Other Agreements that Relate to the Protection of Confidential Information Sample Clauses

Other Agreements that Relate to the Protection of Confidential Information. Client agrees to confine access to such Confidential Information to Client Employees having a need to know the Confidential Information for the reasonable purposes set forth above and who have been advised by Client of the confidential and proprietary nature of the Confidential Information, and to ensure that each such Client Employee agrees in writing to be bound by the confidentiality provisions of this Agreement. Client acknowledges and agrees that its performance of any of the terms or provisions of this Agreement and the fulfilling of any of its duties hereunder do not and will not breach any other agreement entered into by Client prior to Client entering into this Agreement, violate any trade secrets of any third party, or violate any law. Furthermore, during the Term of this Agreement, Client agrees to not enter into any agreement, whether written or oral, at any time, which would be or is in conflict with the terms of this Agreement.
AutoNDA by SimpleDocs

Related to Other Agreements that Relate to the Protection of Confidential Information

  • Protection of Confidential Information The Servicer shall keep confidential and shall not divulge to any party, without the Seller’s prior written consent, any nonpublic information pertaining to the Mortgage Loans or any borrower thereunder, except to the extent that it is appropriate for the Servicer to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies or it is otherwise in accordance with Accepted Servicing Practices.

  • Treatment of Confidential Information (A) Each party agrees that at all times during and after the terms of this Agreement, it shall use, handle, collect, maintain, and safeguard Confidential Information in accordance with (1) the confidentiality and non-disclosure requirements of this Agreement; (2) the GLB Act, as applicable and as it may be amended; and (3) such other Applicable Law, whether in effect now or in the future. (B) Without limiting the foregoing, the Receiving Party shall apply to any Confidential Information at least the same degree of reasonable care used for its own confidential and proprietary information to avoid unauthorized disclosure or use of Confidential Information under this Agreement. (C) Each party further agrees that: (1) The Receiving Party will hold all Confidential Information it obtains in strictest confidence and will use and permit use of Confidential Information solely for the purposes of this Agreement or as otherwise provided for in this Agreement, and consistent therewith, may disclose or provide access to its responsible employees or agents who have a need to know and are under adequate confidentiality agreements or arrangements and make copies of Confidential Information to the extent reasonably necessary to carry out its obligations under this Agreement; (2) Notwithstanding the foregoing, the Receiving Party may release Confidential Information as permitted or required by law or approved in writing by the Disclosing party, which approval shall not be unreasonably withheld and may not be withheld where the Receiving Party may be exposed to civil or criminal liability or proceedings for failure to release such information; (3) Additionally, Ultimus may provide Confidential Information typically supplied in the investment company industry to companies that track or report price, performance or other information regarding investment companies; and (4) The Receiving Party will immediately notify the Disclosing Party of any unauthorized disclosure or use, and will cooperate with the Disclosing Party to protect all proprietary rights in any Confidential Information.

  • Destruction of Confidential Information Upon the written request of the disclosing Party, the receiving Party shall cease using and arrange for the destruction of all copies of any Confidential Information then in the receiving Party’s possession or under such Party’s control. The receiving Party agrees to dispose of the Confidential Information in such a manner that the information cannot be read or reconstructed after destruction. Upon the written request of the disclosing Party, the receiving Party shall certify in writing that it has complied with the obligations set forth in this paragraph.

  • Disposition of Confidential Information Upon termination of Agreement or request of City, Contractor shall within forty-eight (48) hours return all Confidential Information which includes all original media. Once Contractor has received written confirmation from City that Confidential Information has been successfully transferred to City, Contractor shall within ten (10) business days purge all Confidential Information from its servers, any hosted environment Contractor has used in performance of this Agreement, work stations that were used to process the data or for production of the data, and any other work files stored by Contractor in whatever medium. Contractor shall provide City with written certification that such purge occurred within five (5) business days of the purge.

