Confidentiality Security Sample Clauses

The Confidentiality; Security clause establishes the obligation of parties to protect sensitive information exchanged during the course of their relationship. It typically requires that any non-public or proprietary data be kept confidential and that reasonable security measures are implemented to prevent unauthorized access or disclosure. This clause is essential for safeguarding trade secrets, personal data, or business strategies, thereby reducing the risk of information leaks and ensuring trust between the parties.
POPULAR SAMPLE Copied 4 times
Confidentiality Security. (a) Each party acknowledges that it may, in the course of performing its responsibilities under this Agreement, be exposed to or acquire Confidential Information that is proprietary to or confidential to the other party, its Affiliates, their respective clients and investors or to third parties to whom the other party owes a duty of confidentiality. The party providing Confidential Information in each case shall be called the “Disclosing Party” and the party receiving the Confidential Information shall be called the “Recipient”. With respect to all such Confidential Information, the Recipient shall (i) act in accordance and comply with all Applicable Requirements as defined in the Servicing Addendum (including, without limitation, security and privacy laws with respect to its use of such Confidential Information), (ii) maintain, and shall require all third parties that receive Confidential Information from the Recipient as permitted hereunder to maintain, effective information security measures to protect Confidential Information from unauthorized disclosure or use, and (iii) provide the Disclosing Party with information regarding such security measures upon the reasonable request of the Disclosing Party and promptly provide the Disclosing Party with information regarding any material failure of such security measures or any security breach relating to the Disclosing Party’s Confidential Information. The Recipient shall hold the Disclosing Party’s Confidential Information in strict confidence, exercising no less care with respect to such Confidential Information than the level of care exercised with respect to the Recipient’s own similar Confidential Information and in no case less than a reasonable standard of care, and shall not copy, reproduce, summarize, quote, sell, assign, license, market, transfer or otherwise dispose of, give or disclose such information to third parties or use such information for any purposes other than the provision of the services to the Disclosing Party without the prior written authorization of the Disclosing Party. In addition, the Recipient shall not use the Confidential Information to make any contact with any of the parties identified in the Confidential Information without the prior authorization of the Disclosing Party, except in the course of performing its obligations under the terms of this Agreement. (b) The Recipient may disclose the Disclosing Party's Confidential Information only (i) to its and its Affiliates’ of...
Confidentiality Security a. You agree, acknowledge and understand that: (1) the Information is of a confidential nature; (2) the Association, and any Service Providers, shall take commercially reasonable and appropriate measures to maintain the confidentiality of the Information provided and prevent access by any other party, but that neither the Association nor any Service Provider guarantees or warrants that unauthorized individuals cannot illegally gain access to and use the Information, including, without limitation, your most confidential financial information; (3) transmissions of data and information through the use of the Services may be read or intercepted by others, and that neither the Association nor any Service Provider shall be liable to you (or anyone claiming by, for or through you) for any losses or damages caused by the transmission of data and information using the Services; and (4) you shall defend, indemnify and hold harmless the Association and any Service Providers for any such illegal or unauthorized access to and use of the Information. b. When you request to receive the Services, you shall provide the Association with such information as the Association shall request to enable the Association to identify you when you want to access and use the Services. This information may include, without limitation, your name, address, telephone numbers, email addresses, and loan numbers. You agree to update such information to Association in the event of any changes thereto. c. When you are enrolled for the Services, you will receive a Used ID and temporary password from the Association. You will be prompted at the first log-on attempt to create a new password that will allow you to have secure access to the Services. Only you will have knowledge of this password. The password and User ID will be contained within the systems of the Association’s Service Provider used to provide the Services and will be maintained by the Association. The Association and/or its Service Provider may, from time to time, change the requirements for passwords used to access the Services without prior notice. In the event of such a change, you will be required to change your password the next time you access the Services. d. To prevent unauthorized access to your accounts and to prevent unauthorized use of the Services, you agree to keep your passwords, codes, and User IDs confidential and not release any of this information to any other party. The loss, theft, or unauthorized use of your ac...
Confidentiality Security. The Software and Documentation (collectively, “Confidential Information”) constitute Licensor’s proprietary and confidential information, whether or not it is identified in writing as “Confidential.” Licensee will not (i) use any such Confidential Information in any way, for its own account or the account of any third party, except as expressly permitted under this Agreement, or (ii) disclose any such Confidential Information to any third party, other than furnishing such Confidential Information to its employees who are required to have access to the Confidential Information in connection with the performance of this Agreement, provided, that such employees are bound by written confidentiality obligations consistent with the terms and conditions of this Section 9. Licensee will not allow any unauthorized person access the Confidential Information, and Licensee will take all action reasonably necessary to protect the confidentiality of such Confidential Information, including implementing and enforcing procedures to minimize the possibility of unauthorized access, use or copying of such Confidential Information. In the event that Licensee is required by law to make any disclosure of any of the Confidential Information, by subpoena, judicial or administrative order or otherwise, Licensee will first give written notice of such requirement to Licensor, and will permit Licensor to intervene in any relevant proceedings to protect its interests in the Confidential Information, and provide full cooperation and assistance to Licensor in seeking to obtain such protection. Information will not be deemed Confidential Information hereunder to the extent that Licensee can demonstrate that such information: (a) is known to Licensee prior to receipt from Licensor directly or indirectly from a source other than one having an obligation of confidentiality to Licensor; (b) becomes known (independently of disclosure by Licensor) to Licensee directly or indirectly from a source other than one having an obligation of confidentiality to Licensor; or (c) becomes publicly known or otherwise ceases to be secret or confidential, except through a breach of this Agreement by Licensee. Licensor recognizes that Federal agencies are subject to the Freedom of Information Act, 5 U.S.C. 552, which requires that certain information be released, despite being characterized as “confidential” by the vendor.
