Confidentiality & Security of Data Sample Clauses

Confidentiality & Security of Data. Users shall access University Data only to conduct University business and only as permitted by applicable confidentiality and privacy laws. Users must not attempt to access data on systems they are not expressly authorized to access. Users shall maintain all records containing University data in accordance with University’s Records Retention Policy and Records Management Guidelines. Users shall not disclose Confidential Data except as permitted or required by law and only as part of their official University duties. Whenever feasible, Users shall store Confidential Information or other information essential to the mission of University on a centrally managed server, rather than a local hard drive or portable device. In cases when a User must create or store Confidential or essential University Data on a local hard drive or a portable device such as a laptop computer, tablet computer, or, smart phone, the User must ensure the data is encrypted in accordance with University, System’s and any other applicable requirements. The following University Data must be encrypted during transmission over an unsecured network: Social Security Numbers; personally identifiable Medical and Medical Payment information; Driver’s License Numbers and other government issued identification numbers; Education Records subject to the Family Educational Rights & Privacy Act (FERPA); credit card or debit card numbers, plus any required code or PIN that would permit access to an individual’s financial accounts; bank routing numbers; and other University Data about an individual likely to expose the individual to identity theft. Email sent to and received from System and U. T. System institutions using University and/or System provided email accounts is automatically encrypted. The Office of Information Technology [or other applicable office] will provide tools and processes for Users to send encrypted data over unsecured networks to and from other locations. Users who store University Data using commercial cloud services must use services provided or sanctioned by University, rather than personally obtained cloud services. Users must not use security programs or utilities except as such programs are required to perform their official duties on behalf of University. All computers connecting to a University’s network must run security software prescribed by the Information Security Officer as necessary to properly secure University Resources. Devices determined by University to lack r...
AutoNDA by SimpleDocs
Confidentiality & Security of Data a. What protected health information (medical information along with the HIPAA identifiers) about subjects will be collected and used for the research? PHI that will be collected includes names, addresses, phone numbers, and email addresses for locator purposes. Our study assessments/forms have been designed to avoid collecting identifiable information (e.g., no PHI identifiers are collected on CRFs). The only dates collected are protocol session dates. These are changed to ‘number of sessions completed’ when data sets are anonymized and released to other investigators. b. How will the research data be collected, recorded and stored? Research data are collected on CRFs and in Qualtrics, and sent to data managers in our research offices on a closed secure network. All computers used by research staff are password protected. No identifying information is on CRFs. Only authorized individuals will have access to CRFs. c. How will the digital data be stored? CD DVD Flash Drive Portable Hard Drive Secured Server Laptop Computer Desktop Computer Other d. What methods and procedures will be used to safeguard the confidentiality and security of the identifiable study data and the storage media indicated above during and after the subject’s participation in the study? Do all portable devices contain encryption software? Yes No If no, see xxxx://xxxxx.xxxx.xxx/guidance/policy.html Confidentiality in regards to collected materials will be maintained via a numbered reference system maintained by the Project Coordinator. Participants’ names will appear only on the consent form, and “key” form kept by the Project Coordinator. The key form linking subject names to ID codes will be stored in a separate, locked file cabinet. Data are stored at our secure data management center; data sets do not include identifying information. In addition, we have designed all of our CBT4CBT websites such that no sensitive information (i.e., information on illegal behavior) or PHI is collected or stored by the website (including IP address). Moreover, to avoid participants inadvertently revealing sensitive information, the website does not use any ‘blank fills’, and the program shuts down after 10 minutes of inactivity. e. What will be done with the data when the research is completed? Are there plans to destroy the identifiable data? If yes, describe how, by whom and when identifiers will be destroyed. If no, describe how the data and/or identifiers will be secured. 01. Source data are gen...

