Security, Confidentiality, and Privacy Sample Clauses

Security, Confidentiality, and Privacy. In meeting the scope and objectives under this BPA and BPA Calls issued against it, the Contractor shall protect the confidentiality of information by adhering to safeguard principles, including: a. Emphasizing to its officers, employees, contractors, and agents the importance of protecting the confidentiality of information in cases where the identity of respondents can reasonably be inferred by either direct or indirect means; b. Training its officers, employees, contractors, and agents in their legal obligations to protect the confidentiality of respondent identifiable information, and in the procedures that must be followed to provide access to such information; c. Implementing appropriate measures to assure the physical and electronic security of confidential data;
AutoNDA by SimpleDocs
Security, Confidentiality, and Privacy. 3.1. We will implement reasonable and appropriate measures to help secure your data against accidental or unlawful loss, access or disclosure in relation to the use of our Services. Your email address, physical address and other personal information are stored in one of the strongest available encrypted formats. 3.2. HTTPS (256-bit SSL) is used for all data communications with the Services. Data submitted to the Services via email is unencrypted and is not secure. You acknowledge and agree that once any unencrypted data passes onto the Internet, it is not secure and is open to unscrupulous use. We cannot accept responsibility or liability for any data or information that becomes available by such means and we recommend the use of the encrypted HTTPS GET or POST method for transfer of sensitive data or information. 3.3. Unless otherwise specified by you in your account settings, all your data submitted to or returned by the Services is immediately deleted from our servers following processing. We retain only sufficient data required for our management and billing systems. 3.4. Some Feedzon services are processed completely on Feedzon servers (“Internally”) and others use third-party providers (“Externally”), requiring transmission of your data to and from their servers. Although we cannot guarantee the availability of the services of third- party providers, our selection of third-party providers has been made with the intention to maintain the maximum security and privacy throughout provision of the Services. Where possible we have selected third party providers whose agreements have a similar intention to our own. To identify which Services are processed internally or externally, please see the website Services pages. If you do not agree to your data being transmitted externally for a specific Service, do not use that Service. Where you use a Service that is processed externally, you agree that we may transmit and retrieve your date to/from the external service provider. 3.5. Feedzon has physical servers located in various countries. In order to comply with The USA Patriot Act, The Canadian Freedom of Information and Protection of Privacy Amendment Act and similar acts worldwide, we intend to introduced an option whereby you will be able to identify in your account settings in which country or countries you permit your data to be processed. This option only applies to data processed Internally and specifically excludes data processed Externally. Where appl...

