Confidentiality Personal Data Data Security Sample Clauses

Confidentiality Personal Data Data Security. 1Confidentiality. Seller may acquire knowledge of RMG Confidential Information (as defined below) in connection with its performance hereunder and agrees to keep such RMG Confidential Information in confidence during and following termination or expiration of this Agreement. "RMG Confidential Information" includes but is not limited to all information, whether written or oral, in any form, including without limitation, information relating to the research, development, products, methods of manufacture, trade secrets, business plans, customers, vendors, finances, personnel data, Work Product (as defined in Section 11, below), and other material or information considered proprietary by RMG relating to the current or anticipated business or affairs of RMG which is disclosed directly or indirectly to Seller. In addition, RMG Confidential Information means any third party's proprietary or confidential information disclosed to Seller in the course of providing Products to RMG. RMG Confidential Information does not include any information (i) which Seller lawfully knew without restriction on disclosure before RMG disclosed it to Seller,
AutoNDA by SimpleDocs
Confidentiality Personal Data Data Security. 11.1 CONFIDENTIALITY Seller may acquire knowledge of Apple Confidential Information (as defined below) in connection with its performance hereunder and agrees to keep such Apple Confidential Information in confidence during and following termination or expiration of this Agreement. "Apple Confidential Information" includes but is not limited to all information, whether written or oral, in any form, including without limitation, information relating to the research, development, products, methods of manufacture, trade secrets, business plans, customers, vendors, finances, personnel data, Work Product (as defined in provision 12, below), and other material or information considered proprietary by Apple relating to the current or anticipated business or affairs of Apple which is disclosed directly or indirectly to Seller. In addition, Apple Confidential Information means any third party's proprietary or confidential information disclosed to Seller in the course of providing Services or Goods to Apple. Apple Confidential Information does not include any information (i) which Seller lawfully knew without restriction on disclosure before Apple disclosed it to Seller, (ii) which is now or becomes publicly known through no wrongful act or failure to act of Seller, (iii) which Seller developed independently without use of the Apple Confidential Information, as evidenced by appropriate documentation, or (iv) which is hereafter lawfully furnished to Seller by a third party as a matter of right and without restriction on disclosure. In addition, Seller may disclose Confidential Information which is required to be disclosed pursuant to a requirement of a regulatory authority or law so long as Seller provides prompt notice to Apple of such requirement prior to disclosure. Seller agrees not to copy, alter, or directly or indirectly disclose any Apple Confidential Information. Additionally, Seller agrees to limit its internal distribution of Apple Confidential Information to Seller Parties who have a need to know, and to take steps to ensure that the dissemination is so limited, including the execution by Seller Parties of nondisclosure agreements with provisions substantially similar to those set forth in this Agreement. In no event will Seller use less than the degree of care and means that it uses to protect its own information of like kind, but in any event not less than reasonable care to prevent the unauthorized use of Apple Confidential Information. Seller further ...
Confidentiality Personal Data Data Security. 11.1 C onfidentiality. Vendor may acquire knowledge of Phase Four Confidential Information
Confidentiality Personal Data Data Security 