Confidentiality Security. The Supplier agrees to keep confidential any commercial in confidence information obtained during the negotiation, execution and operation of this agreement. This information includes but is not limited to, codes for entrance into the building, any passwords related to hardware or software used by the company and access processes and protocols. It will also include pricing agreements between the company and the Supplier and any other Suppliers or organisations in which the company is involved.
Confidentiality Security. Duo Bank uses data encryption and firewalls to maintain the security of the information it receives through the Website. Nevertheless, security and privacy risks cannot be eliminated. As a further security precaution, you must access and use the Website using commercially available browser software (such as a current version of Internet ExplorerTM) that provides 128-bit encryption and TLS (Transport Layer Security) technology, and you may not use your browser software's "save password" feature. Once you have initiated a session in connection with the Website, you must not leave the computer from which you have accessed the Website unless and until you have terminated the session and logged off the Website. When you complete a session, you are responsible for securing the computer you used to access the Website and for clearing your browser's cache or temporary Internet files to ensure your personal information is not accessible by others. Emails and Internet communications are not secure or confidential unless properly encrypted. Consequently, Duo Bank discourages the use of email to send personal or financial information to Duo Bank. Persons that use emails and Internet communications for those purposes do so at their own risk, and Duo Bank or its Affiliates and Providers will not be responsible or liable to you or any other person for any loss or damage suffered as a result of your use of email or the Internet to communicate with Duo Bank or any of its Affiliates and Providers, or the use of email or the Internet by Duo Bank or any of its Affiliates and Providers to communicate with you or other persons at your request. Certain parts of the Website, including portions of the Online Services system are located outside of Canada. The information you submit through the Website may be stored inside or outside of Canada. Information stored outside of Canada may be subject to the laws of the jurisdiction in which the information is stored, and these laws (including laws requiring the disclosure of personal or confidential information to law enforcement or other officials) may be different from Canadian laws.
Confidentiality Security. Anthem may use the information that it obtains about the User, including the User’s IP address, name, mailing address, e-mail address and use of the Web site, for its internal business and marketing purposes to the extent permitted by law. Anthem may disclose the information to third parties, such as agents, consultants and service providers, but only for internal business and marketing purposes and only to the extent permitted by law.
Confidentiality Security. All information provided on this form is stored with a third-party Tier 1 PCI Compliant Payment Processor (the highest level of security). All online transactions are processed with point-to-point encryption to protect your sensitive payment information.
Confidentiality Security. The employee will:
Confidentiality Security. Summit takes a best practices approach to the latest information technologies. Summit’s information security protocols are developed by the Director of Information Technology, with the consent of executive management and the Co-Presidents. The Director of IT’s primary security responsibilities are: • Develop and manage strategic measures to ensure secure, encrypted access; protect servers and data through anti-viral, anti-spam, and anti-intruder technology • Provide for client data partition and integrity; provide for secure data transport • Provide for secure data storage • Preplan potential vulnerabilities • Establish system response protocols • Select and manage Summit’s third-party infrastructure monitoring vendor • Apply industry best practices at all times Summit has complete facility to restrict login and/or access to credit data by IP address on an individual basis. Our system's Multi-Level User Rights allow for secure ordering and retrieval of reports and invoices, with complete client control over the access for each user in their organization. Through a dedicated web portal for the County, authorized users have the ability to securely log-on – from any location – and review account information. Summit can tailor specific or restricted access per user role, to include multiple parent-child platforms, if required. This functionality allows for limited system access, such as applicant entry (direct order by applicant/employee) or partial/full access for any designated user. This feature can also limit access for viewing of invoices and/or reports on a user-by-user basis. "Parent" roles have the ability to view all reports and/or invoices over all users, affiliates, and/or cost centers. Summit’s enhanced security enables such access and control parameters as: • Multi-Factor Authentication (MFA) - an Internet PIN with an expiration date • Number of login attempts - the maximum number of invalid login attempts allowed • Login Timeout - enforced re-authentication after a specified period of user inactivity • Password Expiration - automatic expiration of passwords after a specified number of days The system automatically logs all transaction activity by username, providing a complete change history audit trail. Electronic signatures add to the security of the process, if needed Electronic data identified for destruction is accessed through a single point by an authorized Summit user, then deleted in a manner which completely sanitizes the storage drive ...
Confidentiality Security. A. 15.1 This document, or any portion thereof, may not be used for any purpose other than the submission of an offer.