Related to Confidentiality & Security of Data

  • CONFIDENTIALITY OF DATA 23.1 All financial, statistical, personal, technical, or other data and information relative to the Department’s operations, which is designated confidential by the Department and made available to the Construction Manager in order to carry out this Preconstruction Services Contract, shall be protected by the Construction Manager from unauthorized use and disclosure. 23.2 Permission to disclose information on one occasion or public hearing held by the Department relating to this Preconstruction Services Contract shall not authorize the Construction Manager to further disclose such information or disseminate the same on any other occasion. 23.3 The Construction Manager shall not comment publicly to the press or any other media regarding this Preconstruction Services Contract or the Department’s actions on the same, except to the Department’s staff, Construction Manager’s own personnel involved in the performance of this Preconstruction Services Contract, at public hearings, or in response to questions from a Legislative committee. 23.4 The Construction Manager shall not issue any news release or public relations item of any nature whatsoever regarding work performed or to be performed under this Preconstruction Services Contract without prior review of the contents thereof by the Department and receipt of the Department’s written permission. 23.5 All information related to the construction estimate is confidential and shall not be disclosed by the Construction Manager to any entity, other than the Department. 23.6 Subject to the California Records Act (California Government Code §§ 6250 et seq.), the Department has taken measures to protect the confidentiality of the negotiations related to the construction estimate. Every person involved in the process shall sign a confidentiality and nondisclosure agreement. However, under no circumstances will the Department be responsible or liable to the Construction Manager or any other party as a result of disclosing any materials, whether the disclosure is deemed required by law, by an order of court, or occurs through inadvertence, mistake, or negligence on the part of Department or its respective officers, employees, contractors, or consultants. 23.7 In the event Department is requested to disclose any of the materials identified by the Construction Manager as confidential, Department will promptly notify the Construction Manager so that Proposer may seek a protective order or other appropriate remedy. If the Construction Manager wishes to protect the materials from disclosure, the Construction Manager shall seek court protection immediately on an emergency basis. In the event that such protective order or other remedy is not sought by the Construction Manager within seven (7) days after the Construction Manager receives notice from Department, Department will be free to release the requested information. Department will consider the Construction Manager to have waived any claim of confidentiality and exemption from public disclosure for any materials not identified as confidential. Construction Managers are advised to consult with their legal counsel regarding the scope and provisions of the Public Records Act.

  • Confidentiality and Intellectual Property 6.1 You must not disclose to any other person or entity any confidential information belonging to the Group or any of its divisions, customers, suppliers or collaboration partners (including, without limitation, this Contract, specifications, formulae, manufacturing processes, know-how and any technical or economic information) or use such information for any purpose except for the supply of goods and/or services to us or as expressly authorised in writing by us. You must return to us such information and any copies if requested. 6.2 You must, on request, transfer to us, free of charge and free from encumbrances, any documents, specifications, plans, drawings, samples, information or goods created or prepared for us by you or your employees, subcontractors and consultants, which we may use without any charge. 6.3 Intellectual property rights in any information, documentation, prototypes or tooling provided by us to you shall remain owned by us or our customers or our suppliers and shall only be used for the sole purpose of supplying goods and/or services to us. If any intellectual property rights are created or generated from such information, documentation, prototypes or tooling or in performing the Contract then such rights shall be owned by us.

  • Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it.

  • Confidentiality of Vendor Data Vendor understands and agrees that by signing this Agreement, all Vendor Data is hereby released to TIPS, TIPS Members, and TIPS third-party administrators to effectuate Vendor’s TIPS Contract except as provided for herein. The Parties agree that Vendor Data is accessible by all TIPS Members as if submitted directly to that TIPS Member Customer for purchase consideration. If Vendor otherwise considers any portion of Vendor’s Data to be confidential and not subject to public disclosure pursuant to Chapter 552 Texas Gov’t Code (the “Public Information Act”) or other law(s) and orders, Vendor must have identified the claimed confidential materials through proper execution of the Confidentiality Claim Form which is required to be submitted as part of Vendor’s proposal resulting in this Agreement and incorporated by reference. The Confidentiality Claim Form included in Vendor’s proposal and incorporated herein by reference is the sole indicator of whether Vendor considers any Vendor Data confidential in the event TIPS receives a Public Information Request. If TIPS receives a request, any responsive documentation not deemed confidential by you in this manner will be automatically released. For Vendor Data deemed confidential by you in this manner, TIPS will follow procedures of controlling statute(s) regarding any claim of confidentiality and shall not be liable for any release of information required by law, including Attorney General determination and opinion. In the event that TIPS receives a written request for information pursuant to the Public Information Act that affects Vendor’s interest in any information or data furnished to TIPS by Vendor, and TIPS requests an opinion from the Attorney General, Vendor may, at its own option and expense, prepare comments and submit information directly to the Attorney General stating why the requested information is exempt from disclosure pursuant to the requirements of the Public Information Act. Vendor is solely responsible for submitting the memorandum brief and information to the Attorney General

  • Confidentiality and Proprietary Rights Executive agrees to read, sign and abide by Company’s Employee Innovations and Proprietary Rights Assignment Agreement, which is provided with this Agreement and incorporated herein by reference.

