Information and Data Security Measures Sample Clauses

Information and Data Security Measures. 22.1 The Supplier will manage information and data security with reasonable efforts to restrict unauthorised access. The Supplier will use reasonable commercial efforts to ensure that the Supplier Personnel and any relevant Third Party Personnel are fully aware of the risks associated with information and data security issues and that they manage the information as set out in the beginning of this clause. The Supplier cannot be held liable for data loss due to security breaches, hardware or software failure or virus infection, save to the extent that such loss is caused directly by Supplier Personnel and/or Third Party Personnel’s Default.
AutoNDA by SimpleDocs
Information and Data Security Measures. The Supplier will manage information and data security with reasonable efforts to restrict unauthorized access. The Supplier will make best endeavors to ensure that its employees and representatives are fully aware of the risks associated with Information and data security issues.
Information and Data Security Measures. Standards Digital will manage information and data security with reasonable efforts to restrict unauthorised access. Standards Digital will use reasonable commercial efforts to ensure that Standards Digital Personnel and any relevant Third-Party Personnel are fully aware of the risks associated with information and data security issues and that they manage the information as set out in the beginning of this clause. Standards Digital cannot be held liable for data loss due to security breaches, hardware or software failure or virus infection, save to the extent that such loss is caused directly by Standards Digital Personnel and/or Third-Party Personnel’s gross negligence or wilful misconduct.
Information and Data Security Measures. In order to ensure THE COMPANY is made aware of the risk associated with information and data security measures, UNITY BANK shall provide THE COMPANY with a copy of UNITY BANK Information Security Policy document. By signing this Agreement, THE COMPANY acknowledges the receipt of the UNITY BANK’s Information Security Policy document.
Information and Data Security Measures. Each party will comply with all applicable requirements of the Data Protection Legislation and its respective obligations under Schedule K (Data Protection). This clause 6.2 is in addition to, and does not relieve, remove or replace, a party's obligations or rights under the Data Protection Legislation.
Information and Data Security Measures. University Security Policies

Related to Information and Data Security Measures

  • Information and Data ‌ Upon request of the Union, the Employer agrees to furnish the Union with the following information: budgets for the Board of Regents; budgets for each College; public information used in the preparation of budgets as provided by law such as salaries; minutes of meetings of the Board; policies of the Board of Regents which apply to faculty members. Voluminous information shall be made available for inspection or will be provided at reproduction cost.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Confidentiality and Data Security (a) The Custodian agrees to keep confidential, and to cause its employees and agents to keep confidential, all records of the Funds and information relating to the Funds, including without limitation information as to their respective shareholders and their respective portfolio holdings, unless the release of such records or information is made (i) in connection with the services provided under this Agreement, (ii) at the written direction of the applicable Fund or otherwise consented to, in writing, by the respective Funds, (iii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Custodian has determined, on the advice of counsel, that it is required to comply, or (iv) where the Custodian has determined, on the advice of counsel, that the failure to release such information would expose the Custodian to civil or criminal contempt proceedings; provided in the case of clause (iii) or (iv) the Custodian provides the applicable Fund written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Section 10(a), or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. Notwithstanding the foregoing but subject to Section 10(d), (1) the Custodian may use information regarding the Funds in connection with certain functions performed on a centralized basis by the Custodian, its affiliates or its or their service providers (including audit, accounting, risk, legal, compliance, sales, administration, product communication, relationship management, compilation and analysis of customer-related data and storage) and disclose such information to its affiliates and to its or their service providers who are subject to the confidentiality obligations hereunder with respect to such information, but only for the purpose of servicing the Funds in connection with the relationship contemplated by this Agreement or providing additional services to the Funds, and (2) the Custodian may aggregate Fund or Portfolio data with similar data of other customers of the Custodian (“Aggregated Data”) and may use Aggregated Data so long as such Aggregated Data represents such a sufficiently large sample that no Fund or Portfolio data can be identified either directly or by inference or implication. (b) Each Fund agrees to keep confidential all information obtained hereunder relating to the Custodian’s business (it being understood, however, that the existence and the terms of this Agreement are required to be publicly disclosed by the Funds), unless the release of such records or information is (i) necessary to facilitate the receipt of services provided under this