Related to Confidentiality Personal Data Data Security

  • Confidentiality and Data Security (a) The Custodian agrees to keep confidential, and to cause its employees and agents to keep confidential, all records of the Funds and information relating to the Funds, including without limitation information as to their respective shareholders and their respective portfolio holdings, unless the release of such records or information is made (i) in connection with the services provided under this Agreement, (ii) at the written direction of the applicable Fund or otherwise consented to, in writing, by the respective Funds, (iii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Custodian has determined, on the advice of counsel, that it is required to comply, or (iv) where the Custodian has determined, on the advice of counsel, that the failure to release such information would expose the Custodian to civil or criminal contempt proceedings; provided in the case of clause (iii) or (iv) the Custodian provides the applicable Fund written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Section 10(a), or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. Notwithstanding the foregoing but subject to Section 10(d), (1) the Custodian may use information regarding the Funds in connection with certain functions performed on a centralized basis by the Custodian, its affiliates or its or their service providers (including audit, accounting, risk, legal, compliance, sales, administration, product communication, relationship management, compilation and analysis of customer-related data and storage) and disclose such information to its affiliates and to its or their service providers who are subject to the confidentiality obligations hereunder with respect to such information, but only for the purpose of servicing the Funds in connection with the relationship contemplated by this Agreement or providing additional services to the Funds, and (2) the Custodian may aggregate Fund or Portfolio data with similar data of other customers of the Custodian (“Aggregated Data”) and may use Aggregated Data so long as such Aggregated Data represents such a sufficiently large sample that no Fund or Portfolio data can be identified either directly or by inference or implication. (b) Each Fund agrees to keep confidential all information obtained hereunder relating to the Custodian’s business (it being understood, however, that the existence and the terms of this Agreement are required to be publicly disclosed by the Funds), unless the release of such records or information is (i) necessary to facilitate the receipt of services provided under this Agreement, (ii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Fund has determined, on the advice of counsel, that it is required to comply, or (iii) where the Fund has determined, on the advice of counsel, that the failure to release such information would expose the Fund to civil or criminal contempt proceedings; provided in the case of clause (ii) or (iii) the Fund provides the Custodian written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Agreement, or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. (c) Notwithstanding any provision herein to the contrary, each party hereto agrees that any Nonpublic Personal Information, as defined under Section 248.3(t) of Regulation S-P (“Regulation S-P”), promulgated under the Xxxxx-Xxxxx-Xxxxxx Act (the “GLB Act”), disclosed or otherwise made accessible by a party hereunder is for the specific purpose of permitting the other party to perform its duties as set forth in this Agreement. Each party agrees that, with respect to such information, it will comply with Regulation S-P and the GLB Act and that it will not disclose any Nonpublic Personal Information received in connection with this Agreement to any other party, except to the extent necessary to carry out the services set forth in this Agreement or as otherwise permitted by Regulation S-P or the GLB Act. (d) Without limiting the generality of Section 10(a) hereof, the Custodian acknowledges and agrees that the Funds are prohibited by law from making selective public disclosure of information regarding portfolio holdings, that disclosure of any and all such information to the Custodian hereunder is made strictly under the conditions of confidentiality set forth in Section 10(a) hereof and solely for the purposes of the performance of custodial services hereunder, that any unauthorized disclosure or misuse of such information (including by the Custodian or any of its employees or agents, or any trading on the basis of such information by anyone in receipt of such information) may constitute a criminal offense of trading on or tipping of material inside information regarding publicly traded securities, that access to any and all such information regarding portfolio holdings of the Funds shall be restricted to those persons needing such information in the course of the performance of duties hereunder, and that the Custodian shall apprise all such persons having access of the obligation hereunder and under applicable law to prevent unauthorized disclosure of such confidential information. (e) The parties acknowledge and agree that any breach of Section 10(a) hereof would cause not only financial damage, but irreparable harm to the other party, for which money damages will not provide an adequate remedy. Accordingly, in the event of a breach of Section 10(a) hereof, the non-breaching party shall (in addition to all other rights and remedies it may have pursuant to this Agreement, including without limitation Section 8(g) hereof, and at law and in equity) be entitled to an injunction, without the necessity of posting any bond or surety, to restrain disclosure or misuse, in whole or in part, of any information in violation of Section 10(a) hereof. (f) The Custodian will implement and maintain a written information security program (the “Security Program”) that contains appropriate security measures designed to safeguard confidential records and information of the Funds consistent with applicable statutes, laws, rules and regulations, and definitive and binding guidance or interpretations by applicable authorities of any of the foregoing from time to time, including without limitation the personal information of the Funds’ shareholders, employees, trustees, directors and/or officers that the Custodian receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account with the Custodian. