Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:
Subprocessors Provider shall enter into written agreements with all Subprocessors performing functions for the Provider in order for the Provider to provide the Services pursuant to the Service Agreement, whereby the Subprocessors agree to protect Student Data in a manner no less stringent than the terms of this DPA.
Confidential Information “Confidential Information” shall mean (i) Highly Confidential Information (as defined below), (ii) any other technology, software development tools, methodologies, processes, algorithms, test data sets and test data cases and related documentation that CI Plus LLP provides to Licensee hereunder in order to facilitate Licensee’s exercise of its rights and performance of its obligations hereunder, and (iii) any other information of CI Plus LLP and information of Licensee, each of which is clearly marked as “Confidential” or a similar expression when disclosed in written or electronic form, or indicated as “Confidential” when disclosed orally and confirmed in writing within thirty (30) calendar days after such disclosure. “Confidential Information” shall not include information which: (a) was in the possession of, or was known by, the receiving party ("Recipient") prior to its receipt from the disclosing party (“Discloser), without an obligation owed to Discloser, or its licensors, to maintain its confidentiality; (b) is or becomes generally known to the public without violation of this Agreement by the “Recipient”; (c) is obtained by Recipient from a third party, without an obligation owed to such third party to keep such information confidential; or (d) is independently developed by Recipient without use of any Confidential Information of the other party. Recipient agrees that it shall use reasonable care to keep the Confidential Information of the other party strictly confidential and not disclose it to any other person except to its Affiliates and its and their respective employees, contractors, consultants, agents, customers and representatives (other than Members) who have a “need to know” for the purposes of this Agreement and are obligated by Licensee to be bound by the same confidentiality obligation which Recipient is bound by under this Exhibit H, provided however that Recipient may disclose Highly Confidential Information only in accordance with Section 2 of this Exhibit H. Recipient shall be responsible for any breach of such confidentiality obligation by such parties, including former employees, Affiliates, contractors, consultants, agents, customers (other than Members) and representatives. Recipient shall protect the Confidential Information of the other party with the same degree of care as it normally uses in the protection of its own similar confidential and proprietary information, but in no case with any less than reasonable care. Notwithstanding anything in this Exhibit H to the contrary, Confidential Information may be disclosed by Recipient pursuant to the order or requirements of a court or governmental administrative agency or other governmental body of competent jurisdiction, provided that (x) Discloser has been notified of such a disclosure request immediately after Recipient knows such order or requirements in order to afford Discloser reasonable opportunity to obtain a protective order or otherwise prevent or limit the scope of such disclosure to the extent permitted by law and (y) Recipient cooperates in good faith with such efforts by Discloser. The obligations under this Exhibit H shall terminate three years after the date of the last shipment of product using the Licensed Technology by Licensee or any other licensee of the Licensed Technology; provided that Sections 2.0(b), 2.0(c), and 3.0 in this Exhibit H shall cease to apply when the Recipient has returned all tangible embodiments of Licensed Technology in its possession to the Discloser.
Information The Buyer and its advisors, if any, have been, and for so long as the Note remain outstanding will continue to be, furnished with all materials relating to the business, finances and operations of the Company and materials relating to the offer and sale of the Securities which have been requested by the Buyer or its advisors. The Buyer and its advisors, if any, have been, and for so long as the Note remain outstanding will continue to be, afforded the opportunity to ask questions of the Company. Notwithstanding the foregoing, the Company has not disclosed to the Buyer any material nonpublic information and will not disclose such information unless such information is disclosed to the public prior to or promptly following such disclosure to the Buyer. Neither such inquiries nor any other due diligence investigation conducted by Buyer or any of its advisors or representatives shall modify, amend or affect Buyer’s right to rely on the Company’s representations and warranties contained in Section 3 below. The Buyer understands that its investment in the Securities involves a significant degree of risk. The Buyer is not aware of any facts that may constitute a breach of any of the Company's representations and warranties made herein.
Third Party Rights A person who is not a party to this Agreement has no right under the Contracts (Rights of Third Parties) Xxx 0000 to enforce or to enjoy the benefit of any term of this Agreement.
Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.
Privacy Compliance The Provider shall comply with all applicable federal, state, and local laws, rules, and regulations pertaining to Student Data privacy and security, all as may be amended from time to time.
Subcontractors The Contractor will not subcontract any work under the Contract without prior written consent of the Department. The Contractor is fully responsible for satisfactory completion of all its subcontracted work. The Department supports diversity in its procurements and contracts, and requests that the Contractor offer subcontracting opportunities to certified woman-, veteran-, and minority-owned small businesses. The Contractor may contact the OSD at xxxxxxx@xxx.xxxxxxxxx.xxx for information on certified small business enterprises available for subcontracting opportunities.
Subprocessor For the purposes of this DPA, the term “Subprocessor” (sometimes referred to as the “Subcontractor”) means a party other than LEA or Provider, who Provider uses for data collection, analytics, storage, or other service to operate and/or improve its service, and who has access to Student Data.
De-Identified Data Provider agrees not to attempt to re-identify de-identified Student Data. De-Identified Data may be used by the Provider for those purposes allowed under FERPA and the following purposes: