Nondisclosure; Use; Security Precautions Sample Clauses

Nondisclosure; Use; Security Precautions. With respect to Protected Purchasing Entity Information, Provider shall: (i) not disclose, distribute, share, or otherwise transfer it, directly or indirectly, to any third party except as necessary to fulfill or perform Provider’s obligations under a Contract ; (ii) use Protected P u r c ha s i ng E nt i t y Information only in compliance with: (1) a Contract; and (2) all applicable laws (including without limitation applicable policies and laws related to spamming, privacy, and consumer protection); (iii) use Protected Purchasing Entity Information only as required to perform a Contract; (iv) hold and maintain it in trust and confidence for the Purchasing Entity’s benefit;
AutoNDA by SimpleDocs

Related to Nondisclosure; Use; Security Precautions

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Confidentiality Privacy FTIS shall keep the Confidential Information (as defined in Section 16(a) below) of the Investment Company in confidence and will not use or disclose or allow access to or use of such Confidential Information except (A) as appropriate in connection with activities contemplated by this Agreement; (B) as required pursuant to a court order, subpoena, governmental or regulatory or self-regulatory authority or agency, law, regulation, or binding discovery request in pending litigation (provided the receiving party will provide the other party written notice of such requirement, to the extent such notice is permitted, and subject to proper jurisdiction, if applicable); (C) as requested by a governmental, regulatory or self-regulatory authority or agency in connection with an inquiry, examination, audit or other review; or (D) the information or data is relevant and material to any claim or cause of action between the parties or the defense of any claim or cause of action asserted against FTIS.

  • Safety Precautions Resident acknowledges that neither Owner nor any of its agents, employees or representatives has made any representations or warranties, either written or oral, concerning the safety of the Property, the bedroom space or any apartment, or the effectiveness or operability of any security devices or safety, health or security measures at the Property, the bedroom space or any apartment. Resident acknowledges that Owner neither warrants nor guarantees the safety or security of residents or their Guests against any criminal or wrongful acts of third parties. Resident and his or her Guests are responsible for protecting their own respective person and property and hereby release Owner and its agents, employees and representatives for any and all damage to person and property. Owner’s safety measures are neither a warranty of safety nor a guaranty against crime or of a reduced risk of crime. Resident acknowledges that security devices or measures may be changed or removed by Owner without notice or compensation, and/or may fail or be thwarted by criminals or by electrical or mechanical malfunctions. Therefore, Resident acknowledges that he or she should not rely on such devices or measures and should take steps to protect himself or herself and his or her existing property notwithstanding these devices. Resident agrees to immediately notify Owner’s representative of any malfunctions involving locks and life-safety building components. Should Resident become seriously injured or imperiled at the Property, Resident authorizes Owner and its agents to call 911 Emergency at Resident’s expense, without legal obligation to do so.

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • SAFETY PRECAUTIONS AND PROGRAMS The Contractor shall be responsible for initiating, maintaining and supervising all safety precautions and programs in connection with the Work.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

Time is Money Join Law Insider Premium to draft better contracts faster.