Secrecy and Information Security Sample Clauses

Secrecy and Information Security. 5.1 The Contractor covenants that it and anyone acting on its behalf have an appropriate security clearance to work in the Firing Zones and according to the Contract and that they will maintain the secrecy of all information, details, data, documents and the like that relate to the Company and/or the MOD, that they and/or anyone acting on its behalf shall obtain, directly and/or indirectly, during the course of the fulfilment of their function in connection with the performance of its obligations pursuant to this Contract, including in the Firing Zones, as well as in connection with the undertakings of the Company to the MOD in connection with activities in the Firing Zones as shall be brought to the attention of the Contractor by the Company from time to time. The provisions of this subsection shall remain in effect also after the conclusion of the performance of the works and the Contract.
AutoNDA by SimpleDocs
Secrecy and Information Security. BIT assumes responsibility for protection of clients’ information and equipment. Secrecy and information security have been captured in BIT’s systems and procedures; clients’ information is attended to as strictly confidential. This is exampled by all BIT employees having signed a declaration of secrecy. BIT assumes a duty of care ensuing from the nature of the services and products tendered. In order to structurally pursue such due diligence practices, information security has been implemented in the company as a matter of process, and this has been ratified by ISO/NEN 27001 certification. This international standard specifies demands for implementation of security measures matching BIT’s requirements and obligations. Clients’ information is duly protected in this manner. BIT also takes into account any wishes expressed by the individual client with regard to secrecy and security. If desirable, a declaration of secrecy can be signed, or a specific security plan may be designed for any particular project or assignment. Furthermore it is possible to implement a specific authorization scheme for any changes to the services of a specific customer.

Related to Secrecy and Information Security

  • Access and Information The Company, on the one hand, and Parent and Acquisition Corp., on the other hand, shall each afford to the other and to the other’s accountants, counsel and other representatives full access during normal business hours throughout the period prior to the Effective Time to all of its properties, books, contracts, commitments and records (including but not limited to tax returns) and during such period, each shall furnish promptly to the other all information concerning its business, properties and personnel as such other party may reasonably request, provided that no investigation pursuant to this Section 6.01 shall affect any representations or warranties made herein. Each party shall hold, and shall cause its employees and agents to hold, in confidence all such information (other than such information that (a) is already in such party’s possession or (b) becomes generally available to the public other than as a result of a disclosure by such party or its directors, officers, managers, employees, agents or advisors or (c) becomes available to such party on a non-confidential basis from a source other than a party hereto or its advisors, provided that such source is not known by such party to be bound by a confidentiality agreement with or other obligation of secrecy to a party hereto or another party until such time as such information is otherwise publicly available; provided, however, that (i) any such information may be disclosed to such party’s directors, officers, employees and representatives of such party’s advisors who need to know such information for the purpose of evaluating the transactions contemplated hereby (it being understood that such directors, officers, employees and representatives shall be informed by such party of the confidential nature of such information), (ii) any disclosure of such information may be made as to which the party hereto furnishing such information has consented in writing and (iii) any such information may be disclosed pursuant to a judicial, administrative or governmental order or request; provided, further, that the requested party will promptly so notify the other party so that the other party may seek a protective order or appropriate remedy and/or waive compliance with this Agreement and if such protective order or other remedy is not obtained or the other party waives compliance with this provision, the requested party will furnish only that portion of such information that is legally required and will exercise its best efforts to obtain a protective order or other reliable assurance that confidential treatment will be accorded the information furnished. If this Agreement is terminated, each party will deliver to the other all documents and other materials (including copies) obtained by such party or on its behalf from the other party as a result of this Agreement or in connection herewith, whether so obtained before or after the execution hereof.

  • CONFIDENTIALITY of RECORDS and INFORMATION 20.1. XXXXXXXXXX agrees to maintain confidentiality of information and records as required by applicable Federal, State and local laws, regulations and rules. CONTRACTOR shall not use or disclose confidential information other than as permitted or required by this Agreement and will notify COUNTY of any discovered instances of breaches of confidentiality. CONTRACTOR shall ensure that any subcontractors’ agents receiving confidential information related to this Agreement agree to the same restrictions and conditions that apply to CONTRACTOR with respect to such information. XXXXXXXXXX agrees to hold COUNTY harmless from any breach of confidentiality, as set forth in the hold harmless provisions contained herein.

  • Data and Information 12.1 The parties shall comply with all relevant UK and EU data protection legislation in delivering their obligations under the Agreement.

  • RECORDS AND INFORMATION 14.1 A Sector Association and an Operator must retain records of all information required to be supplied to the Administrator under these Rules.

  • CONFIDENTIAL NATURE OF DOCUMENTS AND INFORMATION Information and data that is considered proprietary by either Party or that is delivered or disclosed by one Party (“Discloser”) to the other Party (“Recipient”) during the course of performance of the Contract, and that is designated as confidential (“Information”), shall be held in confidence by that Party and shall be handled as follows:

  • Reports and Information 17.1 At such times and in such forms as the CITY may require, there shall be furnished to the CITY such statements, records, reports, data and information as the CITY may request pertaining to matters covered by this Agreement.

  • De-identified Information De-identified Information may be used by the Operator only for the purposes of development, product improvement, to demonstrate or market product effectiveness, or research as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Operator agrees not to attempt to re-identify De-identified Information and not to transfer De-identified Information to any party unless (a) that party agrees in writing not to attempt re- identification, and (b) prior written notice has been given to LEA who has provided prior written consent for such transfer. Operator shall not copy, reproduce or transmit any De-identified Information or other Data obtained under the Service Agreement except as necessary to fulfill the Service Agreement.

  • Correspondence and Information 6.1 Except where otherwise specified in this Agreement, correspondence between the Association and the University arising out of this Agreement or incidental thereto shall pass between the President and the President of the Association, or their designates.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

Time is Money Join Law Insider Premium to draft better contracts faster.