence Protocol). They are used in LTE networks. The NAS protocol, among other functions, provides confidentiality and message integrity to the signaling between the MME and the UE. PDCP supports the RRC control plane protocol between the UE and the eNodeB, as well as the user data-plane IP protocol. PDCP provides both encryption and message protection services to RRC, while only encryption services to user-plane IP packets.
Confidentiality and integrity. 11.1 In the course of your employment you will acquire confidential information about the Company (and any Group Company) and its products, plans, systems and processes, customers and suppliers, including secret information of a technical nature as to the design, operation, specifications, costing and development of products. You will also have close contact with and knowledge of the Company's customers with whom you deal, and fellow employees.
11.2 You must at all times (whether during your employment or after it terminates) keep confidential, and must not, except with the express prior written permission of the Company or where necessary in the proper exercise of your duties, directly or indirectly use, disclose to any third party, including any employee of the Company not authorised to receive such information, or fail to keep properly secure from disclosure, all secret or confidential information of whatever kind that may have come to your knowledge during or as a result of your employment by the Company, including but without limitation information relating to the Company, its technical processes, business plans, finances, staff, customers, prospective customers, suppliers or products, information of a like kind relating to any Group Company, information which has been disclosed to the Company in confidence by a third party, and any other information of a kind that would usually be regarded as secret or confidential.
11.3 For the avoidance of doubt you will not, without limit of time, disclose to any other person, directly or indirectly, without the prior written permission of the Company or use for your own purposes or those of any other person any secret or confidential information about the Company, its products, business, customers, suppliers or employees, including without limitation:- i) the identity of and terms of business of any supplier of the Company; ii) the identity of any customer of the Company, and information as to products supplied to such customer, prices charged for any such products, and requirements and likely future requirements of such customer; iii) the design and constructions of any of the Company's processes or products or any proposed or potential process or product and any information as to the software systems, engineering specifications or manufacturing methods of any such product or proposed or potential product; iv) the Company's business plans and intentions including prospective acquisitions and development opportun...
Confidentiality and integrity. 2.1 Equipment access control Measures Description Building security (Data centre) The property boundary of the operator is marked by structural ele- ments such as fences, gates, posts. Access to the controlled internal area is only possible through doors by ringing a bell. Access to the internal area is controlled by two mechanisms: with an electric door opener at the first door using an intercom to the con- trol room, and with a magnetic card at the second door using a lock- ing system. In the restricted area, the processing systems are protected by their own locking system. The premises are additionally monitored by video surveillance. Alarm plans exist for scenarios such as unauthorized intrusion. For further information, please refer to the XXX of the data centre operator. Accreditation(Data centre) The operators have lists of names of accredited persons at their dis- posal (positive list). Personnel with authorised access includes hard- ware maintenance personnel, project managers, senior manage- ment and IT security officers.Following a check of personal details, access is only permitted with an ID of a data centre operator. The entering and leaving of premises is logged.Visitors must be regis- tered and accompanied by an accredited person.For further infor- mation, please refer to the XXX of the data centre operator. Access logging (Data centre) Persons entering and leaving of the internal area are recorded by the operator, including name, company affiliation, time stamp (start & end of access). For further information, please refer to the XXX of the data centre operator. Video surveillance (Data centre) Additional video surveillance is available for all technical rooms, ac- cess routes and perimeter protection. This is available on the data centre premises and it is supported by additional motion sensors. For further information, please refer to the XXX of the data centre operator. Measures Description Alarm system (Data centre) Access routes and premises are monitored by an alarm system. Pro- cesses have been defined to deal with any issues/occurrences of note. For further information, please refer to the XXX of the data centre operator. Building security (Hannover office) The property boundary is marked by structural elements. The entrance can be accessed from 6:00 to 20:00; outside these hours, a key is needed. Access to the internal area (office entrance, reception area) is possi- ble with a personal NFC chip. Access to the offices is controlle...
Confidentiality and integrity. Personal Data remains confidential throughout processing and remains intact, complete and current during processing activities. Measures include: ● TemplateRobot has a central, secured repository of product source code, which is accessible only to authorized Personnel. ● All changes to TemplateRobot Platform’s source code are being tracked, thoroughly reviewed, and tested in an isolated environment before being accepted. ● All releases to production environment are additionally tested in an isolated staging environment, reviewed and approved before being deployed.
Confidentiality and integrity. 7.1 You agree that you will not directly or indirectly solicit, receive, obtain or offer any discount, rebate, commission, entertainment or other inducement (whether in cash or in kind) to or from any customer, supplier or potential customer or supplier or intermediary which is not authorised by regulations or guidelines from time to time governing dealings by executives on behalf of the Employer or, if you do, that you will account immediately to the Employer for the amount so received.
7.2 Without prejudice to your obligations at common law, your obligations concerning the preservation of the confidential information of the Employer and its Group Companies are in the terms set forth in the Carlton Cards Employee Handbook (as amended from time to time, with reference therein to the “Company” read as referring to the Employer and amended to apply in respect of the confidential information of the Employer and its Group Companies).
7.3 You agree not at any time during or after your Employment to make any untrue or misleading statement relating to the Employer or its Group Companies.
Confidentiality and integrity. 9.1 The preservation of confidentiality and the maintenance of integrity at all times by a participant are essential for the proper conduct of business in the SGS repo market.
9.2 Participants in SGS repo shall at all times treat the names and identities of parties to transactions as confidential to the parties involved. It is incumbent upon all participants to actively ensure that their own behavior contributes to the confidential nature of the transactions.
Confidentiality and integrity. Data processing The personal and non-personal data of the Traineeship Provider as submitted in the TSF and this Agreement is processed by XXXX.