Access; Information (a) Each of the Company and the Acquiror agrees that upon reasonable notice and subject to applicable laws relating to the exchange of information, it shall afford the other party and the other party's officers, employees, counsel, accountants and other authorized representatives, such access during normal business hours throughout the period prior to the Effective Time to the books, records (including, without limitation, tax returns and work papers of independent auditors), properties, personnel and to such other information as any party may reasonably request and, during such period, it shall furnish promptly to such other party (i) a copy of each material report, schedule and other document filed by it pursuant to the requirements of federal or state securities or banking laws, and (ii) all other information concerning the business, properties and personnel of it as the other may reasonably request. (b) Each of the Company and the Acquiror agrees that it will not, and will cause its representatives not to, use any information obtained pursuant to this Section 5.05 for any purpose unrelated to the consummation of the transactions contemplated by this Agreement. Subject to the requirements of law, each party will keep confidential, and will cause its representatives to keep confidential, all information and documents obtained pursuant to this Section 6.05 unless such information (i) was already known to such party, (ii) becomes available to such party from other sources not known by such party to be bound by a confidentiality obligation, (iii) is disclosed with the prior written approval of the party to which such information pertains or (iv) is or becomes readily ascertainable from published information or trade sources. In the event that this Agreement is terminated or the transactions contemplated by this Agreement shall otherwise fail to be consummated, each party shall promptly cause all copies of documents or extracts thereof containing information and data as to another party hereto to be returned to the party which furnished the same. No investigation by either party of the business and affairs of the other shall affect or be deemed to modify or waive any representation, warranty, covenant or agreement in this Agreement, or the conditions to either party's obligation to consummate the transactions contemplated by this Agreement.
Business Information C101 commercial activities (such as nature of business, goods or services, commercial contracts, etc.) C102 agreement or contract (such as trading, business, legal, or other contract agents, etc.) C103 business-related licenses (such as whether a specific license is obtained, market trading license, truck driving license, etc.)
Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.
Confidential Business Information CARB may have based this penalty in part on confidential business information provided by Xxxx or confidential settlement communications.
Access, Information and Confidentiality (a) From the date of this Agreement, until the date when the Investor no longer beneficially owns at least fifty percent (50%) or more of all of the Purchased Shares (a “Qualifying Ownership Interest”), subject to applicable law or regulatory requirements, the Company will use reasonable efforts to afford the Investor and its representatives (including employees of the Investor, and counsel, accountants, investment advisors and other professionals retained by the Investor) such access during normal business hours to its and the Company Subsidiaries’ books, records, properties and personnel and to such other information as the Investor may reasonably request. (b) Each party to this Agreement will hold, and will cause its respective subsidiaries and their directors, officers, employees, agents, consultants, and advisors to hold, in strict confidence, unless disclosure to a Governmental Entity (and, solely with respect to the Company, the Bankruptcy Court) is necessary or appropriate in connection with any necessary regulatory approval or unless compelled to disclose by judicial or administrative process or by other requirement of law or the applicable requirements of any Governmental Entity (and, solely with respect to the Company, the Bankruptcy Court), all nonpublic records, books, contracts, instruments, computer data and other data and information (collectively, “Information”) concerning the other party hereto furnished to it by such other party or its representatives pursuant to this Agreement (except to the extent that such Information can be shown to have been (1) previously known by such party on a nonconfidential basis, (2) in the public domain through no fault of such party, or (3) later lawfully acquired from other sources by the party to which it was furnished), and neither party hereto shall release or disclose such Information to any other person, except its auditors, attorneys, financial advisors, other consultants, and advisors and, to the extent permitted above, to bank regulatory authorities. Prior to any disclosure of Information permitted by the prior sentence, the party proposing to disclose such Information shall, to the extent legally permissible, provide notice to the other party so that the other party may, at its own expense, seek an protective order or other appropriate remedy and/or waive compliance with the provisions of this Section 3.2(b). If such protective order or other remedy is denied, the party proposing to disclose such Information shall (x) furnish only that portion of the Information that, based upon the advice of counsel, is necessary to be disclosed in connection with such necessary regulatory approval or is compelled to be disclosed by such judicial or administrative process or by such other requirement of law or such applicable requirements and (y) use its reasonable best efforts to obtain assurances that confidential treatment will be accorded to the Information.
Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.
Confidential Information Protections 4.1 At all times during and after the Employee’s employment, the Employee will hold in confidence and will not disclose, use, lecture upon, or publish any of Company’s Confidential Information (defined below), except as may be required in connection with the Employee’s work for Company, or as expressly authorized by the Board. The Employee will obtain the written approval of the Board before publishing or submitting for publication any material (written, oral, or otherwise) that relates to the Employee’s work at Company and/or incorporates any Confidential Information. The Employee hereby assigns to Company any rights the Employee may have or acquire in any and all Confidential Information and recognize that all Confidential Information shall be the sole and exclusive property of Company and its assigns.
Return of Proprietary Information 20.6.1 All Proprietary Information, other than Derivative Information, shall remain the property of the Disclosing Party, and all documents or other tangible media delivered to the Receiving Party that embody such Proprietary Information shall be, at the option of the Disclosing Party, either promptly returned to Disclosing Party or destroyed, except as otherwise may be required from time to time by Applicable Law (in which case the use and disclosure of such Proprietary Information will continue to be subject to this Agreement), upon the earlier of (i) the date on which the Receiving Party’s need for it has expired and (ii) the expiration or termination of this Agreement. 20.6.2 At the request of the Disclosing Party, any Derivative Information shall be, at the option of the Receiving Party, either promptly returned to the Disclosing Party or destroyed, except as otherwise may be required from time to time by Applicable Law (in which case the use and disclosure of such Derivative Information will continue to be subject to this Agreement), upon the earlier of (i) the date on which the Receiving Party’s need for it has expired and (ii) the expiration or termination of this Agreement. 20.6.3 The Receiving Party may at any time either return the Proprietary Information to the Disclosing Party or destroy such Proprietary Information. If the Receiving Party elects to destroy Proprietary Information, all copies of such information shall be destroyed and upon the written request of the Disclosing Party, the Receiving Party shall provide to the Disclosing Party written certification of such destruction. The destruction or return of Proprietary information shall not relieve any Receiving Party of its obligation to continue to treat such Proprietary Information in the manner required by this Agreement.
Return of Confidential Information Subject to Section 4.2(e) of this Agreement, upon the request of a party, the other party shall return all Confidential Information to the other; provided, however, (i) each party shall be permitted to retain copies of the other party’s Confidential Information solely for archival, audit, disaster recovery, legal and/or regulatory purposes, and (ii) neither party will be required to search archived electronic back-up files of its computer systems for the other party’s Confidential Information in order to purge the other party’s Confidential Information from its archived files; provided further, that any Confidential Information so retained will (x) remain subject to the obligations and restrictions contained in this Agreement, (y) will be maintained in accordance with the retaining party’s document retention policies and procedures, and (z) the retaining party will not use the retained Confidential Information for any other purpose.
Maintenance of Confidential Information The Contractor acknowledges that in the course of its appointment hereunder the Contractor will, either directly or indirectly, have access to and be entrusted with information (whether oral, written or by inspection) relating to the Company or its respective affiliates, associates or customers (the “Confidential Information”). For the purposes of this Agreement, “Confidential Information” includes, without limitation, any and all Developments (as defined herein), trade secrets, inventions, innovations, techniques, processes, formulas, drawings, designs, products, systems, creations, improvements, documentation, data, specifications, technical reports, customer lists, supplier lists, distributor lists, distribution channels and methods, retailer lists, reseller lists, employee information, financial information, sales or marketing plans, competitive analysis reports and any other thing or information whatsoever, whether copyrightable or uncopyrightable or patentable or unpatentable. The Contractor acknowledges that the Confidential Information constitutes a proprietary right, which the Company is entitled to protect. Accordingly the Contractor covenants and agrees that during the Term and thereafter until such time as all the Confidential Information becomes publicly known and made generally available through no action or inaction of the Contractor, the Contractor will keep in strict confidence the Confidential Information and shall not, without prior written consent of the Company in each instance, disclose, use or otherwise disseminate the Confidential Information, directly or indirectly, to any third party.