[REDACTED - SENSITIVE BUSINESS INFORMATION Sample Clauses

[REDACTED - SENSITIVE BUSINESS INFORMATION after the end of each Tax Year for which this fixed tax is paid, the DEPARTMENT shall furnish to the CONTRACTOR official receipts evidencing the payment of such tax. Expatriate employees of the CONTRACTOR, its contractors and its subcontractors working in Exploration Operations shall be exempt from all personal income taxes and similar taxes in PUNTLAND during Exploration Operations on all income or reimbursements paid by the CONTRACTOR, its contractors and subcontractors on all income from any sources outside or inside of PUNTLAND.
AutoNDA by SimpleDocs
[REDACTED - SENSITIVE BUSINESS INFORMATION. United States Dollars [REDACTED - SENSITIVE BUSINESS INFORMATION] within [REDACTED - SENSITIVE BUSINESS INFORMATION] after the first date when the total average daily production of Crude Oil produced and saved from the Agreement Area, and not used in Petroleum Operations, has been sustained at the rate of [REDACTED - SENSITIVE BUSINESS INFORMATION] Barrels per Day for a period of thirty (30) consecutive Days.
[REDACTED - SENSITIVE BUSINESS INFORMATION necessary funds for all materials, equipment, supplies, personnel administration and operations pursuant to the Work Program and Budget and [REDACTED - SENSITIVE BUSINESS INFORMATION] the aforesaid costs. The Operator, shall be responsible for the preparation and performance of the Work Program and Budget which shall be implemented in a workmanlike manner and in accordance with good Petroleum Industry practices. With the involvement of the Contracts and Procurement Subcommittee the Operator shall provide notice to the DEPARTMENT or its authorized representative for any service contract (not including individual labour contracts) award in excess of [REDACTED - SENSITIVE BUSINESS INFORMATION], where such award is to be made on the basis of a sole source or to be made to a bidder other than the lowest bidder. The DEPARTMENT or its authorized representative shall have [REDACTED - SENSITIVE BUSINESS INFORMATION] within which to communicate its written approval of such award, failing such communication, approval shall be deemed. Furthermore, with the involvement of the Contracts and Procurement Subcommittee as set forth in Annex “D”, the Operator shall provide notice to the DEPARTMENT or its authorized representative for any service contract (not including individual labour contracts) award, even if to the lowest bidder, with a value in excess of [REDACTED - AMOUNTS CONSTITUTE SENSITIVE BUSINESS INFORMATION]. The DEPARTMENT or its authorized representative shall have [REDACTED - SENSITIVE BUSINESS INFORMATION] within which to communicate its written approval of such award, failing such communication approval shall be deemed. In the event approval is denied as aforesaid, the Operating Committee shall meet in an attempt to resolve the issue. The CONTRACTOR shall entrust the management of Development and Production operations in the PUNTLAND to its technically competent General Manager and Deputy General Manager. The name of such Manager and Deputy General Manager shall, upon appointment, be forthwith notified to the DEPARTMENT, accompanied by a curriculum vitae of such General Manager and Deputy General Manager. The General Manager and, in his absence, the Deputy General Manager shall be entrusted by the CONTRACTOR with sufficient powers to carry out immediately all lawful written directions given to them by the DEPARTMENT or its Representative under the terms of this Agreement.

Related to [REDACTED - SENSITIVE BUSINESS INFORMATION

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.

  • Business Information C101 commercial activities (such as nature of business, goods or services, commercial contracts, etc.) C102 agreement or contract (such as trading, business, legal, or other contract agents, etc.) C103 business-related licenses (such as whether a specific license is obtained, market trading license, truck driving license, etc.)

  • Confidential Information Defined For the purposes of this ARR Agreement, “Confidential Information” means nonpublic proprietary information of a Party (the “Disclosing Party”) that is disclosed to another Party (each such Party, a “Receiving Party”), including but not limited to: (i) business or technical processes, formulae, source codes, object code, product designs, sales, cost and other unpublished financial information, customer information, product and business plans, projections, marketing data or strategies, trade secrets, intellectual property rights, know-how, expertise, methods and procedures for operation, information about employees, customer names, business or technical proposals, and any other information which is or should reasonably be understood to be confidential or proprietary to the Disclosing Party; and (ii) PII (as defined in Section 7.03 of this ARR Agreement). The foregoing definition of Confidential Information applies to: (i) all such information, whether tangible or intangible and regardless of the medium in which it is stored or presented; and (ii) all copies of such information, as well as all memoranda, notes, summaries, analyses, computer records, and other materials prepared by the Receiving Party or any of its employees, agents, advisors, directors, officers, and subcontractors (collectively “Representatives”) that contain or reflect the Confidential Information.

  • Confidential Business Information CARB may have based this penalty in part on confidential business information provided by Xxxx or confidential settlement communications.

  • Confidential Information Definition Grantee acknowledges it and its employees or agents may, in the course of performing its responsibilities, be exposed to or acquire information that is: (i) confidential to Agency or Project participants or (ii) the disclosure of which is restricted under federal or state law, including without limitation: (a) personal information, as that term is used in ORS 646A.602(12), (b) social security numbers, and (c) information protected by the federal Family Educational Rights and Privacy Act under 20 USC § 1232g (items (i) and (ii) separately and collectively “Confidential Information”).

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Excluded Confidential Information The obligations of the Receiving Party pursuant to the provisions of this Agreement shall not apply to any Confidential Information that: 8.1 is known to, or in the possession of the Receiving Party prior to disclosure thereof by the Disclosing Party; 8.2 is or becomes publicly known, otherwise than as a result of a breach of this Agreement by the Receiving Party; 8.3 is developed independently of the Disclosing Party by the Receiving Party in circumstances that do not amount to a breach of the provisions of this Agreement; 8.4 is disclosed by the Receiving Party to satisfy an order of a court of competent jurisdiction or to comply with the provisions of any law or regulation in force from time to time; provided that in these circumstances, the Receiving Party shall advise the Disclosing Party to enable the Disclosing Party to take whatever steps it deems necessary to protect its interests in this regard and provided further that the Receiving Party will disclose only that portion of the Confidential Information which it is legally required to disclose and the Receiving Party will use its reasonable endeavours to protect the confidentiality of such Confidential Information to the greatest extent possible in the circumstances; 8.5 is disclosed to a third party pursuant to the prior written authorisation and Ltd to the extent of such approval of the Disclosing Party; 8.6 is received from a third party in circumstances that do not result in a breach of the provisions of this Agreement.

  • Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Excluded Information For purposes of this Agreement, the term “confidential and proprietary information” shall not include (i) information already known or independently developed by the recipient without the use of any confidential and proprietary information, or (ii) information known to the public through no wrongful act of the recipient.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!