Agreement, (ii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Fund has determined, on the advice of counsel, that it is required to comply, or (iii) where the Fund has determined, on the advice of counsel, that the failure to release such information would expose the Fund to civil or criminal contempt proceedings; provided in the case of clause (ii) or (iii) the Fund provides the Custodian written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Agreement, or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. (c) Notwithstanding any provision herein to the contrary, each party hereto agrees that any Nonpublic Personal Information, as defined under Section 248.3(t) of Regulation S-P (“Regulation S-P”), promulgated under the Xxxxx-Xxxxx-Xxxxxx Act (the “GLB Act”), disclosed or otherwise made accessible by a party hereunder is for the specific purpose of permitting the other party to perform its duties as set forth in this Agreement. Each party agrees that, with respect to such information, it will comply with Regulation S-P and the GLB Act and that it will not disclose any Nonpublic Personal Information received in connection with this Agreement to any other party, except to the extent necessary to carry out the services set forth in this Agreement or as otherwise permitted by Regulation S-P or the GLB Act. (d) Without limiting the generality of Section 10(a) hereof, the Custodian acknowledges and agrees that the Funds are prohibited by law from making selective public disclosure of information regarding portfolio holdings, that disclosure of any and all such information to the Custodian hereunder is made strictly under the conditions of confidentiality set forth in Section 10(a) hereof and solely for the purposes of the performance of custodial services hereunder, that any unauthorized disclosure or misuse of such information (including by the Custodian or any of its employees or agents, or any trading on the basis of such information by anyone in receipt of such information) may constitute a criminal offense of trading on or tipping of material inside information regarding publicly traded securities, that access to any and all such information regarding portfolio holdings of the Funds shall be restricted to those persons needing such information in the course of the performance of duties hereunder, and that the Custodian shall apprise all such persons having access of the obligation hereunder and under applicable law to prevent unauthorized disclosure of such confidential information. (e) The parties acknowledge and agree that any breach of Section 10(a) hereof would cause not only financial damage, but irreparable harm to the other party, for which money damages will not provide an adequate remedy. Accordingly, in the event of a breach of Section 10(a) hereof, the non-breaching party shall (in addition to all other rights and remedies it may have pursuant to this Agreement, including without limitation Section 8(g) hereof, and at law and in equity) be entitled to an injunction, without the necessity of posting any bond or surety, to restrain disclosure or misuse, in whole or in part, of any information in violation of Section 10(a) hereof. (f) The Custodian will implement and maintain a written information security program (the “Security Program”) that contains appropriate security measures designed to safeguard confidential records and information of the Funds consistent with applicable statutes, laws, rules and regulations, and definitive and binding guidance or interpretations by applicable authorities of any of the foregoing from time to time, including without limitation the personal information of the Funds’ shareholders, employees, trustees, directors and/or officers that the Custodian receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account with the Custodian. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. (g) The Security Program shall have administrative, technical and physical safeguards, appropriate to the type of information concerned, designed: (i) to maintain the security and confidentiality of records and information of the Funds; (ii) to protect against anticipated threats or hazards to the security or integrity of such records and information; and (iii) to protect against unauthorized access to or use of such records and information. The Custodian shall develop, implement and maintain, at its sole expense, a system or methodology to audit for compliance with the requirements of the preceding sentence that is consistent with the SOC controls framework. Such safeguards will include, but shall not be limited to, virus protection, password protection and encryption of data in transmission at a minimum standard of AES 256. The Custodian will provide the Fund, at least annually, with the most recent SOC reports of its systems and methodologies prepared by an independent third party, and will provide executive summaries of its most recent penetration and ethical hack testing of its internet-facing environment relevant to the systems used to provide services under this Agreement (in the form generally provided by the Custodian to other similarly situated customers of services similar to the services provided under this Agreement), as conducted by a qualified, independent third party selected by the Custodian. The Custodian shall maintain books and records sufficient to demonstrate its compliance with the terms of this Section 10(g). (h) Upon reasonable notice to the Custodian, the Custodian will arrange for its relevant subject matter experts to meet with the relevant subject matter experts of the Funds once annually and at such other times as the Funds may reasonably request to review the Custodian’s security controls and any deficiencies identified in the SSAE-18 audit reports, and for the Custodian to review with the