Related to Security, Confidentiality, and Privacy

  • Confidentiality and Privacy The Training Provider must not, without the prior written approval of the Department, disclose (or permit the disclosure of) information regarding this VET Funding Contract (including details of the Funds being provided by the Department in respect of any individual) or any Confidential Information of the Department or the State, except: to the extent required under this VET Funding Contract; to the extent required by Law; to its solicitors, barristers and/or other professional advisors in order to obtain advice in relation to its rights under this VET Funding Contract, the Training Services or the Funds and provided such advisors are under a duty of confidentiality; to the extent necessary for the registration or recording of documents where required; and/or to the extent required in connection with legal proceedings, and then only to the extent strictly necessary for that purpose. The Training Provider acknowledges and agrees that: the Department may disclose or otherwise make available (whether to the public generally or to any particular person or group of persons) any and all information relating to the Training Provider and this VET Funding Contract (including Confidential Information of the Training Provider), including: course and qualification details; government subsidised fee information; details of the Funds paid; the contents of any surveys in which the Training Provider participates pursuant to Clause 4.5(j)(ii) or any employer surveys; any information that the Training Provider is required to publish on its website or otherwise make publicly available under this VET Funding Contract; details of any non-compliance by the Training Provider with this VET Funding Contract; any action taken by the Department under this VET Funding Contract; and findings and outcomes of any audits or reviews undertaken pursuant to this VET Funding Contract, as it considers reasonably appropriate to facilitate the proper operation of the Skills First Program, including as contemplated by Clause 12.3 of Schedule 1; the Department may disclose information referred to in paragraph (a), and any information regarding any suspected non-compliance by the Training Provider with this VET Funding Contract, for the purpose of satisfying its obligations under: the Freedom of Information Act 1982 (Vic); the Ombudsman Act 1973 (Vic); or the Audit Act 1994 (Vic); or the requirements of Parliamentary accountability or a Minister's obligations to fulfil their duties of office; and the Department may disclose information referred to in paragraph (a) or paragraph (b) to the counterparty to any Other VET Funding Arrangement, any regulator who has responsibility for issuing or monitoring compliance with the applicable registration referred to in Clause 4.1(a), or other government entity in any jurisdiction that has an interest in the regulation and funding of the VET sector. The Training Provider must take all steps and make all efforts to assist the Department in complying with any of the obligations referred to in Clause 13.2(b). The Training Provider acknowledges that it will be bound by the Information Privacy Principles and any applicable Code of Practice with respect to any act done or practice engaged in by the Training Provider under or in connection with this VET Funding Contract in the same way and to the same extent as the Department would have been bound had it been directly done or engaged in by the Department. The Training Provider must include a standard privacy notice in all enrolment forms, in accordance with the Victorian VET Student Statistical Collection Guidelines, which advises Eligible Individuals how their data may be supplied to and used by the Department and Commonwealth VET Student Loan agencies. The Training Provider must, in collecting any Personal Information for the purposes of this VET Funding Contract, ensure that it has obtained all necessary consents for: the Training Provider to collect, use, hold and disclose that Personal Information, including by disclosing it to the Department as contemplated by this VET Funding Contract (including by way of the submission of reports under Clause 12 of Schedule 1, for the purposes of complying with Record disclosure obligations under Clause 10 and in the course of any audit, review or investigation under Clause 11); and the Department to collect, use, hold and disclose that Personal Information for the purposes of this VET Funding Contract and its operation and management of the Skills First Program, in accordance with all applicable Laws, including the PDP Act, the Health Records Act and (if applicable to the Training Provider) the Privacy Act 1988 (Cth). The Training Provider must cooperate with, and provide any assistance requested by, the Department in relation to: resolving any complaint made to the Department alleging a breach of the PDP Act or the Health Records Act in relation to any Personal Information collected, used, held or disclosed by the Department that was provided to it by the Training Provider in connection with this VET Funding Contract; and providing access to or amendment of any record of Personal Information collected, used, held or disclosed in connection with this VET Funding Contract following a request from an individual made to the Department.

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • Confidentiality and Security Section 1: Service Provider agrees that all of its employees, contractors, subcontractors, or associates will comply with all state and federal law and with TJJD policies regarding maintaining the confidentiality of TJJD youth, including, but not limited to, maintaining confidentiality of student records and identifying information. Section 2: Service Provider agrees that all information regarding TJJD and/or its youth that is gathered, produced, or otherwise derived from this contract shall remain confidential and subject to release only by permission of TJJD. Section 3: Service Provider’s employees, contractors, subcontractors, or associates who visit any TJJD facility will comply with that facility's security regulations. Section 4: Identifying pictures, appearances, films, or reports of TJJD youth may not be disclosed by Service Provider without the written consent of TJJD, of the youth and, if under age 18, of the youth’s parent, guardian, or managing conservator.

  • Privacy and Confidentiality A. Contractors may use or disclose Medi-Cal PII only to perform functions, acitivities or services directly related to the administration of the Medi-Cal program in accordance with Welfare and Institutions Code section 14100.2 and 42 Code of Federal Regulations section 431.300 et.seq, or as required by law. Disclosures which are required by law, such as a court order, or which are made with the explicit written authorization of the Medi-Cal client, are allowable. Any other use or disclosure of Medi-Cal PII requires the express approval in writing of DHCS. Contractor shall not duplicate, disseminate or disclose Medi-Cal PII except as allowed in the Agreement. B. Access to Medi-Cal PII shall be restricted to only contractor personnel who need the Medi-Cal Pii to perform their official duties in connection with the administration of the Medi-Cal program. C. Contractor and/or their personnel who access, disclose or use Medi-Cal PII in a manner or for a purpose not authorized by this Agreement may be subject to civil and criminal sanctions contained in applicable Federal and State statutes.

