Gateway Pi and Gateway Confidential Business Information Sample Clauses

Gateway Pi and Gateway Confidential Business Information 
AutoNDA by SimpleDocs

Related to Gateway Pi and Gateway Confidential Business Information

  • Confidential Business Information CARB may have based this penalty in part on confidential business information provided by Xxxx or confidential settlement communications.

  • Business Information C101 commercial activities (such as nature of business, goods or services, commercial contracts, etc.) C102 agreement or contract (such as trading, business, legal, or other contract agents, etc.) C103 business-related licenses (such as whether a specific license is obtained, market trading license, truck driving license, etc.)

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.

  • Maintaining Confidential Information Executive reaffirms his obligations under the Confidentiality Agreement. Executive acknowledges and agrees that the payments provided in Section 3 above shall be subject to Executive’s continued compliance with Executive’s obligations under the Confidentiality Agreement.

  • Return of Confidential Information Subject to Section 4.2(e) of this Agreement, upon the request of a party, the other party shall return all Confidential Information to the other; provided, however, (i) each party shall be permitted to retain copies of the other party’s Confidential Information solely for archival, audit, disaster recovery, legal and/or regulatory purposes, and (ii) neither party will be required to search archived electronic back-up files of its computer systems for the other party’s Confidential Information in order to purge the other party’s Confidential Information from its archived files; provided further, that any Confidential Information so retained will (x) remain subject to the obligations and restrictions contained in this Agreement, (y) will be maintained in accordance with the retaining party’s document retention policies and procedures, and (z) the retaining party will not use the retained Confidential Information for any other purpose.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • E4 Confidential Information Except to the extent set out in this clause or where disclosure is expressly permitted elsewhere in this Contract, each Party shall:

  • Third Party Confidential Information Consultant recognizes that the Company has received and in the future will receive from third parties their confidential or proprietary information subject to a duty on the Company’s part to maintain the confidentiality of such information and to use it only for certain limited purposes. Consultant agrees that at all times during the term of this Agreement and thereafter, Consultant owes the Company and such third parties a duty to hold all such confidential or proprietary information in the strictest confidence and not to use it or to disclose it to any person, firm, corporation, or other third party except as necessary in carrying out the Services for the Company consistent with the Company’s agreement with such third party.

  • Prime Confidential Information The following shall constitute Confidential Information of the Contractor and should not be disclosed to third (3rd) parties: the deliverables, discoveries, ideas, concepts, software [in various stages of development], designs, drawings, specifications, techniques, models, data, source code, source files, object code, documentation, diagrams, flow charts, research, development, processes, procedures, “know-how”, marketing techniques and materials, marketing and development plans, customer names and other information related to customers, price lists, pricing policies and financial information, this Agreement and the existence of this Agreement, the relationship between the Contractor and Subcontractor, and any details of the Service under this Agreement. Subcontractor agrees not to use or reference the Contractor and/or their names, likenesses, or logos (“Identity”). Subcontractor will not use or reference Contractor or their Identity, directly or indirectly, in conjunction with any other third (3rd) parties.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!