We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.
For more information visit our privacy policy.Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.
Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.
Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.
Treatment of Confidential Information (A) Each party agrees that at all times during and after the terms of this Agreement, it shall use, handle, collect, maintain, and safeguard Confidential Information in accordance with (1) the confidentiality and non-disclosure requirements of this Agreement; (2) the GLB Act, as applicable and as it may be amended; and (3) such other Applicable Law, whether in effect now or in the future. (B) Without limiting the foregoing, the Receiving Party shall apply to any Confidential Information at least the same degree of reasonable care used for its own confidential and proprietary information to avoid unauthorized disclosure or use of Confidential Information under this Agreement. (C) Each party further agrees that: (1) The Receiving Party will hold all Confidential Information it obtains in strictest confidence and will use and permit use of Confidential Information solely for the purposes of this Agreement or as otherwise provided for in this Agreement, and consistent therewith, may disclose or provide access to its responsible employees or agents who have a need to know and are under adequate confidentiality agreements or arrangements and make copies of Confidential Information to the extent reasonably necessary to carry out its obligations under this Agreement; (2) Notwithstanding the foregoing, the Receiving Party may release Confidential Information as permitted or required by law or approved in writing by the Disclosing party, which approval shall not be unreasonably withheld and may not be withheld where the Receiving Party may be exposed to civil or criminal liability or proceedings for failure to release such information; (3) Additionally, Ultimus may provide Confidential Information typically supplied in the investment company industry to companies that track or report price, performance or other information regarding investment companies; and (4) The Receiving Party will immediately notify the Disclosing Party of any unauthorized disclosure or use, and will cooperate with the Disclosing Party to protect all proprietary rights in any Confidential Information.
HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.
Confidential Data Employee further agrees that, during his employment with Employer and thereafter, he will keep confidential and not divulge to anyone, disseminate nor appropriate for his own benefit or the benefit of another any confidential information described in Exhibit C attached hereto and incorporated by reference herein (the "Confidential Data"). Employee hereby acknowledges and agrees that this prohibition against disclosure of Confidential Data is in addition to, and not in lieu of, any rights or remedies that Employer may have available pursuant to the laws of any jurisdiction or at common law to prevent the disclosure of trade secrets, and the enforcement by Employer of its rights and remedies pursuant to this Agreement shall not be construed as a waiver of any other rights or available remedies that it may possess in law or equity absent this Agreement.
Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.
Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.
Use of Confidential Information 7.1 Each Party may be given access to Confidential Information from the other Party in order to perform its obligations under this Agreement. The Party that receives Confidential Information shall be known as “Receiving Party”. The Party that discloses Confidential Information shall be known as “Disclosing Party”. 7.2 The Receiving Party acknowledges that the Confidential Information is received on a confidential basis, and that the Disclosing Party shall remain the exclusive owner of its Confidential Information and of Intellectual Property rights contained therein. No license or conveyance of any such rights to the Receiving Party is granted or implied under this Agreement. 7.3 The Receiving Party shall: (a) use the Confidential Information of the Disclosing Party only for purposes of complying with its obligations under this Agreement and, without limiting the generality of the foregoing, shall not, directly or indirectly, deal with, use, exploit or disclose such Confidential Information or any part thereof to any person or entity or for any purpose whatsoever (or in any manner which would benefit any competitor of the Disclosing Party) except as expressly permitted hereunder or unless and until expressly authorized in writing to do so by the Disclosing Party; (b) use reasonable efforts to treat, and to cause all its officers, agents, servants, employees, professional advisors and contractors and prospective contractors to treat, as strictly confidential all Confidential Information. In no event shall such efforts be less than the degree of care and discretion as the Receiving Party exercises in protecting its own valuable confidential information. Any contractors engaged by or prospective contractors to be engaged by the Receiving Party in connection with the performance of the Services shall be required to assume obligations of secrecy equal to or greater than the obligations that the Receiving Party has assumed in this Agreement with respect to the Confidential Information; (c) not, without the prior written consent of the Disclosing Party, disclose or otherwise make available the Disclosing Party’s Confidential Information or any part thereof to any party other than those of its directors, officers, agents, servants, employees, professional advisors, contractors or prospective contractors who need to know the Confidential Information for the purposes set forth herein; (d) not copy or reproduce in any manner whatsoever the Confidential Information of the Disclosing Party or any part thereof without the prior written consent of the Disclosing Party, except where required for its own internal use in accordance with this Agreement; and (e) promptly, upon termination or expiration of this Agreement, return and confirm in writing the return of all originals, copies, reproductions and summaries of Confidential Information or, or at the option of the Disclosing Party, destroy and confirm in writing the destruction of the Confidential Information (this sub- clause being applicable only on the User). 7.4 Provided, however that nothing herein shall restrict in any manner the ability of either Party to use or disclose Confidential Information owned by it in any manner whatsoever, and the obligations of confidentiality herein shall apply to each Party only to the extent that the Confidential Information or portion thereof is not owned by that particular Party.
Regulatory Information (a) All the notaries at De Pinna LLP are regulated through the Faculty Office of the Archbishop of Canterbury. Its address is The Faculty Office, 0 Xxx Xxxxxxxxx, Xxxxxxxxxxx, Xxxxxx XX0X 0XX, its telephone: 000 0000 0000, and it can be reached by email at xxxxxxx.xxxxxx@0xxxxxxxxxxxx.xxx. It also has a website at xxx.xxxxxxxxxxxxx.xxx.xx. (b) We are required to comply with the rules of professional conduct and other regulatory arrangements of the Master of the Faculties, the sole regulator of notarial activities under the Legal Services Act 2007. Information about those rules and regulations may be found at xxxx://xxx.xxxxxxxxxxxxx.xxx.xx/notary/i-am-a-notary/notaries-rules-regulations/. (c) We comply with the Code of Practice published by the Master of the Faculties: xxxx://xxx.xxxxxxxxxxxxx.xxx.xx/notary/code-of-practice.