Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.
Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.
Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.
Definition of Proprietary Information The Executive acknowledges that he may be furnished or may otherwise receive or have access to confidential information which relates to the Company’s past, present or future business activities, strategies, services or products, research and development; financial analysis and data; improvements, inventions, processes, techniques, designs or other technical data; profit margins and other financial information; fee arrangements; compilations for marketing or development; confidential personnel and payroll information; or other information regarding administrative, management, or financial activities of the Company, or of a third party which provided proprietary information to the Company on a confidential basis. All such information, including in any electronic form, and including any materials or documents containing such information, shall be considered by the Company and the Executive as proprietary and confidential (the “Proprietary Information”).
Treatment of Confidential Information (A) Each party agrees that at all times during and after the terms of this Agreement, it shall use, handle, collect, maintain, and safeguard Confidential Information in accordance with (1) the confidentiality and non-disclosure requirements of this Agreement; (2) the GLB Act, as applicable and as it may be amended; and (3) such other Applicable Law, whether in effect now or in the future. (B) Without limiting the foregoing, the Receiving Party shall apply to any Confidential Information at least the same degree of reasonable care used for its own confidential and proprietary information to avoid unauthorized disclosure or use of Confidential Information under this Agreement. (C) Each party further agrees that: (1) The Receiving Party will hold all Confidential Information it obtains in strictest confidence and will use and permit use of Confidential Information solely for the purposes of this Agreement or as otherwise provided for in this Agreement, and consistent therewith, may disclose or provide access to its responsible employees or agents who have a need to know and are under adequate confidentiality agreements or arrangements and make copies of Confidential Information to the extent reasonably necessary to carry out its obligations under this Agreement; (2) Notwithstanding the foregoing, the Receiving Party may release Confidential Information as permitted or required by law or approved in writing by the Disclosing party, which approval shall not be unreasonably withheld and may not be withheld where the Receiving Party may be exposed to civil or criminal liability or proceedings for failure to release such information; (3) Additionally, Ultimus may provide Confidential Information typically supplied in the investment company industry to companies that track or report price, performance or other information regarding investment companies; and (4) The Receiving Party will immediately notify the Disclosing Party of any unauthorized disclosure or use, and will cooperate with the Disclosing Party to protect all proprietary rights in any Confidential Information.
Protection of Proprietary Information “Proprietary Information” means a disclosing party’s ( including DirectTrust, any Participant, or any Participant’s CA or RA) business operations, financial condition, customers, products, services, technical knowledge, information, materials, processes, ideas, and techniques (whether or not reduced to writing) (i) which are not generally known in the relevant industry; (ii) which afford possessors of the information a commercial advantage over others; (iii) which are considered trade secrets under Applicable Law; and/or (iv) which, if utilized or disclosed by a party receiving such information, would place the party disclosing such information at a competitive disadvantage. Except as necessary for a party to perform its obligations under this Agreement, as permitted under a written consent of a disclosing party, or as required under Applicable Law, a party will not use or disclose Proprietary Information received from DirectTrust, any Participant, or any Participant’s CA or RA. Each party’s Proprietary Information will remain the confidential information of that party except as otherwise expressly provided in this Agreement. Each of the parties will use at least the same degree of care to safeguard and to prevent disclosing to third parties the Proprietary Information of the other as it employs to avoid unauthorized disclosure or publication of its own information of a similar nature, and in any event, no less than reasonable care. Each party may disclose relevant aspects of the other party’s Proprietary Information to its employees, affiliates, subcontractors and agents to the extent such disclosure is reasonably necessary for the performance of its obligations, or the enforcement of its rights, under this Agreement; provided, however, that such party will cause such employees, affiliates, subcontractors or agents to comply with these confidentiality provisions. Neither party will (i) make any use or copies of the Proprietary Information of the other except as contemplated by this Agreement; or (ii) acquire any right in or assert any lien against the Proprietary Information of the other; or (iii) sell, assign, lease or otherwise commercially exploit the Proprietary Information of the other party. Neither party may withhold the Proprietary Information of the other party or refuse for any reason (including due to the other party’s actual or alleged breach of this Agreement) to promptly return to the other party its Proprietary Information (including copies thereof) if requested to do so. Upon expiration or termination of this Agreement and completion of a party’s obligations under this Agreement, each Party will, at the request of the other party, (and except as otherwise provided in this Agreement) return or destroy, as the other party may direct, all documentation in any medium that contains or refers to the other party’s Proprietary Information, and retain no copies. This Section III.a will not apply to any particular information that either party can demonstrate
Treatment of Proprietary and Confidential Information A. Both parties agree that it may be necessary to provide each other during the term of this Agreement with certain confidential information, including trade secret information, including but not limited to, technical and business plans, technical information, proposals, specifications, drawings, procedures, customer account data and like information (hereinafter collectively referred to as “Information”). Both parties agree that all Information shall either be in writing or other tangible format and clearly marked with a confidential, private or proprietary legend, or, when the Information is communicated orally, it shall also be communicated that the Information is confidential, private or proprietary. The Information will be returned to the owner within a reasonable time. Both parties agree that the Information shall not be copied or reproduced in any form. Both parties agree to receive such Information and not disclose such Information. Both parties agree to protect the Information received from distribution, disclosure or dissemination to anyone except employees of the parties with a need to know such Information and which employees agree to be bound by the terms of this Section. Both parties will use the same standard of care to protect Information received as they would use to protect their own confidential and proprietary Information. B. Notwithstanding the foregoing, both parties agree that there will be no obligation to protect any portion of the Information that is either: 1) made publicly available by the owner of the Information or lawfully disclosed by a nonparty to this Agreement; 2) lawfully obtained from any source other than the owner of the Information; or 3) previously known to the receiving party without an obligation to keep it confidential.
Ownership of Proprietary Information Unless otherwise provided by law any reports, histories, studies, tests, manuals, instructions, photographs, negatives, blue prints, plans, maps, data, system designs, computer code (which is intended to be consideration under this Contract), or any other documents or drawings, prepared or in the course of preparation by either party in performance of its obligations under this Contract shall be the joint property of both parties.
Subpoenas Directed to BellSouth Where BellSouth provides resold services or local switching for <<customer_name>>, BellSouth shall respond to subpoenas and court ordered requests delivered directly to BellSouth for the purpose of providing call detail records when the targeted telephone numbers belong to <<customer_name>> end users. Billing for such requests will be generated by BellSouth and directed to the law enforcement agency initiating the request. BellSouth shall maintain such information for <<customer_name>> end users for the same length of time it maintains such information for its own end users.
Confidential or Proprietary Information The term "Confidential --------------------------------------- or Proprietary Information" for purposes of this Agreement shall mean any secret, confidential, or proprietary information of SunTrust or a SunTrust Affiliate (not otherwise included in the definition of Trade Secret in (S) 1.23 of this Agreement) that has not become generally available to the public by the act of one who has the right to disclose such information without violating any right of SunTrust or a SunTrust Affiliate.