Protection of Owner Proprietary Data Sample Clauses

Protection of Owner Proprietary Data. (a) Any Proprietary Data of an Owner disclosed to Contractor shall be marked “Proprietary” or the like on each page in which the respective party claims a proprietary or confidential interest therein (or for electronic data, on the opening screen of such data). If Contractor receives information which it recognizes as being Proprietary Data, but which has not been marked as such, it shall promptly notify Owner and xxxx the information as Proprietary Data. (b) In the use of any Owner Proprietary Data by Contractor for the purpose of providing required information to, and/or securing Government Approvals from, any Government Authority, Owner and Contractor shall cooperate to minimize the amount of such information furnished consistent with the interests of Owner and the requirements of the Government Authority involved. (c) Contractor agrees that it shall not, during or after the term of this Agreement, disclose any Proprietary Data of Owner and its Affiliates, which is provided to Contractor during the performance of Work under this Agreement, including but not limited to, their costs, charges, rates, records, operating procedures, and methods of doing business, to any Person (other than Subcontractors as required for the performance of the Work), or to the general public for any reason or purpose whatsoever without the prior written consent of Owner, and that such Proprietary Data received by Contractor shall be used by it exclusively in connection with the performance of its responsibilities relating to the Work. However, nothing herein shall prevent Contractor from disclosing Proprietary Data of Owner or its Affiliates as required by Law or an order of a Government Authority; provided that Contractor shall, if Contractor has adequate advance notice, give Owner reasonable notice so as to allow Owner to seek a protective order or similar protection, and nothing herein shall prevent Contractor from disclosing to the appropriate Government Authority any noncompliance with or violation of laws, rules, regulations, or orders within the jurisdiction of such Government Authority. If, in the opinion of its legal counsel and in the absence of a protective order or waiver, Contractor is legally compelled to disclose Owner’s Proprietary Data, Contractor will disclose only the minimum amount of such information or data as, in the opinion of its legal counsel, is legally required. In addition, Contractor shall have the right to receive and use Proprietary Data of Owne...
AutoNDA by SimpleDocs
Protection of Owner Proprietary Data. (a) [**]
Protection of Owner Proprietary Data. (a) [**] (b) [**] (c) [**] “[**]” in this Exhibit 10.01 indicates material that has been omitted pursuant to a request for confidential treatment and filed separately with the Securities and Exchange Commission. Execution Version Confidential Trade Secret InformationSubject to Restricted Procedures [**]

Related to Protection of Owner Proprietary Data

  • Proprietary Data NASDAQ OMX grants to Subscriber a nonexclusive, non-transferable license during the term of the Agreement to receive and use the Information transmitted to it by Distributor and thereafter, to use such Information as permitted under the terms of this Agreement and/or the NASDAQ OMX Requirements. Subscriber acknowledges and agrees that NASDAQ OMX has proprietary rights to the Information that originates on or derives from markets regulated or operated by NASDAQ OMX, and compilation or other rights to Information gathered from other sources. Subscriber further acknowledges and agrees that NASDAQ OMX 's third-party information providers have exclusive proprietary rights to their respective Information. In the event of any misappropriation or misuse by Subscriber or anyone who accesses the Information through Subscriber, NASDAQ OMX or its third-party information providers shall have the right to obtain injunctive relief for its respective materials. Subscriber will attribute source as appropriate under all the circumstances.

  • Protection of Proprietary Information “Proprietary Information” means a disclosing party’s ( including DirectTrust, any Participant, or any Participant’s CA or RA) business operations, financial condition, customers, products, services, technical knowledge, information, materials, processes, ideas, and techniques (whether or not reduced to writing) (i) which are not generally known in the relevant industry; (ii) which afford possessors of the information a commercial advantage over others; (iii) which are considered trade secrets under Applicable Law; and/or (iv) which, if utilized or disclosed by a party receiving such information, would place the party disclosing such information at a competitive disadvantage. Except as necessary for a party to perform its obligations under this Agreement, as permitted under a written consent of a disclosing party, or as required under Applicable Law, a party will not use or disclose Proprietary Information received from DirectTrust, any Participant, or any Participant’s CA or RA. Each party’s Proprietary Information will remain the confidential information of that party except as otherwise expressly provided in this Agreement. Each of the parties will use at least the same degree of care to safeguard and to prevent disclosing to third parties the Proprietary Information of the other as it employs to avoid unauthorized disclosure or publication of its own information of a similar nature, and in any event, no less than reasonable care. Each party may disclose relevant aspects of the other party’s Proprietary Information to its employees, affiliates, subcontractors and agents to the extent such disclosure is reasonably necessary for the performance of its obligations, or the enforcement of its rights, under this Agreement; provided, however, that such party will cause such employees, affiliates, subcontractors or agents to comply with these confidentiality provisions. Neither party will (i) make any use or copies of the Proprietary Information of the other except as contemplated by this Agreement; or (ii) acquire any right in or assert any lien against the Proprietary Information of the other; or (iii) sell, assign, lease or otherwise commercially exploit the Proprietary Information of the other party. Neither party may withhold the Proprietary Information of the other party or refuse for any reason (including due to the other party’s actual or alleged breach of this Agreement) to promptly return to the other party its Proprietary Information (including copies thereof) if requested to do so. Upon expiration or termination of this Agreement and completion of a party’s obligations under this Agreement, each Party will, at the request of the other party, (and except as otherwise provided in this Agreement) return or destroy, as the other party may direct, all documentation in any medium that contains or refers to the other party’s Proprietary Information, and retain no copies. This Section III.a will not apply to any particular information that either party can demonstrate

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.

  • CONTRACT INFORMATION 1. The State of Arkansas may not contract with another party: a. Upon default, to pay all sums to become due under a contract. b. To pay damages, legal expenses or other costs and expenses of any party. c. To conduct litigation in a place other than Pulaski County, Arkansas d. To agree to any provision of a contract; which violates the laws or constitution of the State of Arkansas. 2. A party wishing to contract with the State of Arkansas should: a. Remove any language from its contract which grants to it any remedies other than: i. The right to possession. ii. The right to accrued payments. iii. The right to expenses of de-installation. iv. The right to expenses of repair to return the equipment to normal working order, normal wear and tear excluded. v. The right to recover only amounts due at the time of repossession and any unamortized nonrecurring cost as allowed by Arkansas Law. b. Include in its contract that the laws of the State of Arkansas govern the contract. c. Acknowledge that contracts become effective when awarded by the State Procurement Official.

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Confidential Information Protections 4.1 At all times during and after the Employee’s employment, the Employee will hold in confidence and will not disclose, use, lecture upon, or publish any of Company’s Confidential Information (defined below), except as may be required in connection with the Employee’s work for Company, or as expressly authorized by the Board. The Employee will obtain the written approval of the Board before publishing or submitting for publication any material (written, oral, or otherwise) that relates to the Employee’s work at Company and/or incorporates any Confidential Information. The Employee hereby assigns to Company any rights the Employee may have or acquire in any and all Confidential Information and recognize that all Confidential Information shall be the sole and exclusive property of Company and its assigns.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!