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. (g) The Security Program shall have administrative, technical and physical safeguards, appropriate to the type of information concerned, designed: (i) to maintain the security and confidentiality of records and information of the Funds; (ii) to protect against anticipated threats or hazards to the security or integrity of such records and information; and (iii) to protect against unauthorized access to or use of such records and information. The Custodian shall develop, implement and maintain, at its sole expense, a system or methodology to audit for compliance with the requirements of the preceding sentence that is consistent with the SOC controls framework. Such safeguards will include, but shall not be limited to, virus protection, password protection and encryption of data in transmission at a minimum standard of AES 256. The Custodian will provide the Fund, at least annually, with the most recent SOC reports of its systems and methodologies prepared by an independent third party, and will provide executive summaries of its most recent penetration and ethical hack testing of its internet-facing environment relevant to the systems used to provide services under this Agreement (in the form generally provided by the Custodian to other similarly situated customers of services similar to the services provided under this Agreement), as conducted by a qualified, independent third party selected by the Custodian. The Custodian shall maintain books and records sufficient to demonstrate its compliance with the terms of this Section 10(g). (h) Upon reasonable notice to the Custodian, the Custodian will arrange for its relevant subject matter experts to meet with the relevant subject matter experts of the Funds once annually and at such other times as the Funds may reasonably request to review the Custodian’s security controls and any deficiencies identified in the SSAE-18 audit reports, and for the Custodian to review with the Funds the penetration testing results and provide such additional information concerning the penetration tests as the Custodian determines to be prudent. At such meeting, the Funds may view the Custodian’s security-related policies and procedures; however, no documentation may be copied, shared, transmitted or removed from the Custodian’s premises, except as mutually agreed. In the event that the Funds identify any control deficiencies, the Custodian will discuss such findings with the Funds and will use reasonable efforts to develop a mutually agreeable remediation plan. All nonpublic documentation and information disclosed to the Funds in accordance with this Section 10(h) shall be deemed proprietary and confidential information of the Custodian. The Funds shall not disclose such documentation or information to any third party (except to the extent permitted, necessary or required pursuant to Section 10(b)) or use it for any purpose other than evaluating the Custodian’s security controls, except that the Funds may disclose the Custodian’s SSAE-18 summary to the Funds’ external auditors provided that such external auditors are required to maintain the confidentiality of the summary and any related information. (i) In the event of any actual or reasonably suspected, based on Custodian’s experience, breach of security of its systems resulting in the actual, probable or reasonably suspected unauthorized access to or acquisition, use, loss, destruction, compromise or disclosure of any of the confidential records or information of a Fund (each, a “Security Breach”), upon learning of the Security Breach, the Custodian shall notify such Fund as promptly as reasonably possible of the relevant facts related to such Security Breach then known to the Custodian, and of additional relevant facts promptly after they become known to the Custodian, in the manner provided in Section 12 hereof and also by sending notice to xxxxxxxxxxxxx@xxxxxxxxx.xxx and/or such other electronic mail address or addresses as a Fund may specify by written notice to the Custodian. The Custodian shall at its sole cost: (i) promptly investigate such Security Breach; (ii) resolve or mitigate the vulnerability that facilitated the Security Breach to the extent possible; (iii) restore any lost or damaged data using generally accepted data restoration techniques; and (iv) conduct a root cause analysis to provide the Fund with a summary of the findings and actions taken to prevent recurrence of such Security Breach. If a Security Breach occurs with respect to personal information in the possession or under the control of the Custodian or any of its affiliates, subsidiaries, agents or employees the Custodian shall be responsible for each Fund’s reasonable costs associated with responding to such Security Breach, including, but not limited to, the costs of notifying affected individuals and taking any remedial action required by applicable statutes, laws, rules and regulations and any such other remedial action that the Custodian reasonably deems necessary (with due regard for industry standards, if any). (j) If the Custodian uses any subsidiary or affiliate or, pursuant to Section 2.6(a), agent to perform the duties assigned to the Custodian by this Agreement, such subsidiary, affiliate or agent shall have appropriate controls in place to meet the objectives of this Section 10, and the Custodian shall exercise oversight over each such subsidiary, affiliate or agent to ensure ongoing compliance with the objectives of this Section 10. The Custodian will require each Foreign Sub-Custodian that it engages to provide services under this Agreement to establish and maintain reasonably designed safeguards and controls against the unauthorized access to and use of Fund data and information.