  • Maintenance of Confidential Information The Contractor acknowledges that in the course of its appointment hereunder the Contractor will, either directly or indirectly, have access to and be entrusted with information (whether oral, written or by inspection) relating to the Company or its respective affiliates, associates or customers (the “Confidential Information”). For the purposes of this Agreement, “Confidential Information” includes, without limitation, any and all Developments (as defined herein), trade secrets, inventions, innovations, techniques, processes, formulas, drawings, designs, products, systems, creations, improvements, documentation, data, specifications, technical reports, customer lists, supplier lists, distributor lists, distribution channels and methods, retailer lists, reseller lists, employee information, financial information, sales or marketing plans, competitive analysis reports and any other thing or information whatsoever, whether copyrightable or uncopyrightable or patentable or unpatentable. The Contractor acknowledges that the Confidential Information constitutes a proprietary right, which the Company is entitled to protect. Accordingly the Contractor covenants and agrees that during the Term and thereafter until such time as all the Confidential Information becomes publicly known and made generally available through no action or inaction of the Contractor, the Contractor will keep in strict confidence the Confidential Information and shall not, without prior written consent of the Company in each instance, disclose, use or otherwise disseminate the Confidential Information, directly or indirectly, to any third party.

  • Treatment of Certain Confidential Information 70 18.1. Sharing of Information with Section 20 Subsidiary. .................................70 18.2. Confidentiality. ...................................................................70 18.3. Prior Notification. ................................................................71 18.4. Other. .............................................................................71 19.

  • Return of material containing or pertaining to the Confidential Information 7.1 The Disclosing Party may, at any time, and in its sole discretion request the Receiving Party to return any material and/or data in whatever form containing, pertaining to or relating to Confidential Information disclosed pursuant to the terms of this Agreement and may, in addition request the Receiving Party to furnish a written statement to the effect that, upon such return, the Receiving Party has not retained in its possession, or under its control, either directly or indirectly, any such material and/or data. 7.2 If it is not practically able to do so, the Receiving Party shall destroy or ensure the destruction of all material and/or data in whatever form relating to the Confidential Information disclosed pursuant to the terms of this Agreement and delete, remove or erase or use best efforts to ensure the deletion, erasure or removal from any computer or database or document retrieval system under its or the Representatives' possession or control, all Confidential Information and all documents or files containing or reflecting any Confidential Information, in a manner that makes the deleted, removed or erased data permanently irrecoverable.The Receiving Party shall furnish the Disclosing Party with a written statement signed by one of its directors or duly authorized senior officers to the effect that all such material has been destroyed. 7.3 The Receiving Party shall comply with any request by the Disclosing Party in terms of this clause, within 7 (seven) business days of receipt of any such request.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Title to Confidential Information a) Transnet will retain all right, title and interest in and to its Confidential Information and Background Intellectual Property and the Supplier/Service Provider acknowledges that it has no claim of any nature in and to the Confidential Information and Background Intellectual Property that is proprietary to Transnet. For the avoidance of doubt all the Supplier/Service Provider’s Background Intellectual Property shall remain vested in the Supplier/Service Provider. b) Transnet shall grant to the Supplier/Service Provider an irrevocable, royalty free, non- exclusive licence to use Transnet’s Background Intellectual Property only for the Permitted Purpose. This licence shall not permit the Supplier/Service Provider to sub-license to other parties. c) The Supplier/Service Provider shall grant to Transnet an irrevocable, royalty free, non- exclusive licence to use the Supplier/Service Provider’s Background Intellectual Property for the Permitted Purpose. This licence shall not permit Transnet to sub-license to other parties. d) The Supplier/Service Provider shall grant Transnet access to the Supplier/Service Provider’s Background Intellectual Property on terms which shall be bona fide negotiated between the Parties for the purpose of commercially exploiting the Foreground Intellectual Property, to the extent that such access is required. e) The above shall not pertain to any software licenses procured by the Supplier/Service Provider from third parties and used in the supply of the Goods/Services.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!