No Sensitive Information; Security Sample Clauses

No Sensitive Information; Security. User acknowledges and agrees that HDG is not responsible for any sensitive information related to the use of the Solution, including but not limited to protected health information under HIPAA, credit card numbers, financial account numbers, or other similarly-sensitive personal information, and that User assumes all risk arising from the use of any such sensitive information with the Solution, including the risk of any inadvertent disclosure or unauthorized access thereto. User additionally acknowledges and agrees that User is solely responsible for maintaining the security of all usernames, passwords, and electronic devices used to access the Solution.
AutoNDA by SimpleDocs

Related to No Sensitive Information; Security

  • Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Rule 144 Information The Company covenants that it will use its reasonable best efforts to timely file all reports and other documents required to be filed by it under the Securities Act and the Exchange Act and the rules and regulations promulgated by the SEC thereunder (or, if the Company is not required to file such reports, it will, upon the request of any Warrantholder, make publicly available such information as necessary to permit sales pursuant to Rule 144 under the Securities Act), and it will use reasonable best efforts to take such further action as any Warrantholder may reasonably request, in each case to the extent required from time to time to enable such holder to, if permitted by the terms of this Warrant and the Purchase Agreement, sell this Warrant without registration under the Securities Act within the limitation of the exemptions provided by (A) Rule 144 under the Securities Act, as such rule may be amended from time to time, or (B) any successor rule or regulation hereafter adopted by the SEC. Upon the written request of any Warrantholder, the Company will deliver to such Warrantholder a written statement that it has complied with such requirements.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • Negative Information Notice We may report information about your loan, share or deposit accounts to credit bureaus. Late payments, missed payments, or other defaults on your accounts may be reflected in your credit report.

  • Confidential Information Defined For the purposes of this ARR Agreement, “Confidential Information” means nonpublic proprietary information of a Party (the “Disclosing Party”) that is disclosed to another Party (each such Party, a “Receiving Party”), including but not limited to: (i) business or technical processes, formulae, source codes, object code, product designs, sales, cost and other unpublished financial information, customer information, product and business plans, projections, marketing data or strategies, trade secrets, intellectual property rights, know-how, expertise, methods and procedures for operation, information about employees, customer names, business or technical proposals, and any other information which is or should reasonably be understood to be confidential or proprietary to the Disclosing Party; and (ii) PII (as defined in Section 7.03 of this ARR Agreement). The foregoing definition of Confidential Information applies to: (i) all such information, whether tangible or intangible and regardless of the medium in which it is stored or presented; and (ii) all copies of such information, as well as all memoranda, notes, summaries, analyses, computer records, and other materials prepared by the Receiving Party or any of its employees, agents, advisors, directors, officers, and subcontractors (collectively “Representatives”) that contain or reflect the Confidential Information.

  • Administrative information Time limit for receipt of tenders or requests to participate

  • De-identified Information De-identified Information may be used by the Operator only for the purposes of development, product improvement, to demonstrate or market product effectiveness, or research as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Operator agrees not to attempt to re-identify De-identified Information and not to transfer De-identified Information to any party unless (a) that party agrees in writing not to attempt re- identification, and (b) prior written notice has been given to LEA who has provided prior written consent for such transfer. Operator shall not copy, reproduce or transmit any De-identified Information or other Data obtained under the Service Agreement except as necessary to fulfill the Service Agreement.

  • Confidential Information Definition Grantee acknowledges it and its employees or agents may, in the course of performing its responsibilities, be exposed to or acquire information that is: (i) confidential to Agency or Project participants or (ii) the disclosure of which is restricted under federal or state law, including without limitation: (a) personal information, as that term is used in ORS 646A.602(12), (b) social security numbers, and (c) information protected by the federal Family Educational Rights and Privacy Act under 20 USC § 1232g (items (i) and (ii) separately and collectively “Confidential Information”).

  • KYC Information (i) Upon the reasonable request of the Lender made at least 1 day prior to the Closing Date, the Borrower shall have provided to the Lender the documentation and other information so requested in connection with applicable “know your customer” and anti-money-laundering rules and regulations, including the PATRIOT Act, in each case at least five days prior to the Closing Date. (ii) [reserved].

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!