  • Confidentiality and Data Protection We are a data controller for the information you provide to us including individual, identification and financial details, policy history and special category data (such as medical or criminal history). Details of our legal basis for processing your information, along with details of any third party recipient whom it may be necessary to share your personal data with in order to fulfil the contract, retention period for data held, security of your data, your rights under the UK General Data Protection Regulations (UK GDPR) including the right to complain can be found in our full ‘Privacy Notice’ attached to these terms of business and/or on our website at xxx.xxxxxxxxxxxxxxxx.xx.xx.

  • Confidentiality of Vendor Data Vendor understands and agrees that by signing this Agreement, all Vendor Data is hereby released to TIPS, TIPS Members, and TIPS third-party administrators to effectuate Vendor’s TIPS Contract except as provided for herein. The Parties agree that Vendor Data is accessible by all TIPS Members as if submitted directly to that TIPS Member Customer for purchase consideration. If Vendor otherwise considers any portion of Vendor’s Data to be confidential and not subject to public disclosure pursuant to Chapter 552 Texas Gov’t Code (the “Public Information Act”) or other law(s) and orders, Vendor must have identified the claimed confidential materials through proper execution of the Confidentiality Claim Form which is required to be submitted as part of Vendor’s proposal resulting in this Agreement and incorporated by reference. The Confidentiality Claim Form included in Vendor’s proposal and incorporated herein by reference is the sole indicator of whether Vendor considers any Vendor Data confidential in the event TIPS receives a Public Information Request. If TIPS receives a request, any responsive documentation not deemed confidential by you in this manner will be automatically released. For Vendor Data deemed confidential by you in this manner, TIPS will follow procedures of controlling statute(s) regarding any claim of confidentiality and shall not be liable for any release of information required by law, including Attorney General determination and opinion. In the event that TIPS receives a written request for information pursuant to the Public Information Act that affects Vendor’s interest in any information or data furnished to TIPS by Vendor, and TIPS requests an opinion from the Attorney General, Vendor may, at its own option and expense, prepare comments and submit information directly to the Attorney General stating why the requested information is exempt from disclosure pursuant to the requirements of the Public Information Act. Vendor is solely responsible for submitting the memorandum brief and information to the Attorney General

  • Confidentiality & Proprietary Information The Consultant acknowledges that it will be necessary for the Client to disclose certain confidential and proprietary information to the Consultant in order for the Consultant to perform their duties under this Agreement. The Consultant acknowledges that disclosure to a third (3rd) party or misuse of this proprietary or confidential information would irreparably harm the Client. Accordingly, the Consultant will not disclose or use, either during or after the term of this Agreement, any proprietary or confidential information of the Client without the Client's prior written permission except to the extent necessary to perform the Services on the Client's behalf. Proprietary or confidential information includes, but is not limited to: a.) The written, printed, graphic, or electronically recorded materials furnished by Client for Consultant to use; b.) Any written or tangible information stamped "confidential," "proprietary," or with a similar legend, or any information that Client makes reasonable efforts to maintain the secrecy of, business or marketing plans or strategies, customer lists, operating procedures, trade secrets, design formulas, know-how and processes, computer programs and inventories, discoveries and improvements of any kind, sales projections, and pricing information; and c.) Information belonging to customers and suppliers of the Client about whom the Consultant gained knowledge as a result of the Consultant‘s Services to the Client. Upon termination of the Consultant's Services to the Client, or at the Client's request, the Consultant shall deliver all materials to the Client in the Consultant's possession relating to the Client's business. The Consultant acknowledges any breach or threatened breach of confidentiality under this Agreement will result in irreparable harm to the Client for which damages would be an inadequate remedy. Therefore, the Client shall be entitled to equitable relief, including an injunction, in the event of such breach or threatened breach of confidentiality. Such equitable relief shall be in addition to the Client's rights and remedies otherwise available at law. Furthermore, proprietary information, under this Agreement, shall include: a.) The product of all work performed under this Agreement ("Work Product"), including without limitation all notes, reports, documentation, drawings, computer programs, inventions, creations, works, devices, models, works-in-progress and deliverables, will be the sole property of the Client, and Consultant hereby assigns to the Client all right, title, and interest therein, including, but not limited to, all audiovisual, literary, moral rights and other copyrights, patent rights, trade secret rights, and other proprietary rights therein. Consultant retains no right to use the Work Product and agrees not to challenge the validity of the Client's ownership in the Work Product; b.) Consultant hereby assigns to the Client all right, title, and interest in any and all photographic images and videos or audio recordings made by the Client during Consultant's work for them, including, but not limited to, any royalties, proceeds, or other benefits derived from such photographs or recordings; and c.) The Client will be entitled to use the Consultant's name and/or likeness in advertising and other materials.

