Information Technology Confidentiality and Security Requirements Sample Clauses

Information Technology Confidentiality and Security Requirements. All Contractors with access to County data and/or systems shall establish and maintain policies, procedures, and technical, physical, and administrative safeguards designed to (i) ensure the confidentiality, integrity, and availability of all County data and any other confidential information that the Contractor receives, stores, maintains, processes, transmits, or otherwise accesses in connection with the provision of the contracted services, (ii) protect against any threats or hazards to the security or integrity of County data, systems, or other confidential information, (iii) protect against unauthorized access, use, or disclosure of personal or County confidential information, (iv) maintain reasonable procedures to prevent, detect, respond, and provide notification to the County regarding any internal or external security breaches, (v) ensure the return or appropriate disposal of personal information or other confidential information upon contract conclusion (or per retention standards set forth in the contract), and
AutoNDA by SimpleDocs
Information Technology Confidentiality and Security Requirements a. Information Access: Contractor personnel performing Services under this Contract are subject to the confidentiality and non-disclosure restrictions contained in Paragraph “T” of this Contract. County shall authorize, and Contractor shall issue, any necessary information-access mechanisms, including access IDs and passwords, and in no event shall Contractor permit any such mechanisms to be shared or used by other than the individual Contractor personnel to whom issued. Contractor shall provide each Contractor staff with only such level of access as is required for such individual to perform his or her assigned tasks and functions. All County systems, and all data and software contained therein, including County Data, County hardware and County software, used or accessed by Contractor: (a) shall be used and accessed by such Contractor solely and exclusively in the performance of their assigned duties in connection with, and in furtherance of, the performance of Contractor’s obligations hereunder; and (b) shall not be used or accessed except as expressly permitted hereunder, or commercially exploited in any manner whatsoever, by Contractor, at any time, except that Contractor shall have the right to aggregate and retain non-personally identifiable data. b. Enhanced Security Procedures: County may, in its discretion, designate certain areas, facilities, or systems as requiring a higher level of security and access control where such areas, facilities, or systems are wholly within County’s control. County shall notify Contractor in writing reasonably in advance of any such designation becoming effective. Any such notice shall set forth in reasonable detail the enhanced security or access-control procedures, measures, or requirements that Contractor shall be required to implement and enforce, as well as the date on which such procedures and measures shall take effect. Contractor shall fully comply with and abide by all such enhanced security and access measures and procedures as of such date.
Information Technology Confidentiality and Security Requirements. All Contractors with access to County data and/or systems shall establish and maintain policies, procedures, and technical, physical, and administrative safeguards designed to (i) ensure the confidentiality, integrity, and availability of all County data and any other confidential DocuSign Envelope ID: B2D8B005-166D-49C0-9152-CE5F4E87D410 information that the Contractor receives, stores, maintains, processes, transmits, or otherwise accesses in connection with the provision of the contracted services, (ii) protect against any threats or hazards to the security or integrity of County data, systems, or other confidential information, (iii) protect against unauthorized access, use, or disclosure of personal or County confidential information, (iv) maintain reasonable procedures to prevent, detect, respond, and provide notification to the County regarding any internal or external security breaches, (v) ensure the return or appropriate disposal of personal information or other confidential information upon contract conclusion (or per retention standards set forth in the contract), and

Related to Information Technology Confidentiality and Security Requirements

  • Confidentiality and Security Section 1: Service Provider agrees that all of its employees, contractors, subcontractors, or associates will comply with all state and federal law and with TJJD policies regarding maintaining the confidentiality of TJJD youth, including, but not limited to, maintaining confidentiality of student records and identifying information. Section 2: Service Provider agrees that all information regarding TJJD and/or its youth that is gathered, produced, or otherwise derived from this contract shall remain confidential and subject to release only by permission of TJJD. Section 3: Service Provider’s employees, contractors, subcontractors, or associates who visit any TJJD facility will comply with that facility's security regulations. Section 4: Identifying pictures, appearances, films, or reports of TJJD youth may not be disclosed by Service Provider without the written consent of TJJD, of the youth and, if under age 18, of the youth’s parent, guardian, or managing conservator.

