Confidentiality and integrity. (1) The Contractor is obligated to obligate the employees involved in the implementation of the work in writing to confidentiality in accordance with Article 5 para. 1 lit. f) GDPR. Furthermore, the Contractor shall ensure that the personnel deployed by it are sufficiently informed about GDPR regulations as well as other data protection requirements and are familiar with the instructions of the Client. The Contractor shall monitor compliance with data protection regulations.
Confidentiality and integrity. 7.1 During your employment under this Agreement, you will not:-
Confidentiality and integrity. 1.1. We will ensure the Regional Procurement Team maintain the highest standards of confidentiality at the request of the YatH Region, an individual force, or an individual customer. 1.2. Our supplier’s commercial information will not be divulged to other organisations unless expressly agreed by them or if required by Law. 1.3. We will maintain the highest standards of integrity in line with the Business Code of Conduct for procurers of goods and services (Part 1 Regional Procurement Policy) and other relevant integrity standards. Case by case basis. Case by case basis. Case by case basis. No. breaches of confidentiality as a proportion of confidential work undertaken. No. breaches of confidentiality No. challenges of integrity 2.
Confidentiality and integrity. Confidentiality allows two peers to exchange information with the guarantee that no third party will be able to access that information, even if it intercepts the communication. Integrity allows to peers to communicate with the guarantee that the messages they exchange will not be modified by a third party while in transit, or if they are modified the receiving party will detect it. Confiden- tiality is achieved via cryptographic algorithms that provide encryption services; while integrity is achieved via pseudo-random functions that make use of several hashing algorithms. Confidential- ity and integrity are usually implemented within the same protocol. Again, the differentiation in different protocols of this class is due to i) the strength of the encryption/message integrity algo- rithms and cryptographic procedures; ii) the length of the cryptographic material they use; and iii) the different protocols they are protecting. Some representative examples are: • Authentication Header (AH) and Encapsulating Security Payload (ESP). They are part of the IPsec suite. AH is used to guarantee the integrity of the data sent in the IP packets, it does not provided confidentiality. It uses a keyed hash function (at least HMAC-MD5 and HMAC-SHA-1 have to be supported). EPS ensures confidentiality of the data with optional integrity. At least it must support HMAC-SHA1 for message authentication and AES in CBC mode for message encryption. • Non Access Stratum (NAS) and PDCP (Packed Data Convergence Protocol). They are used in LTE networks. The NAS protocol, among other functions, provides confidentiality and message integrity to the signaling between the MME and the UE. PDCP supports the RRC control plane protocol between the UE and the eNodeB, as well as the user data-plane IP protocol. PDCP provides both encryption and message protection services to RRC, while only encryption services to user-plane IP packets. • TLS Record protocol [33]. It is the companion of the TLS Handshake protocol. It performs encryption, compression and message integrity functions using the algorithms negotiated by the TLS Handshake protocol.
Confidentiality and integrity. 19.1 Each party agrees not to disclose to any third party any information disclosed to it under this Joint Master Consortium Agreement and marked by the disclosing party as confidential or stated in writing to be confidential. This obligation shall remain in force for a period of five (5) years from the date of disclosure or from the termination date of this Joint Master Consortium Agreement, whichever is longer.
Confidentiality and integrity. Personal Data remains confidential throughout processing and remains intact, complete and current during processing activities. Measures include: ● Xxxx has a central, secured repository of product source code, which is accessible only to authorized Personnel. ● All changes to Xxxx Platform’s source code are being tracked, thoroughly reviewed, and tested in an isolated environment before being accepted. ● All releases to production environment are additionally tested in an isolated staging environment, reviewed and approved before being deployed.
Confidentiality and integrity. 11.1 In the course of your employment you will acquire confidential information about the Company (and any Group Company) and its products, plans, systems and processes, customers and suppliers, including secret information of a technical nature as to the design, operation, specifications, costing and development of products. You will also have close contact with and knowledge of the Company's customers with whom you deal, and fellow employees.
Confidentiality and integrity. 7.1 You agree that you will not directly or indirectly solicit, receive, obtain or offer any discount, rebate, commission, entertainment or other inducement (whether in cash or in kind) to or from any customer, supplier or potential customer or supplier or intermediary which is not authorised by regulations or guidelines from time to time governing dealings by executives on behalf of the Employer or, if you do, that you will account immediately to the Employer for the amount so received.
Confidentiality and integrity. 13.1 The Executive Employee is obligated to keep confidential during her employment relationship and after its termination all confidential information regarding information, knowledge, contacts and experience relating to the businesses, operations, properties, assets, liabilities and financial condition of the Company and the markets and industries in which it operates, including, without limitation, information relating to business plans and ideas, trade secrets, intellectual property, know-how, formulas, processes, research and development, methods, policies, materials, results of operations, financial and statistical data, personnel data and customers in and related to the markets and industries in which the Company operates, as well as her remuneration. This applies also in respect of other members of staff of the Company, unless her work requires her to disclose such information.
Confidentiality and integrity. 16.1 During the Executive’s employment under this Agreement, the Executive will not: