Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.
Integrity and Confidentiality Escrow Agent will be required to (i) hold and maintain the Deposits in a secure, locked, and environmentally safe facility, which is accessible only to authorized representatives of Escrow Agent, (ii) protect the integrity and confidentiality of the Deposits using commercially reasonable measures and (iii) keep and safeguard each Deposit for one (1) year. ICANN and Registry Operator will be provided the right to inspect Escrow Agent’s applicable records upon reasonable prior notice and during normal business hours. Registry Operator and ICANN will be provided with the right to designate a third-‐party auditor to audit Escrow Agent’s compliance with the technical specifications and maintenance requirements of this Specification 2 from time to time. If Escrow Agent receives a subpoena or any other order from a court or other judicial tribunal pertaining to the disclosure or release of the Deposits, Escrow Agent will promptly notify the Registry Operator and ICANN unless prohibited by law. After notifying the Registry Operator and ICANN, Escrow Agent shall allow sufficient time for Registry Operator or ICANN to challenge any such order, which shall be the responsibility of Registry Operator or ICANN; provided, however, that Escrow Agent does not waive its rights to present its position with respect to any such order. Escrow Agent will cooperate with the Registry Operator or ICANN to support efforts to quash or limit any subpoena, at such party’s expense. Any party requesting additional assistance shall pay Escrow Agent’s standard charges or as quoted upon submission of a detailed request.
Publicity and Confidentiality 12.1 Publicity. Partner will keep confidential and will not disclose, market or advertise to third parties the terms of this Agreement (including the fees paid hereunder). Partner or Red Hat may reference its relationship with the other, in the normal course of business including during earnings calls, discussions with analysts, meetings with the press, customer briefings, general marketing activities and in regulatory filings. Neither Party will issue formal press releases or other similar activities referencing the other Party without the written consent of the other Party.
Confidentiality Agreements The parties hereto agree that this Agreement supersedes any provision of the Confidentiality Agreements that could be interpreted to preclude the exercise of any rights or the fulfillment of any obligations under this Agreement, and that none of the provisions included in the Confidentiality Agreements will act to preclude Holder from exercising the Option or exercising any other rights under this Agreement or act to preclude Issuer from fulfilling any of its obligations under this Agreement.
INFORMATION AND CONFIDENTIALITY 20.1 Each party recognises that under this Agreement it may receive Confidential Information belonging to the other.
Data Protection and Confidentiality 3.1. We obtain, use, process and disclose personal data about you and data subjects (as defined in the DPA) in order that we may provide the Services and for other related purposes including updating and enhancing client records, analysis for management purposes and statutory returns, crime prevention and legal and regulatory compliance.
Non-Disclosure and Confidentiality 9.1. All Personal Data received by the Processor from the Controller and/or compiled by the Processor within the framework of this Data Processing Agreement is subject to a duty of confidentiality vis-à-vis third parties.
Intellectual Property and Confidentiality 9.1 All intellectual property rights in and relating to the goods we supply to you, their manufacture, development and creation (including improvements to them) will be or remain ours and you will, at our request, do any act and execute any documents necessary to confirm such rights.
Confidentiality and Use In accordance with Article 3(7) of the IGA, all information exchanged pursuant to the IGA is subject to the confidentiality and other protections provided for in the Convention (hereinafter “Confidentiality Protections”), including the provisions limiting the use of the information exchanged. The Competent Authorities intend to maintain appropriate safeguards and infrastructure as described in Article 3(8) of the IGA (“Data Safeguards”).
Privacy and Confidentiality A. Contractors may use or disclose Medi-Cal PII only to perform functions, activities or services directly related to the administration of the Medi-Cal program in accordance with Welfare and Institutions Code section 14100.2 and 42 Code of Federal Regulations section 431.300 et.seq, or as required by law. Disclosures which are required by law, such as a court order, or which are made with the explicit written authorization of the Medi-Cal client, are allowable. Any other use or disclosure of Medi-Cal PII requires the express approval in writing of DHCS. Contractor shall not duplicate, disseminate or disclose Medi-Cal PII except as allowed in the Agreement.