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • Privacy and Confidentiality A. Contractors may use or disclose Medi-Cal PII only to perform functions, acitivities or services directly related to the administration of the Medi-Cal program in accordance with Welfare and Institutions Code section 14100.2 and 42 Code of Federal Regulations section 431.300 et.seq, or as required by law. Disclosures which are required by law, such as a court order, or which are made with the explicit written authorization of the Medi-Cal client, are allowable. Any other use or disclosure of Medi-Cal PII requires the express approval in writing of DHCS. Contractor shall not duplicate, disseminate or disclose Medi-Cal PII except as allowed in the Agreement. B. Access to Medi-Cal PII shall be restricted to only contractor personnel who need the Medi-Cal Pii to perform their official duties in connection with the administration of the Medi-Cal program. C. Contractor and/or their personnel who access, disclose or use Medi-Cal PII in a manner or for a purpose not authorized by this Agreement may be subject to civil and criminal sanctions contained in applicable Federal and State statutes.

  • CONFIDENTIALITY/SAFEGUARDING OF INFORMATION The CONTRACTOR shall not use or disclose any information concerning the AGENCY, or information that may be classified as confidential, for any purpose not directly connected with the administration of this contract, except with prior written consent of the AGENCY, or as may be required by law.

  • Proprietary Information and Confidentiality Both before and during the term of Executive’s employment, Executive will have access to and become acquainted with Company confidential and proprietary information (together “Proprietary Information”), including but not limited to information or plans concerning the Company’s products and technologies; customer relationships; personnel; sales, marketing and financial operations and methods; trade secrets; formulae and secret developments and inventions; processes; and other compilations of information, records, and specifications. Executive will not disclose any of the Proprietary Information directly or indirectly, or use it in any way, either during his/her employment pursuant to this Agreement or at any time thereafter, except as reasonably required or specifically requested in the course of his/her employment with the Company or as authorized in writing by the Company. Notwithstanding the foregoing, Proprietary Information does not include information that is otherwise publicly known or available, provided it has not become public as a result of a breach of this Agreement or any other agreement Executive has to keep information confidential. It is not a breach of this Agreement for Executive to disclose Proprietary Information (i) pursuant to an order of a court or other governmental or legal body or (ii) in connection with Protected Activity (as defined below). Executive understands that nothing in this Agreement shall in any way limit or prohibit Executive from engaging in any Protected Activity. For purposes of this Agreement, “Protected Activity” means filing a charge or complaint with, or otherwise communicating or cooperating with or participating in any investigation or proceeding that may be conducted by any federal, state or local government agency or commission, including the Securities and Exchange Commission, the Equal Employment Opportunity Commission, the Occupational Safety and Health Administration, and the National Labor Relations Board (“Government Agencies”). Executive understands that in connection with such Protected Activity, Executive is permitted to disclose documents or other information as permitted by law, and without giving notice to, or receiving authorization from, the Company. Notwithstanding, in making any such disclosures or communications, Executive agrees to take all reasonable precautions to prevent any unauthorized use or disclosure of any information that may constitute Proprietary Information to any parties other than the Government Agencies. Executive further understands that “Protected Activity” does not include the disclosure of any Company attorney-client privileged communications. In addition, Executive hereby acknowledges that the Company has provided Executive with notice in compliance with the Defend Trade Secrets Act of 2016 regarding immunity from liability for limited disclosures of trade secrets. The full text of the notice is attached in Exhibit B.

  • Data Protection and Confidentiality 9.5.1 The Tenant’s personal data, which will be processed in the execution of this Agreement will be handled in accordance with the General Data Protection Regulation (EU) 2016/679. Further details regarding this processing activity is set out in the associated Privacy Notice, which can be found at: xxxxx://xxx.xxxxxxx.xxx/privacy-policy

  • Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!