  • Confidentiality and Data Protection We are a data controller for the information you provide to us including individual, identification and financial details, policy history and special category data (such as medical or criminal history). Details of our legal basis for processing your information, along with details of any third party recipient whom it may be necessary to share your personal data with in order to fulfil the contract, retention period for data held, security of your data, your rights under the UK General Data Protection Regulations (UK GDPR) including the right to complain can be found in our full ‘Privacy Notice’ attached to these terms of business and/or on our website at xxx.xxxxxxxxxxxxxxxx.xx.xx.

  • Confidentiality and Data Security (a) The Custodian agrees to keep confidential, and to cause its employees and agents to keep confidential, all records of the Funds and information relating to the Funds, including without limitation information as to their respective shareholders and their respective portfolio holdings, unless the release of such records or information is made (i) in connection with the services provided under this Agreement, (ii) at the written direction of the applicable Fund or otherwise consented to, in writing, by the respective Funds, (iii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Custodian has determined, on the advice of counsel, that it is required to comply, or (iv) where the Custodian has determined, on the advice of counsel, that the failure to release such information would expose the Custodian to civil or criminal contempt proceedings; provided in the case of clause (iii) or (iv) the Custodian provides the applicable Fund written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Section 10(a), or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. Notwithstanding the foregoing but subject to Section 10(d), (1) the Custodian may use information regarding the Funds in connection with certain functions performed on a centralized basis by the Custodian, its affiliates or its or their service providers (including audit, accounting, risk, legal, compliance, sales, administration, product communication, relationship management, compilation and analysis of customer-related data and storage) and disclose such information to its affiliates and to its or their service providers who are subject to the confidentiality obligations hereunder with respect to such information, but only for the purpose of servicing the Funds in connection with the relationship contemplated by this Agreement or providing additional services to the Funds, and (2) the Custodian may aggregate Fund or Portfolio data with similar data of other customers of the Custodian (“Aggregated Data”) and may use Aggregated Data so long as such Aggregated Data represents such a sufficiently large sample that no Fund or Portfolio data can be identified either directly or by inference or implication. (b) Each Fund agrees to keep confidential all information obtained hereunder relating to the Custodian’s business (it being understood, however, that the existence and the terms of this Agreement are required to be publicly disclosed by the Funds), unless the release of such records or information is (i) necessary to facilitate the receipt of services provided under this Agreement, (ii) in response to a request of a governmental, regulatory or self-regulatory authority or agency or pursuant to a subpoena, court order or other legal process, in each case with respect to which the Fund has determined, on the advice of counsel, that it is required to comply, or (iii) where the Fund has determined, on the advice of counsel, that the failure to release such information would expose the Fund to civil or criminal contempt proceedings; provided in the case of clause (ii) or (iii) the Fund provides the Custodian written notice of such requirement to release such records or information, to the extent such notice is permitted. The foregoing shall not be applicable to any information that is publicly available when provided and shall cease to be applicable to any information that thereafter becomes publicly available, other than through a breach of this Agreement, or that is independently derived by any party hereto without the use of any information derived in connection with the services provided under this Agreement. (c) Notwithstanding any provision herein to the contrary, each party hereto agrees that any Nonpublic Personal Information, as defined under Section 248.3(t) of Regulation S-P (“Regulation S-P”), promulgated under the Xxxxx-Xxxxx-Xxxxxx Act (the “GLB Act”), disclosed or otherwise made accessible by a party hereunder is for the specific purpose of permitting the other party to perform its duties as set forth in this Agreement. Each party agrees that, with respect to such information, it will comply with Regulation S-P and the GLB Act and that it will not disclose any Nonpublic Personal Information received in connection with this Agreement to any other party, except to the extent necessary to carry out the services set forth in this Agreement or as otherwise permitted by Regulation S-P or the GLB Act. (d) Without limiting the generality of Section 10(a) hereof, the Custodian acknowledges and agrees that the Funds are prohibited by law from making selective public disclosure of information regarding portfolio holdings, that disclosure of any and all such information to the Custodian hereunder is made strictly under the conditions of confidentiality set forth in Section 10(a) hereof and solely for the purposes of the performance of custodial services hereunder, that any unauthorized disclosure or misuse of such information (including by the Custodian or any of its employees or agents, or any trading on the basis of such information by anyone in receipt of such information) may constitute a criminal offense of trading on or tipping of material inside information regarding publicly traded securities, that access to any and all such information regarding portfolio holdings of the Funds shall be restricted to those persons needing such information in the course of the performance of duties hereunder, and that the Custodian shall apprise all such persons having access of the obligation hereunder and under applicable law to prevent unauthorized disclosure of such confidential information. (e) The parties acknowledge and agree that any breach of Section 10(a) hereof would cause not only financial damage, but irreparable harm to the other party, for which money damages will not provide an adequate remedy. Accordingly, in the event of a breach of Section 10(a) hereof, the non-breaching party shall (in addition to all other rights and remedies it may have pursuant to this Agreement, including without limitation Section 8(g) hereof, and at law and in equity) be entitled to an injunction, without the necessity of posting any bond or surety, to restrain disclosure or misuse, in whole or in part, of any information in violation of Section 10(a) hereof. (f) The Custodian will implement and maintain a written information security program (the “Security Program”) that contains appropriate security measures designed to safeguard confidential records and information of the Funds consistent with applicable statutes, laws, rules and regulations, and definitive and binding guidance or interpretations by applicable authorities of any of the foregoing from time to time, including without limitation the personal information of the Funds’ shareholders, employees, trustees, directors and/or officers that the Custodian receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account with the Custodian. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. (g) The Security Program shall have administrative, technical and physical safeguards, appropriate to the type of information concerned, designed: (i) to maintain the security and confidentiality of records and information of the Funds; (ii) to protect against anticipated threats or hazards to the security or integrity of such records and information; and (iii) to protect against unauthorized access to or use of such records and information. The Custodian shall develop, implement and maintain, at its sole expense, a system or methodology to audit for compliance with the requirements of the preceding sentence that is consistent with the SOC controls framework. Such safeguards will include, but shall not be limited to, virus protection, password protection and encryption of data in transmission at a minimum standard of AES 256. The Custodian will provide the Fund, at least annually, with the most recent SOC reports of its systems and methodologies prepared by an independent third party, and will provide executive summaries of its most recent penetration and ethical hack testing of its internet-facing environment relevant to the systems used to provide services under this Agreement (in the form generally provided by the Custodian to other similarly situated customers of services similar to the services provided under this Agreement), as conducted by a qualified, independent third party selected by the Custodian. The Custodian shall maintain books and records sufficient to demonstrate its compliance with the terms of this Section 10(g). (h) Upon reasonable notice to the Custodian, the Custodian will arrange for its relevant subject matter experts to meet with the relevant subject matter experts of the Funds once annually and at such other times as the Funds may reasonably request to review the Custodian’s security controls and any deficiencies identified in the SSAE-18 audit reports, and for the Custodian to review with the Funds the penetration testing results and provide such additional information concerning the penetration tests as the Custodian determines to be prudent. At such meeting, the Funds may view the Custodian’s security-related policies and procedures; however, no documentation may be copied, shared, transmitted or removed from the Custodian’s premises, except as mutually agreed. In the event that the Funds identify any control deficiencies, the Custodian will discuss such findings with the Funds and will use reasonable efforts to develop a mutually agreeable remediation plan. All nonpublic documentation and information disclosed to the Funds in accordance with this Section 10(h) shall be deemed proprietary and confidential information of the Custodian. The Funds shall not disclose such documentation or information to any third party (except to the extent permitted, necessary or required pursuant to Section 10(b)) or use it for any purpose other than evaluating the Custodian’s security controls, except that the Funds may disclose the Custodian’s SSAE-18 summary to the Funds’ external auditors provided that such external auditors are required to maintain the confidentiality of the summary and any related information. (i) In the event of any actual or reasonably suspected, based on Custodian’s experience, breach of security of its systems resulting in the actual, probable or reasonably suspected unauthorized access to or acquisition, use, loss, destruction, compromise or disclosure of any of the confidential records or information of a Fund (each, a “Security Breach”), upon learning of the Security Breach, the Custodian shall notify such Fund as promptly as reasonably possible of the relevant facts related to such Security