  • Confidentiality and Intellectual Property Rights (a) The parties acknowledge that the information which the disclosing party submits to the receiving party in connection with this Agreement includes disclosing party's confidential and proprietary information, both of a technical and commercial nature. Receiving party agrees not to disclose such information to third parties without disclosing party's prior written consent. (b) The intellectual property rights, copyrights and other rights connected therewith, in respect of drawings, specifications, documents, data and software made available by the Seller to the Buyer shall be owned solely by the Seller and shall remain its property. Buyer is not allowed to permit any third party to fabricate the Products or any parts thereof. (c) The Buyer is obliged to inform the Seller of any intellectual property rights that may exist with respect to the Equipment if Services are rendered for Equipment not supplied by the Seller. In case of third-party claims that may be asserted on the grounds of the existence of intellectual property rights on the Equipment or Products not delivered by the Seller, the Buyer shall indemnify and hold harmless the Seller against any such claims. (d) With regard to software the Seller grants to the Buyer a non-exclusive and non-transmissible right to use the intellectual property right, in machine-readable, object code form, on one system limited to the operation of the agreed Equipment. The software license shall be unlimited in time and free of charge, if not otherwise agreed. Neither the Buyer nor any third party shall modify, reproduce, translate, reverse engineer, transfer from object code to the source code or decompile the Seller´s software. The license does not entitle the Buyer to use the software for any equipment other than the agreed Equipment, to grant sub-licenses or to copy the software documents without the Seller ´s prior written consent. The Buyer is only entitled to make a single copy for backup purposes to be able to reload the system limited to the one agreed Equipment. If the Buyer exchanges the agreed Equipment, new software has to be purchased and installed. In case of termination of the Agreement the license terminates and all copies of the software and the documentation shall be returned to the Seller promptly after termination.

  • Confidentiality of Proprietary Information Employee agrees, during or after the term of this employment, not to reveal confidential information, or trade secrets to any person, firm, corporation, or entity. Should Employee reveal or threaten to reveal this information, the Company shall be entitled to an injunction restraining the Employee from disclosing same, or from rendering any services to any entity to whom said information has been or is threatened to be disclosed. The right to secure an injunction is not exclusive, and the Company may pursue any other remedies it has against the Employee for a breach or threatened breach of this condition, including the recovery of damages from the Employee.

  • Restriction on Disclosure and Use of Confidential Information Executive agrees that Executive shall not, directly or indirectly, use any Confidential Information on Executive’s own behalf or on behalf of any Person other than Employer, or reveal, divulge, or disclose any Confidential Information to any Person not expressly authorized by Employer to receive such Confidential Information. This obligation shall remain in effect for as long as the information or materials in question retain their status as Confidential Information. Executive further agrees to fully cooperate with Employer in maintaining the Confidential Information to the extent permitted by law. The Parties acknowledge and agree that this Agreement is not intended to, and does not, alter either Employer’s rights or Executive’s obligations under any state or federal statutory or common law regarding trade secrets and unfair trade practices. Anything herein to the contrary notwithstanding, Executive shall not be restricted from disclosing information that is required to be disclosed by law, court order, or other valid and appropriate legal process; provided, however, that in the event such disclosure is required by law, Executive shall provide Employer with prompt notice of such requirement so that Employer may seek an appropriate protective order prior to any such required disclosure by Executive. Executive understands and acknowledges that nothing in this section limits Executive’s ability to report possible violations of federal, state, or local law or regulation to any governmental agency or entity; to communicate with any government agencies or otherwise participate in any investigation or proceeding that may be conducted by any government agencies in connection with any charge or complaint, whether filed by Executive, on Executive’s behalf, or by any other individual; or to make other disclosures that are protected under the whistleblower provisions of federal, state, or local law or regulation, and Executive shall not need the prior authorization of Employer to make any such reports or disclosures and shall not be required to notify Employer that Executive has made such reports or disclosures. In addition, and anything herein to the contrary notwithstanding, Executive is hereby given notice that Executive shall not be criminally or civilly liable under any federal or state trade secret law for disclosing a trade secret (as defined by 18 U.S.C. § 1839) in confidence to a federal, state, or local government official, either directly or indirectly, or to an attorney, in either event solely for the purpose of reporting or investigating a suspected violation of law; or disclosing a trade secret (as defined by 18 U.S.C. § 1839) in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal.

  • Confidentiality and Data Protection We are a data controller for the information you provide to us including individual, identification and financial details, policy history and special category data (such as medical or criminal history). Details of our legal basis for processing your information, along with details of any third party recipient whom it may be necessary to share your personal data with in order to fulfil the contract, retention period for data held, security of your data, your rights under the UK General Data Protection Regulations (UK GDPR) including the right to complain can be found in our full ‘Privacy Notice’ attached to these terms of business and/or on our website at xxx.xxxxxxxxxxxxxxxx.xx.xx.

