Describe Respondent’s ability to ensure its employees protect confidential information Sample Clauses

Describe Respondent’s ability to ensure its employees protect confidential information. SoftHQ protects the confidential information of the clients, agencies by the employees in the following ways: SoftHQ includes express confidentiality provisions within each employee’s contract of employment, to ensure that Department, or Counties sensitive commercial information is adequately protected. The provisions specify the following: ▪ What information is to be considered confidential ▪ The disclosure of confidential information is forbidden SoftHQ is aware that its current workforce is not subject to express confidentiality obligations, SoftHQ will include express confidentiality provisions within a settlement agreement.
AutoNDA by SimpleDocs
Describe Respondent’s ability to ensure its employees protect confidential information. Neumeric’s employee are experienced and training to maintain integrity of the data handled by them. Neumeric’s employees would adhere to all the confidentiality clauses, as applicable. Neumeric’s employee sign a Non-disclosure and confidentiality Agreement, employee manual are signed…as a part of onboarding is maintained
Describe Respondent’s ability to ensure its employees protect confidential information. Red Salsa protects its assets, whether it is information asset or monetary assets, with utmost care. Our premises are secure and physical access is restricted to authorized personnel only. We employ engineers who have experience in protecting information assets. Our security specialists / engineers hold certifications in respective technologies and associated security. Employees are made to understand and review updated information security policies as a part of their initial job orientation as well as their annual reviews. All employees are provided access to data on a need to know basis only. All employee activity within our systems is logged. All network infrastructure, applications and servers such as databases and emails are hardened against hacking. All the data that is coming into the company, whether it is via portable devices such flash drives or from network data packages, is checked for viruses, Trojan horses, etc. All the internal data is encrypted. Access is controlled and monitored. We use Secure Socket Level (SSL) communication with our web servers. Passwords are set to expire at frequent intervals. Access to information and message integrity while in transit is checked. Data is frequently backed up and stored in secure remote premises such as Amazon secure cloud. We also conduct IT audits and distribute findings across the organization. We discuss the outcome of the audit, create an action plan if necessary and implement it. The company has necessary insurance coverage for physical theft, physical asset damage, information damage, Intellectual property theft, etc.
Describe Respondent’s ability to ensure its employees protect confidential information. Avco Reply

Related to Describe Respondent’s ability to ensure its employees protect confidential information

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Treatment of Proprietary and Confidential Information A. Both parties agree that it may be necessary to provide each other during the term of this Agreement with certain confidential information, including trade secret information, including but not limited to, technical and business plans, technical information, proposals, specifications, drawings, procedures, customer account data and like information (hereinafter collectively referred to as “Information”). Both parties agree that all Information shall either be in writing or other tangible format and clearly marked with a confidential, private or proprietary legend, or, when the Information is communicated orally, it shall also be communicated that the Information is confidential, private or proprietary. The Information will be returned to the owner within a reasonable time. Both parties agree that the Information shall not be copied or reproduced in any form. Both parties agree to receive such Information and not disclose such Information. Both parties agree to protect the Information received from distribution, disclosure or dissemination to anyone except employees of the parties with a need to know such Information and which employees agree to be bound by the terms of this Section. Both parties will use the same standard of care to protect Information received as they would use to protect their own confidential and proprietary Information. B. Notwithstanding the foregoing, both parties agree that there will be no obligation to protect any portion of the Information that is either: 1) made publicly available by the owner of the Information or lawfully disclosed by a nonparty to this Agreement; 2) lawfully obtained from any source other than the owner of the Information; or 3) previously known to the receiving party without an obligation to keep it confidential.