Breach then known to the Custodian, and of additional relevant facts promptly after they become known to the Custodian, in the manner provided in Section 12 hereof and also by sending notice to xxxxxxxxxxxxx@xxxxxxxxx.xxx and/or such other electronic mail address or addresses as a Fund may specify by written notice to the Custodian. The Custodian shall at its sole cost: (i) promptly investigate such Security Breach; (ii) resolve or mitigate the vulnerability that facilitated the Security Breach to the extent possible; (iii) restore any lost or damaged data using generally accepted data restoration techniques; and (iv) conduct a root cause analysis to provide the Fund with a summary of the findings and actions taken to prevent recurrence of such Security Breach. If a Security Breach occurs with respect to personal information in the possession or under the control of the Custodian or any of its affiliates, subsidiaries, agents or employees the Custodian shall be responsible for each Fund’s reasonable costs associated with responding to such Security Breach, including, but not limited to, the costs of notifying affected individuals and taking any remedial action required by applicable statutes, laws, rules and regulations and any such other remedial action that the Custodian reasonably deems necessary (with due regard for industry standards, if any). (j) If the Custodian uses any subsidiary or affiliate or, pursuant to Section 2.6(a), agent to perform the duties assigned to the Custodian by this Agreement, such subsidiary, affiliate or agent shall have appropriate controls in place to meet the objectives of this Section 10, and the Custodian shall exercise oversight over each such subsidiary, affiliate or agent to ensure ongoing compliance with the objectives of this Section 10. The Custodian will require each Foreign Sub-Custodian that it engages to provide services under this Agreement to establish and maintain reasonably designed safeguards and controls against the unauthorized access to and use of Fund data and information.

  • Confidentiality and Trade Secrets (a) The Executive acknowledges and agrees that his position as an employee of the Company will afford him a unique opportunity to acquire confidential information concerning the Company and that the misappropriation or disclosure of such confidential information would cause irreparable harm to the Company. The Executive recognizes and agrees that he will have access to certain confidential information of the Company that is not generally available to the public and that such information constitutes valuable, special and unique property of the Company. The Executive acknowledges that such confidential information includes information concerning the Business and the Company including, without limitation, financial information concerning the Business or the Company, the names and addresses of actual and potential customers or acquisition or investment targets of the Business or the Company, studies of prospective market areas for the Business, supply sources, products, technical data, notes, diagrams, drawings, flow charts, ideas, techniques, specifications, procedures, processes, research, development, and trade secrets of the Business and the Company (such information whether related to the Business or the Company being referred to collectively as the “Confidential Information”). Confidential Information shall not include any information or documents (i) that are or become publicly available or otherwise known in the industry without breach of this Section 4.02; or (ii) that the Executive rightfully receives from any third party which is not breaching an obligation of confidence with the Company or without an accompanying obligation of confidence; or (iii) that were known to or by the Executive prior to his appointment with the Company without breach of this Section 4.02. In the event that the Executive is requested in any court or governmental proceeding to disclose any Confidential Information, the Executive shall give the Company prompt notice of such request such that the Company may seek a protective order or other appropriate relief and shall cooperate in all respects with the Company in its efforts in connection therewith. (b) The Executive will keep confidential and will not, during his employment and for a period of five (5) years after any termination under this Agreement (whether by expiration or pursuant to Section 5.01 or otherwise), directly or indirectly, divulge to anyone, use or otherwise appropriate any of the Confidential Information for any reason or purpose whatsoever except to authorize representatives of the Company or when, in the good faith belief of the Executive, such disclosure is necessary or desirable in the normal course of the Business in order for the Executive to fulfill his duties and responsibilities to the Company as set out in Section 2.02. (c) The Executive acknowledges and agrees that these prohibitions against disclosure of Confidential Information are in addition to, and not in lieu of, any rights or remedies which the Company may have available pursuant to the laws of any jurisdiction or at common law to prevent the disclosure of trade secrets or proprietary information, and the enforcement by the Company of any of their rights and remedies pursuant to this Agreement shall not be construed as a waiver of any other rights or available remedies which they may possess in law or equity absent this Agreement. (d) Upon any termination of his employment under this Agreement, the Executive shall surrender to the Company all documents and materials in his possession, custody or control embodying the Confidential Information or any part thereof.