  • Confidentiality and Proprietary Information 9.1 For the purposes of this Agreement, Confidential Information (“Confidential Information”) means confidential or proprietary technical or business information given by one Party (the “Discloser”) to the other (the “Recipient”). All information which is disclosed by one Party to the other in connection with this Agreement, during negotiations and the term of this Agreement will not be deemed Confidential Information to the Discloser and subject to this Section 9, unless the confidentiality of the information is confirmed in writing by the Discloser prior to disclosure. The Recipient agrees (i) to use Confidential Information only for the purpose of performing under this Agreement, (ii) to hold it in confidence and disclose it to no one other than its employees having a need to know for the purpose of performing under this Agreement, and (iii) to safeguard it from unauthorized use or disclosure using at least the same degree of care with which the Recipient safeguards its own Confidential Information. If the Recipient wishes to disclose the Discloser's Confidential Information to a third-party agent or consultant, such disclosure must be agreed to in writing by the Discloser, and the agent or consultant must have executed a written agreement of nondisclosures and nonuse comparable in scope to the terms of this section. 9.2 The Recipient may make copies of Confidential Information only as reasonably necessary to perform its obligations under this Agreement. All such copies will be subject to the same restrictions and protections as the original and will bear the same copyright and proprietary rights notices as are contained on the original. 9.3 The Recipient agrees to return all Confidential Information in tangible form received from the Discloser, including any copies made by the Recipient, within thirty (30) days after a written request is delivered to the Recipient, or to destroy all such Confidential Information if directed to do so by Discloser except for Confidential Information that the Recipient reasonably requires to perform its obligations under this Agreement; the Recipient shall certify destruction by written letter to the Discloser. If either Party loses or makes an unauthorized disclosure of the Party’s Confidential Information, it will notify such other Party immediately and use its best efforts to retrieve the lost or wrongfully disclosed information. 9.4 The Recipient shall have no obligation to safeguard Confidential Information: (i) which was in the possession of the Recipient free of restriction prior to its receipt from the Discloser; (ii) after it becomes publicly known or available through no breach of this Agreement by the Recipient; (iii) after it is rightfully acquired by the Recipient free of restrictions on its discloser; (iv) after it is independently developed by personnel of the Recipient to whom the Discloser's Confidential Information had not been previously disclosed. In addition, either Party will have the right to disclose Confidential Information to any mediator, arbitrator, state or federal regulatory body, or a court in the conduct of any mediation, arbitration or approval of this Agreement, as long as, in the absence of an applicable protective order, the Discloser has been previously notified by the Recipient in time sufficient for the Recipient to undertake all lawful measures to avoid disclosing such confidential information and for Discloser to have reasonable time to seek or negotiate a protective order before or with any applicable mediator, arbitrator, state or regulatory body or a court. 9.5 The Parties recognize that an individual End User may simultaneously seek to become or be a customer of both Parties. Nothing in this Agreement is intended to limit the ability of either Party to use customer specific information lawfully obtained from End Users or sources other than the Discloser. 9.6 Each Party’s obligations to safeguard Confidential Information disclosed prior to expiration or termination of this Agreement will survive such expiration or termination. 9.7 No license is hereby granted under any patent, trademark, or copyright, nor is any such license implied solely by virtue or the disclosure of any Confidential Information. 9.8 Each Party agrees that the Discloser may be irreparably injured by a disclosure in breach of this Agreement by the Recipient or its representatives and the Discloser will be entitled to seek equitable relief, including injunctive relief and specific performance, in the event of any breach or threatened breach of the confidentiality provisions of this Agreement. Such remedies will not be deemed to be the exclusive remedies for a breach of this Agreement, but will be in addition to all other remedies available at law or in equity.