  • Treatment of Confidential Information (A) Each party agrees that at all times during and after the terms of this Agreement, it shall use, handle, collect, maintain, and safeguard Confidential Information in accordance with (1) the confidentiality and non-disclosure requirements of this Agreement; (2) the GLB Act, as applicable and as it may be amended; and (3) such other Applicable Law, whether in effect now or in the future. (B) Without limiting the foregoing, the Receiving Party shall apply to any Confidential Information at least the same degree of reasonable care used for its own confidential and proprietary information to avoid unauthorized disclosure or use of Confidential Information under this Agreement. (C) Each party further agrees that: (1) The Receiving Party will hold all Confidential Information it obtains in strictest confidence and will use and permit use of Confidential Information solely for the purposes of this Agreement or as otherwise provided for in this Agreement, and consistent therewith, may disclose or provide access to its responsible employees or agents who have a need to know and are under adequate confidentiality agreements or arrangements and make copies of Confidential Information to the extent reasonably necessary to carry out its obligations under this Agreement; (2) Notwithstanding the foregoing, the Receiving Party may release Confidential Information as permitted or required by law or approved in writing by the Disclosing party, which approval shall not be unreasonably withheld and may not be withheld where the Receiving Party may be exposed to civil or criminal liability or proceedings for failure to release such information; (3) Additionally, Ultimus may provide Confidential Information typically supplied in the investment company industry to companies that track or report price, performance or other information regarding investment companies; and (4) The Receiving Party will immediately notify the Disclosing Party of any unauthorized disclosure or use, and will cooperate with the Disclosing Party to protect all proprietary rights in any Confidential Information.

  • Exceptions to Confidential Information The obligations set forth in Section 13.1 (Confidential Information) shall not apply to the extent that Confidential Information includes information which is: (a) now or hereafter, through no unauthorized act or failure to act on the Receiving Party’s part, in the public domain; (b) was in the Receiving Party’s possession before receipt from the Disclosing Party and obtained from a source other than the Disclosing Party and other than through the prior relationship of the Disclosing Party and the Receiving Party before the Separation Date; (c) hereafter furnished to the Receiving Party by a third party as a matter of right and without restriction on disclosure; (d) furnished to others by the Disclosing Party without restriction on disclosure; or (e) independently developed by the Receiving Party without use of the Disclosing Party’s Confidential Information. Nothing in this Agreement shall prevent the Receiving Party from disclosing Confidential Information to the extent the Receiving Party is legally compelled to do so by any governmental, investigative or judicial agency pursuant to proceedings over which such agency has jurisdiction; provided, however, that prior to any such disclosure, the Receiving Party shall: (i) assert the confidential nature of the Confidential Information to the agency; (ii) immediately notify the Disclosing Party in writing of the agency’s order or request to disclose; and (iii) cooperate fully with the Disclosing Party in protecting against any such disclosure and/or obtaining a protective order narrowing the scope of the compelled disclosure and protecting its confidentiality.

  • Trade Secrets and Confidential Information (i) Executive represents and warrants that Executive (A) is not subject to any legal or contractual duty or agreement that would prevent or prohibit Executive from performing the duties contemplated by this Agreement or otherwise complying with this Agreement, and (B) is not in breach of any legal or contractual duty or agreement, including any agreement concerning trade secrets or confidential information owned by any other party. (ii) Executive agrees that Executive will not (A) use, disclose or reverse engineer Trade Secrets or Confidential Information for any purpose other than the Company’s Business, except as authorized in writing by the Company; (B) during Executive’s employment with the Company, use, disclose or reverse engineer (1) any confidential information or trade secrets of any former employer or third party or (2) any works of authorship developed in whole or in part by Executive during any former employment or for any other party, unless authorized in writing by the former employer or third party; or (C) upon Executive’s resignation or termination with the Company (1) retain Trade Secrets or Confidential Information, including any copies existing in any form (including electronic form), which are in Executive’s possession or control or (2) destroy, delete or alter Trade Secrets or Confidential Information without the Company’s prior written consent. (iii) The obligations under this Section 8 shall remain in effect as long as Trade Secrets and Confidential Information constitute trade secrets or confidential information under applicable law. The confidentiality, property and proprietary rights protections available in this Agreement are in addition to, and not exclusive of, any and all other rights to which the Company is entitled under federal and state law, including, but not limited to, rights provided under copyright laws, trade secret and confidential information laws and laws concerning fiduciary duties.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it.

  • Company Confidential Information The Subscriber acknowledges that the Company is engaged in business development including programs of research and development and the marketing of products and services. The Subscriber also recognizes the importance of protecting the Company’s trade secrets, confidential information and other proprietary information and related rights acquired through such Company’s expenditure of time, effort and money. Therefore, in consideration of the Company permitting the Subscriber to submit this subscription and have access to the Company’s information and/or Company’s confidential information otherwise coming to the Subscriber, the Subscriber agrees to be bound by the following terms and conditions with respect to the Company:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!