Funds the penetration testing results and provide such additional information concerning the penetration tests as the Custodian determines to be prudent. At such meeting, the Funds may view the Custodian’s security-related policies and procedures; however, no documentation may be copied, shared, transmitted or removed from the Custodian’s premises, except as mutually agreed. In the event that the Funds identify any control deficiencies, the Custodian will discuss such findings with the Funds and will use reasonable efforts to develop a mutually agreeable remediation plan. All nonpublic documentation and information disclosed to the Funds in accordance with this Section 10(h) shall be deemed proprietary and confidential information of the Custodian. The Funds shall not disclose such documentation or information to any third party (except to the extent permitted, necessary or required pursuant to Section 10(b)) or use it for any purpose other than evaluating the Custodian’s security controls, except that the Funds may disclose the Custodian’s SSAE-18 summary to the Funds’ external auditors provided that such external auditors are required to maintain the confidentiality of the summary and any related information. (i) In the event of any actual or reasonably suspected, based on Custodian’s experience, breach of security of its systems resulting in the actual, probable or reasonably suspected unauthorized access to or acquisition, use, loss, destruction, compromise or disclosure of any of the confidential records or information of a Fund (each, a “Security Breach”), upon learning of the Security Breach, the Custodian shall notify such Fund as promptly as reasonably possible of the relevant facts related to such Security Breach then known to the Custodian, and of additional relevant facts promptly after they become known to the Custodian, in the manner provided in Section 12 hereof and also by sending notice to xxxxxxxxxxxxx@xxxxxxxxx.xxx and/or such other electronic mail address or addresses as a Fund may specify by written notice to the Custodian. The Custodian shall at its sole cost: (i) promptly investigate such Security Breach; (ii) resolve or mitigate the vulnerability that facilitated the Security Breach to the extent possible; (iii) restore any lost or damaged data using generally accepted data restoration techniques; and (iv) conduct a root cause analysis to provide the Fund with a summary of the findings and actions taken to prevent recurrence of such Security Breach. If a Security Breach occurs with respect to personal information in the possession or under the control of the Custodian or any of its affiliates, subsidiaries, agents or employees the Custodian shall be responsible for each Fund’s reasonable costs associated with responding to such Security Breach, including, but not limited to, the costs of notifying affected individuals and taking any remedial action required by applicable statutes, laws, rules and regulations and any such other remedial action that the Custodian reasonably deems necessary (with due regard for industry standards, if any). (j) If the Custodian uses any subsidiary or affiliate or, pursuant to Section 2.6(a), agent to perform the duties assigned to the Custodian by this Agreement, such subsidiary, affiliate or agent shall have appropriate controls in place to meet the objectives of this Section 10, and the Custodian shall exercise oversight over each such subsidiary, affiliate or agent to ensure ongoing compliance with the objectives of this Section 10. The Custodian will require each Foreign Sub-Custodian that it engages to provide services under this Agreement to establish and maintain reasonably designed safeguards and controls against the unauthorized access to and use of Fund data and information.

  • Privacy and Data Security (a) In the prior three (3) years, the Company and its Subsidiaries have been in compliance with Privacy Laws, and in all material respects with (i) Contracts (or portions thereof) between the Company or its Subsidiaries and other Persons relating to Personal Data and (ii) applicable written policies, public statements and other public representations relating to the Processing of Personal Data, inclusive of all disclosures required by applicable Privacy Laws (“Privacy and Data Security Policies,” and together with Privacy Laws and such Contracts, “Privacy Commitments”). The execution, delivery and performance by the Company of this Agreement to which the Company is or will be a party, and the consummation of the transactions contemplated hereby or thereby, are not reasonably expected to, directly or indirectly, result in a violation of any Privacy Commitments that would be materially adverse to the Company and its Subsidiaries, taken as a whole. (b) In the prior three (3) years, the Privacy and Data Security Policies have at all times been maintained and made available to individuals in accordance with reasonable industry practices and as required by Privacy Laws, are accurate and complete and are not misleading or deceptive (including by omission). The practices of the Company or its Subsidiaries with respect to the Processing of Personal Data conform in all material respects to the Privacy and Data Security Policies that govern such Personal Data. (c) There is (and in the prior three years there has been) no material Legal Proceeding pending or, to the Company’s knowledge, threatened against or involving the Company or its Subsidiaries initiated by any Person (including (i) the Federal Trade Commission, any state attorney general or similar state official, (ii) any other Governmental authority, foreign or domestic or (iii) any regulatory or self-regulatory entity) alleging that any Processing of Personal Data by or on behalf of the Company or its Subsidiaries is