  • Confidentiality and Data Security (a) The Custodian agrees to keep confidential, and to cause its employees and agents to keep confidential, all records of the Funds and information relating to the Funds, including without limitation information as to their respective shareholders and their respective portfolio holdings, unless the release of such records or information is made (i) in connection with the services provided under this Agreement, (ii) at the written direction of the applicable Fund or otherwise consented to, in writing, by the respective Funds, (iii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Custodian has determined, on the advice of counsel, that it is required to comply, or (iv) where the Custodian has determined, on the advice of counsel, that the failure to release such information would expose the Custodian to civil or criminal contempt proceedings; provided in the case of clause (iii) or (iv) the Custodian provides the applicable Fund written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Section 10(a), or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. Notwithstanding the foregoing but subject to Section 10(d), (1) the Custodian may use information regarding the Funds in connection with certain functions performed on a centralized basis by the Custodian, its affiliates or its or their service providers (including audit, accounting, risk, legal, compliance, sales, administration, product communication, relationship management, compilation and analysis of customer-related data and storage) and disclose such information to its affiliates and to its or their service providers who are subject to the confidentiality obligations hereunder with respect to such information, but only for the purpose of servicing the Funds in connection with the relationship contemplated by this Agreement or providing additional services to the Funds, and (2) the Custodian may aggregate Fund or Portfolio data with similar data of other customers of the Custodian (“Aggregated Data”) and may use Aggregated Data so long as such Aggregated Data represents such a sufficiently large sample that no Fund or Portfolio data can be identified either directly or by inference or implication. (b) Each Fund agrees to keep confidential all information obtained hereunder relating to the Custodian’s business (it being understood, however, that the existence and the terms of this Agreement are required to be publicly disclosed by the Funds), unless the release of such records or information is (i) necessary to facilitate the receipt of services provided under this Agreement, (ii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Fund has determined, on the advice of counsel, that it is required to comply, or (iii) where the Fund has determined, on the advice of counsel, that the failure to release such information would expose the Fund to civil or criminal contempt proceedings; provided in the case of clause (ii) or (iii) the Fund provides the Custodian written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Agreement, or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. (c) Notwithstanding any provision herein to the contrary, each party hereto agrees that any Nonpublic Personal Information, as defined under Section 248.3(t) of Regulation S-P (“Regulation S-P”), promulgated under the Xxxxx-Xxxxx-Xxxxxx Act (the “GLB Act”), disclosed or otherwise made accessible by a party hereunder is for the specific purpose of permitting the other party to perform its duties as set forth in this Agreement. Each party agrees that, with respect to such information, it will comply with Regulation S-P and the GLB Act and that it will not disclose any Nonpublic Personal Information received in connection with this Agreement to any other party, except to the extent necessary to carry out the services set forth in this Agreement or as otherwise permitted by Regulation S-P or the GLB Act. (d) Without limiting the generality of Section 10(a) hereof, the Custodian acknowledges and agrees that the Funds are prohibited by law from making selective public disclosure of information regarding portfolio holdings, that disclosure of any and all such information to the Custodian hereunder is made strictly under the conditions of confidentiality set forth in Section 10(a) hereof and solely for the purposes of the performance of custodial services hereunder, that any unauthorized disclosure or misuse of such information (including by the Custodian or any of its employees or agents, or any trading on the basis of such information by anyone in receipt of such information) may constitute a criminal offense of trading on or tipping of material inside information regarding publicly traded securities, that access to any and all such information regarding portfolio holdings of the Funds shall be restricted to those persons needing such information in the course of the performance of duties hereunder, and that the Custodian shall apprise all such persons having access of the obligation hereunder and under applicable law to prevent unauthorized disclosure of such confidential information. (e) The parties acknowledge and agree that any breach of Section 10(a) hereof would cause not only financial damage, but irreparable harm to the other party, for which money damages will not provide an adequate remedy. Accordingly, in the event of a breach of Section 10(a) hereof, the non-breaching party shall (in addition to all other rights and remedies it may have pursuant to this Agreement, including without limitation Section 8(g) hereof, and at law and in equity) be entitled to an injunction, without the necessity of posting any bond or surety, to restrain disclosure or misuse, in whole or in part, of any information in violation of Section 10(a) hereof. (f) The Custodian will implement and maintain a written information security program (the “Security Program”) that contains appropriate security measures designed to safeguard confidential records and information of the Funds consistent with applicable statutes, laws, rules and regulations, and definitive and binding guidance or interpretations by applicable authorities of any of the foregoing from time to time, including without limitation the personal information of the Funds’ shareholders, employees, trustees, directors and/or officers that the Custodian receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account with the Custodian. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. (g) The Security Program shall have administrative, technical and physical safeguards, appropriate to the type of information concerned, designed: (i) to maintain the security and confidentiality of records and information of the Funds; (ii) to protect against anticipated threats or hazards to the security or integrity of such records and information; and (iii) to protect against unauthorized access to or use of such records and information. The Custodian shall develop, implement and maintain, at its sole expense, a system or methodology to audit for compliance with the requirements of the preceding sentence that is consistent with the SOC controls framework. Such safeguards will include, but shall not be limited to, virus protection, password protection and encryption of data in transmission at a minimum standard of AES 256. The Custodian will provide the Fund, at least annually, with the most recent SOC reports of its systems and methodologies prepared by an independent third party, and will provide executive summaries of its most recent penetration and ethical hack testing of its internet-facing environment relevant to the systems used to provide services under this Agreement (in the form generally provided by the Custodian to other similarly situated customers of services similar to the services provided under this Agreement), as conducted by a qualified, independent third party selected by the Custodian. The Custodian shall maintain books and records sufficient to demonstrate its compliance with the terms of this Section 10(g). (h) Upon reasonable notice to the Custodian, the Custodian will arrange for its relevant subject matter experts to meet with the relevant subject matter experts of the Funds once annually and at such other times as the Funds may reasonably request to review the Custodian’s security controls and any deficiencies identified in the SSAE-18 audit reports, and for the Custodian to review with the Funds the penetration testing results and provide such additional information concerning the penetration tests as the Custodian determines to be prudent. At such meeting, the Funds may view the Custodian’s security-related policies and procedures; however, no documentation may be copied, shared, transmitted or removed from the Custodian’s premises, except as mutually agreed. In the event that the Funds identify any control deficiencies, the Custodian will discuss such findings with the Funds and will use reasonable efforts to develop a mutually agreeable remediation plan. All nonpublic documentation and information disclosed to the Funds in accordance with this Section 10(h) shall be deemed proprietary and confidential information of the Custodian. The Funds shall not disclose such documentation or information to any third party (except to the extent permitted, necessary or required pursuant to Section 10(b)) or use it for any purpose other than evaluating the Custodian’s security controls, except that the Funds may disclose the Custodian’s SSAE-18 summary to the Funds’ external auditors provided that such external auditors are required to maintain the confidentiality of the summary and any related information. (i) In the event of any actual or reasonably suspected, based on Custodian’s experience, breach of security of its systems resulting in the actual, probable or reasonably suspected unauthorized access to or acquisition, use, loss, destruction, compromise or disclosure of any of the confidential records or information of a Fund (each, a “Security Breach”), upon learning of the Security Breach, the Custodian shall notify such Fund as promptly as reasonably possible of the relevant facts related to such Security Breach then known to the Custodian, and of additional relevant facts promptly after they become known to the Custodian, in the manner provided in Section 12 hereof and also by sending notice to xxxxxxxxxxxxx@xxxxxxxxx.xxx and/or such other electronic mail address or addresses as a Fund may specify by written notice to the Custodian. The Custodian shall at its sole cost: (i) promptly investigate such Security Breach; (ii) resolve or mitigate the vulnerability that facilitated the Security Breach to the extent possible; (iii) restore any lost or damaged data using generally accepted data restoration techniques; and (iv) conduct a root cause analysis to provide the Fund with a summary of the findings and actions taken to prevent recurrence of such Security Breach. If a Security Breach occurs with respect to personal information in the possession or under the control of the Custodian or any of its affiliates, subsidiaries, agents or employees the Custodian shall be responsible for each Fund’s reasonable costs associated with responding to such Security Breach, including, but not limited to, the costs of notifying affected individuals and taking any remedial action required by applicable statutes, laws, rules and regulations and any such other remedial action that the Custodian reasonably deems necessary (with due regard for industry standards, if any). (j) If the Custodian uses any subsidiary or affiliate or, pursuant to Section 2.6(a), agent to perform the duties assigned to the Custodian by this Agreement, such subsidiary, affiliate or agent shall have appropriate controls in place to meet the objectives of this Section 10, and the Custodian shall exercise oversight over each such subsidiary, affiliate or agent to ensure ongoing compliance with the objectives of this Section 10. The Custodian will require each Foreign Sub-Custodian that it engages to provide services under this Agreement to establish and maintain reasonably designed safeguards and controls against the unauthorized access to and use of Fund data and information.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!