Generic information Gathering Sample Clauses

Generic information Gathering. An example of this phase is the creation of a fake profile in one or more social networks, both for leisure and for business. The profile must be trustworthy and studied starting from a preliminary information collection to increase the likelihood of being accepted by the victim
AutoNDA by SimpleDocs

Related to Generic information Gathering

  • - CLEC INFORMATION CLEC agrees to work with Qwest in good faith to promptly complete or update, as applicable, Qwest’s “New Customer Questionnaire” to the extent that CLEC has not already done so, and CLEC shall hold Qwest harmless for any damages to or claims from CLEC caused by CLEC’s failure to promptly complete or update the questionnaire.

  • Genetic Information This plan does not limit your coverage based on genetic information. We will not: • adjust premiums based on genetic information; • request or require an individual or family members of an individual to have a genetic test; or • collect genetic information from an individual or family members of an individual before or in connection with enrollment under this plan or at any time for underwriting purposes.

  • Basic Information The Agent will thoroughly familiarize itself with the character, location, construction, layout, plan and operation of the Project, and especially the electrical, plumbing, air-conditioning and ventilating systems, the elevators and all other mechanical equipment.

  • PRODUCTS MANUFACTURED IN PUBLIC INSTITUTIONS Bids offering Products that are manufactured or produced in public institutions will be rejected.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Public Information The State will comply with Government Code, Chapter 552, the Public Information Act, and 43 Texas Administrative Code §3.10 et seq. in the release of information produced under this contract.

  • Non-Public Information Except with respect to the material terms and conditions of the transactions contemplated by the Transaction Documents, the Company covenants and agrees that neither it, nor any other Person acting on its behalf, will provide any Purchaser or its agents or counsel with any information that the Company believes constitutes material non-public information, unless prior thereto such Purchaser shall have entered into a written agreement with the Company regarding the confidentiality and use of such information. The Company understands and confirms that each Purchaser shall be relying on the foregoing covenant in effecting transactions in securities of the Company.

  • Information Given to Third Parties We may disclose information to third parties about you, your account, and the transactions on your account: (i) where it is necessary or helpful for completing transactions; (ii) in order to verify the existence and condition of the account for a third party (e.g., a merchant); (iii) in order to comply with government agency or court orders; (iv) if you give us your consent; (v) to service providers who administer the account or perform data processing, records management, collections, and other similar services for us, in order that they may perform those services; (vi) in order to identify, prevent, investigate or report possible suspicious or illegal activity; (vii) in order to issue authorizations for transactions on the account; (viii) to disclose the existence, history, and condition of your account to consumer reporting agencies; and (ix) as permitted by law. Please see our Privacy Policy for further details.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

Time is Money Join Law Insider Premium to draft better contracts faster.