or was in violation of any Privacy Commitments. To the Company’s Knowledge, there are no facts, circumstances or conditions that would reasonably be expected to form the basis for any proceeding for any potential violation of any Privacy Commitments. (d) In the prior three (3) years, (i) there has been no unauthorized access to, or unauthorized use, disclosure, or Processing of Personal Data in the possession or control of the Company or its Subsidiaries or any of its contractors with regard to any Personal Data obtained from or on behalf of the Company or its Subsidiaries (“Security Incident”), (ii) there have been no unauthorized intrusions or breaches of security into any Company IT Systems, and (iii) none of the Company or any of its Subsidiaries has notified or been required to notify any Person of any (A) loss, theft or damage of, or (B) other unauthorized or unlawful access to, or use, disclosure or other Processing of, Personal Data, except, in each case of clauses (i), (ii), and (iii), as would not have a Company Material Adverse Effect. Each of the Company and its Subsidiaries has implemented commercially reasonable administrative, physical and technical safeguards, and ensures that its contractors processing Personal Data take such safeguards to protect the confidentiality, integrity and security of Personal Data against any Security Incident, including taking all reasonable steps to safeguard and back up Personal Data. (e) Each of the Company and its Subsidiaries owns or has a license or other right to use the Company IT Systems as necessary to operate the business of each the Company or its Subsidiaries as currently conducted. All Company IT Systems are (i) free from any defect, bug, virus or programming, design or documentation error and (ii) in sufficiently good working condition to effectively perform all information technology operations necessary for the operation of businesses of the Company and its Subsidiaries (except for ordinary wear and tear), except in each case of clauses (i) and (ii), as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Company and its Subsidiaries, taken as a whole. In the prior three years, there have not been any material failures, breakdowns or continued substandard performance of any Company IT Systems that have caused a material failure or disruption of the Company IT Systems other than routine failures or disruptions that have been remediated in the Ordinary Course of Business. In the past three (3) years, there have been no (except to the extent completely remediated), and to the Company’s Knowledge, there are no material security deficiencies or vulnerabilities in the Company IT Systems.

  • Information and Documents (a) From and after the date of this Agreement and to the earlier of the Closing Date and the date on which this Agreement is terminated pursuant to Section 9.1, to the extent permitted by applicable Law and upon reasonable advance notice, and solely for purposes of integration planning or in furtherance of the transactions contemplated by this Agreement and the Ancillary Agreements, (1) Seller Parent shall, and shall cause its Subsidiaries to, permit Purchaser Parent and its Representatives to have reasonable access, during normal business hours, to the books and records that constitute Purchased Assets, and to such personnel, offices and other facilities and properties that constitute Purchased Assets, and to provide such other information in respect of the Business as may be reasonably requested by Purchaser Parent for such purposes and (2) Purchaser Parent shall, and shall cause its Subsidiaries to, permit Seller Parent and its Representatives to have reasonable access, during normal business hours, to the books and records of Purchaser and its Subsidiaries or that are related to the Purchaser Business (provided that Purchaser Parent may redact any information in any such record not related to the Purchaser Business), and to such personnel, offices and other facilities and properties of Purchaser and its Subsidiaries or that are related to the Purchaser Business, and to provide such other information in respect of the Purchaser Business as may be reasonably requested by Seller Parent for such purposes; provided that all requests for access pursuant to this Section 6.1 shall be directed to and coordinated with a person or persons designated by Seller Parent or Purchaser Parent, as applicable, in writing; provided, further, that each Parent and its Subsidiaries may restrict the foregoing access or the provision of such information to the extent that, in the reasonable judgment of such Parent, (i) applicable Law requires such Parent or any of its Subsidiaries to restrict or prohibit such access or the provision of such information, (ii) providing such access would unreasonably interfere with the operation of such Parent’s and its Subsidiaries’ respective businesses, including the Business and the Purchaser Business, as applicable, (iii) providing such access or information would breach a confidentiality obligation to a third party, (iv) providing such access or information would result in disclosure of any information that is competitively or commercially sensitive, (v) in the case of access or information provided by Seller Parent, the information relates to the Strategic Process, or in the case of access or information provided by Purchaser Parent, the information relates to review of strategic alternatives with respect to the Purchaser Business, or (vi) providing such access or disclosure of any such information would reasonably be expected to result in the loss or waiver of the attorney-client or other applicable privilege or protection. In the event that a Parent or its Subsidiaries restricts access or withholds information on the basis of the foregoing