  • Data Protection and Confidentiality 9.5.1 The Tenant’s personal data, which will be processed in the execution of this Agreement will be handled in accordance with the General Data Protection Regulation (EU) 2016/679. Further details regarding this processing activity is set out in the associated Privacy Notice, which can be found at: xxxxx://xxx.xxxxxxx.xxx/privacy-policy

  • Restriction on Disclosure and Use of Confidential Information Executive agrees that Executive shall not, directly or indirectly, use any Confidential Information on Executive’s own behalf or on behalf of any Person other than Employer, or reveal, divulge, or disclose any Confidential Information to any Person not expressly authorized by Employer to receive such Confidential Information. This obligation shall remain in effect for as long as the information or materials in question retain their status as Confidential Information. Executive further agrees to fully cooperate with Employer in maintaining the Confidential Information to the extent permitted by law. The Parties acknowledge and agree that this Agreement is not intended to, and does not, alter either Employer’s rights or Executive’s obligations under any state or federal statutory or common law regarding trade secrets and unfair trade practices. Anything herein to the contrary notwithstanding, Executive shall not be restricted from disclosing information that is required to be disclosed by law, court order, or other valid and appropriate legal process; provided, however, that in the event such disclosure is required by law, Executive shall provide Employer with prompt notice of such requirement so that Employer may seek an appropriate protective order prior to any such required disclosure by Executive. Executive understands and acknowledges that nothing in this section limits Executive’s ability to report possible violations of federal, state, or local law or regulation to any governmental agency or entity; to communicate with any government agencies or otherwise participate in any investigation or proceeding that may be conducted by any government agencies in connection with any charge or complaint, whether filed by Executive, on Executive’s behalf, or by any other individual; or to make other disclosures that are protected under the whistleblower provisions of federal, state, or local law or regulation, and Executive shall not need the prior authorization of Employer to make any such reports or disclosures and shall not be required to notify Employer that Executive has made such reports or disclosures. In addition, and anything herein to the contrary notwithstanding, Executive is hereby given notice that Executive shall not be criminally or civilly liable under any federal or state trade secret law for disclosing a trade secret (as defined by 18 U.S.C. § 1839) in confidence to a federal, state, or local government official, either directly or indirectly, or to an attorney, in either event solely for the purpose of reporting or investigating a suspected violation of law; or disclosing a trade secret (as defined by 18 U.S.C. § 1839) in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Confidentiality and Proprietary Information 9.1 For the purposes of this Agreement, Confidential Information (“Confidential Information”) means confidential or proprietary technical or business information given by one Party (the “Discloser”) to the other (the “Recipient”). All information which is disclosed by one Party to the other in connection with this Agreement, during negotiations and the term of this Agreement will not be deemed Confidential Information to the Discloser and subject to this Section 9, unless the confidentiality of the information is confirmed in writing by the Discloser prior to disclosure. The Recipient agrees (i) to use Confidential Information only for the purpose of performing under this Agreement, (ii) to hold it in confidence and disclose it to no one other than its employees having a need to know for the purpose of performing under this Agreement, and (iii) to safeguard it from unauthorized use or disclosure using at least the same degree of care with which the Recipient safeguards its own Confidential Information. If the Recipient wishes to disclose the Discloser's Confidential Information to a third-party agent or consultant, such disclosure must be agreed to in writing by the Discloser, and the agent or consultant must have executed a written agreement of nondisclosures and nonuse comparable in scope to the terms of this section. 