clauses (i) through (vi), such Parent shall, if permitted, inform the other Parent as to the general nature of what is being restricted or withheld and the reason therefor, and such Parent shall, and shall cause its Subsidiaries to, use its commercially reasonable efforts to make appropriate substitute arrangements to permit disclosure of the relevant information in a manner that does not suffer from such impediments. Notwithstanding the foregoing, (A) prior to the Closing, neither Parent, nor any of its Affiliates and Representatives, shall conduct any phase II environmental site assessment or conduct any invasive testing or any sampling of soil, sediment, surface water, groundwater or building material at, on, under or within any property of the other Parent or its Subsidiaries and (B) prior to Closing, none of Seller Parent or any of its Affiliates, including the Conveyed Subsidiaries (and their Subsidiaries), shall provide Business Employee personnel files to Purchaser Parent or its Affiliates or Representatives and none of Purchaser Parent or any of its Affiliates, including Purchaser (and its Subsidiaries), shall provide Purchaser Business Employee personnel files to Seller Parent or its Affiliates or Representatives. Notwithstanding the foregoing, following Closing (x) to the extent permitted by Law, Seller Parent shall, and shall cause its Affiliates to, provide Purchaser and its Subsidiaries access to personnel records and other personnel information related to the Business Employees and Former Business Employees reasonably requested by Purchaser and its Subsidiaries and (y) Seller Parent shall, and shall cause its Affiliates to, retain all material records related to the Business Employees and Former Business Employees in accordance with Seller Parent’s records retention policies and, in no event, for less than such period of time required by applicable Law. It is further agreed that, prior to the Closing, each Parent and its Affiliates and Representatives shall not contact any of the directors, officers, employees, agents, customers, suppliers, licensors, licensees, distributors or other business partners of the other Parent or any of its Affiliates (including, with respect to Seller Parent, the Conveyed Subsidiaries (or their Subsidiaries) and, with respect to Purchaser Parent, Purchaser and its Subsidiaries) in connection with the transactions contemplated by this Agreement, whether in person or by telephone, mail or other means of communication, without the specific prior authorization by the other Parent (not to be unreasonably withheld, conditioned or delayed); provided that the foregoing shall not prevent any Parent or its Affiliates from operating in the ordinary course of business and communicating with such parties on matters unrelated to the Business or the Purchaser Business, as applicable, and the transactions contemplated by this Agreement. Notwithstanding anything to the contrary contained herein, in no event shall Seller Parent or any of its Affiliates, including the Conveyed Subsidiaries (and their Subsidiaries), be required to provide any information as and to the extent it relates to any Retained Businesses, any Excluded Assets or any Retained Liabilities, or be required to provide a copy of, or otherwise disclose the contents of, any Seller Combined Tax Return, and in no event shall Purchaser Parent or any of its Affiliates, including Purchaser and its Subsidiaries, be required to provide any information as and to the extent it relates to any Purchaser Parent Retained Businesses or any Purchaser Parent Retained Liabilities. The Parties agree that, with respect to any matters that are the subject of both this Section 6.1(a) and Section 6.5(i), the provisions of Section 6.5(i) (and not this Section 6.1(a)) shall control. (b) Subject to Section 6.12, all information received or otherwise obtained by either Parent or its Affiliates or Representatives from, by or on behalf of the other Parent or any of its Affiliates or Representatives, in connection with the negotiation, execution, performance or consummation of this Agreement and the transactions contemplated hereby, whether prior to, on or following the date of this Agreement, will be held by such Parent and its Affiliates and Representatives pursuant to the terms of the Confidentiality Agreement and Section 6.12. Subject to Section 6.12(d), the Confidentiality Agreement and the Clean Team Agreement shall remain in full force and effect in accordance with their terms (subject to Section 9.2(d)) notwithstanding any termination of this Agreement. (c) From and after the date of this Agreement until the earlier of the Closing Date and the date on which this Agreement is terminated pursuant to Section 9.1, Seller Parent and its Subsidiaries shall consult with and provide material updates to Purchaser Parent regarding the matters disclosed on Section 6.1(c) of the Purchaser Disclosure Letter.

  • Identification and Disclosure of Privacy and Security Offices Business Associate and Subcontractors shall provide, within ten (10) days of the execution of this agreement, written notice to the Covered Entity’s contract/grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer. This information must be updated any time either of these contacts changes.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Safeguard Measures The Parties note the multilateral negotiations pursuant to Article X of GATS on the question of emergency safeguard measures based on the principle of non-discrimination. Upon the conclusion of such multilateral negotiations, the Parties shall conduct a review for the purpose of discussing appropriate amendments to this Agreement so as to incorporate the results of such multilateral negotiations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!