9.2 The Recipient may make copies of Confidential Information only as reasonably necessary to perform its obligations under this Agreement. All such copies will be subject to the same restrictions and protections as the original and will bear the same copyright and proprietary rights notices as are contained on the original. 9.3 The Recipient agrees to return all Confidential Information in tangible form received from the Discloser, including any copies made by the Recipient, within thirty (30) days after a written request is delivered to the Recipient, or to destroy all such Confidential Information if directed to do so by Discloser except for Confidential Information that the Recipient reasonably requires to perform its obligations under this Agreement; the Recipient shall certify destruction by written letter to the Discloser. If either Party loses or makes an unauthorized disclosure of the Party’s Confidential Information, it will notify such other Party immediately and use its best efforts to retrieve the lost or wrongfully disclosed information. 9.4 The Recipient shall have no obligation to safeguard Confidential Information: (i) which was in the possession of the Recipient free of restriction prior to its receipt from the Discloser; (ii) after it becomes publicly known or available through no breach of this Agreement by the Recipient; (iii) after it is rightfully acquired by the Recipient free of restrictions on its discloser; (iv) after it is independently developed by personnel of the Recipient to whom the Discloser's Confidential Information had not been previously disclosed. In addition, either Party will have the right to disclose Confidential Information to any mediator, arbitrator, state or federal regulatory body, or a court in the conduct of any mediation, arbitration or approval of this Agreement, as long as, in the absence of an applicable protective order, the Discloser has been previously notified by the Recipient in time sufficient for the Recipient to undertake all lawful measures to avoid disclosing such confidential information and for Discloser to have reasonable time to seek or negotiate a protective order before or with any applicable mediator, arbitrator, state or regulatory body or a court. 9.5 The Parties recognize that an individual End User may simultaneously seek to become or be a customer of both Parties. Nothing in this Agreement is intended to limit the ability of either Party to use customer specific information lawfully obtained from End Users or sources other than the Discloser. 9.6 Each Party’s obligations to safeguard Confidential Information disclosed prior to expiration or termination of this Agreement will survive such expiration or termination. 9.7 No license is hereby granted under any patent, trademark, or copyright, nor is any such license implied solely by virtue or the disclosure of any Confidential Information. 9.8 Each Party agrees that the Discloser may be irreparably injured by a disclosure in breach of this Agreement by the Recipient or its representatives and the Discloser will be entitled to seek equitable relief, including injunctive relief and specific performance, in the event of any breach or threatened breach of the confidentiality provisions of this Agreement. Such remedies will not be deemed to be the exclusive remedies for a breach of this Agreement, but will be in addition to all other remedies available at law or in equity.

  • Access, Information and Confidentiality (a) From the date of this Agreement, until the date when the Investor no longer beneficially owns at least fifty percent (50%) or more of all of the Purchased Shares (a “Qualifying Ownership Interest”), subject to applicable law or regulatory requirements, the Company will use reasonable efforts to afford the Investor and its representatives (including employees of the Investor, and counsel, accountants, investment advisors and other professionals retained by the Investor) such access during normal business hours to its and the Company Subsidiaries’ books, records, properties and personnel and to such other information as the Investor may reasonably request. (b) Each party to this Agreement will hold, and will cause its respective subsidiaries and their directors, officers, employees, agents, consultants, and advisors to hold, in strict confidence, unless disclosure to a Governmental Entity (and, solely with respect to the Company, the Bankruptcy Court) is necessary or appropriate in connection with any necessary regulatory approval or unless compelled to disclose by judicial or administrative process or by other requirement of law or the applicable requirements of any Governmental Entity (and, solely with respect to the Company, the Bankruptcy Court), all nonpublic records, books, contracts, instruments, computer data and other data and information (collectively, “Information”) concerning the other party hereto furnished to it by such other party or its representatives pursuant to this Agreement (except to the extent that such Information can be shown to have been (1) previously known by such party on a nonconfidential basis, (2) in the public domain through no fault of such party, or (3) later lawfully acquired from other sources by the party to which it was furnished), and neither party hereto shall release or disclose such Information to any other person, except its auditors, attorneys, financial advisors, other consultants, and advisors and, to the extent permitted above, to bank regulatory authorities. Prior to any disclosure of Information permitted by the prior sentence, the party proposing to disclose such Information shall, to the extent legally permissible, provide notice to the other party so that the other party may, at its own expense, seek an protective order or other appropriate remedy and/or waive compliance with the provisions of this Section 3.2(b). If such protective order or other remedy is denied, the party proposing to disclose such Information shall (x) furnish only that portion of the Information that, based upon the advice of counsel, is necessary to be disclosed in connection with such necessary regulatory approval or is compelled to be disclosed by such judicial or administrative process or by such other requirement of law or such applicable requirements and (y) use its reasonable best efforts to obtain assurances that confidential treatment will be accorded to the Information.

  • Information and Confidentiality 18.1 Each party recognises that under this Agreement it may receive Confidential Information belonging to the other. 18.2 Each party agrees to treat all Confidential Information belonging to the other as confidential and not to disclose such Confidential Information or any other confidential information relating to the GLA arising or coming to its attention during the currency of this Agreement to any third party without the prior written consent of the other party and agrees not to use such Confidential Information for any purpose other than that for which it is supplied under this Agreement. 18.3 The obligations of confidence referred to in this Condition 18 shall not apply to any Confidential Information which: 18.3.1 is in, or which comes into, the public domain otherwise than by reason of a breach of this Agreement or of any other duty of confidentiality relating to that information; 18.3.2 is obtained from a third party without that third party being under an obligation (express or implied) to keep the information confidential; 18.3.3 is lawfully in the possession of the other party before the date of this Agreement and in respect of which that party is not under an existing obligation of confidentiality; or 18.3.4 is independently developed without access to the Confidential Information of the other party. 18.4 Each party will be permitted to disclose Confidential Information to the extent that it is required to do so: 18.4.1 to enable the disclosing party to perform its obligations under this Agreement; or 18.4.2 by any applicable Law or by a court, arbitral or administrative tribunal in the course of proceedings before it including without limitation any requirement for disclosure under FOIA, EIR or the Code of Practice on Access to Government Information and the Grant Recipient acknowledges that any lists or schedules provided by it outlining Confidential Information are of indicative value only and the GLA may nevertheless be obliged to disclose such Confidential Information; or 18.4.3 by any Regulatory Body (including any investment exchange and the Regulator) acting in the course of proceedings before it or acting in the course of its duties; or 18.4.4 in order to give proper instructions to any professional adviser of that party who also has an obligation to keep any such Confidential Information confidential. 18.5 Each party shall ensure that all Confidential Information obtained by it under or in connection with this Agreement: 18.5.1 is given only to such of its employees, professional advisors or consultants engaged to advise it in connection with this Agreement as is strictly necessary for the performance of this Agreement and only to the extent necessary for the performance of this Agreement; 18.5.2 is treated as confidential and not disclosed (without the other party's prior written approval) or used by any such staff or professional advisors or consultants otherwise than for the purposes of this Agreement; 18.5.3 where it is considered necessary in the opinion of the other party, the relevant party shall ensure that such staff, professional advisors or consultants sign a confidentiality undertaking before commencing work in connection with this Agreement. 18.6 Nothing in this Condition 18 shall prevent the either party from: (a) the examination and certification of its accounts; or (b) any examination pursuant to Section 6(1) of the National Audit Xxx 0000 of the economy, efficiency and effectiveness with which the GLA has used its resources; or

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!