  • Access to Information; Confidentiality (a) Upon reasonable advance written notice, subject to applicable logistical restrictions or limitations as a result of COVID-19 or any COVID-19 Measures and solely for purposes of furthering the Merger Transactions, the Company shall, and shall cause each of its Subsidiaries to, afford to Parent, Merger Sub and their respective representatives reasonable access during normal business hours during the period from the date of this Agreement until the earlier of the Effective Time or the valid termination of this Agreement pursuant to Article VII, to all their respective properties, assets, books, contracts, commitments, personnel and records and, during such period, the Company shall, and shall cause each of its Subsidiaries to, furnish promptly to Parent: (i) a copy of each report, schedule, registration statement and other document filed or received by it during such period pursuant to the requirements of federal or state securities Laws and (ii) all other information concerning its business, properties and personnel as Parent or Merger Sub may reasonably request (including Tax Returns filed and those in preparation and the workpapers of its auditors). Nothing herein (including, for the avoidance of doubt, this Section 5.2(a) and Section 5.2(b)) shall require the Company or any of its Subsidiaries to provide such access or information to the extent that such action (A) would reasonably be expected to result in a waiver of attorney-client privilege, work product doctrine or similar privilege, (B) specifically relates to the evaluation, deliberation or minutes of the Company Board (or any committee or subcommittee thereof) related to the Merger Transactions, the strategic and financial alternatives process leading thereto, or any information or materials provided to the Company Board (or any committee or subcommittee thereof) in connection therewith or (C) would reasonably be expected to violate any applicable Law or any confidentiality obligation owing to a third party so long as the Company shall promptly notify Parent of any such confidentiality obligations or access restrictions and use commercially reasonable efforts to obtain the consent of such third party to provide such information and otherwise provide such access to Parent, if requested and (b) generally describe the type of information that cannot be disclosed to Parent (to the extent not prohibited by law or the underlying document). No investigation pursuant to this Section 5.2 shall affect any representation or warranty in this Agreement of any party hereto or any condition to the obligations of the parties hereto. All requests for access pursuant to this Section 5.2 must be directed to the Chief Financial Officer of the Company or another person designated in writing by the Company. Notwithstanding anything herein to the contrary, Parent and Merger Sub shall not, and shall cause their respective representatives not to, contact any partner, licensor, licensee, customer or supplier of the Company in connection with the Offer, the Merger or any of the other Merger Transactions without the Company’s prior written consent (such consent not to be unreasonably withheld, conditioned or delayed), and Parent and Merger Sub acknowledge and agree that any such contact shall be arranged by and with a representative of the Company participating. (b) To the extent Parent requests further information or investigation of the basis of any potential violations of Law, including Customs & Trade Laws, and Anti-Bribery Laws, the Company shall, and shall cause its Subsidiaries to, cooperate with such request and make available any personnel or experts engaged by the Company or its Subsidiaries necessary to accommodate such request. (c) The Company shall (i) notify Parent in writing as promptly as reasonably practicable after learning of any Legal Proceeding by any Person initiated against the Company or any of its Subsidiaries or, to the Knowledge of the Company, threatened against the Company, any of its Subsidiaries or any of their respective representatives in their capacity as such (a “New Litigation Claim”); (ii) notify Parent of ongoing material developments in any New Litigation Claim and any Legal Proceeding that was existing prior to the date hereof and (iii) consult in good faith with Parent regarding the conduct of the defense of any New Litigation Claim and any Legal Proceeding that was existing prior to the date hereof. With respect to any New Litigation Claim against the Company or its directors or officers relating to this Agreement or the Merger Transactions, the Company shall consult with Parent and give Parent the opportunity to participate in the defense and settlement of any such litigation, and no such settlement shall be agreed to without Parent’s prior written consent (such consent not to be unreasonably withheld, delayed or

  • Integrity and Confidentiality Escrow Agent will be required to (i) hold and maintain the Deposits in a secure, locked, and environmentally safe facility, which is accessible only to authorized representatives of Escrow Agent, (ii) protect the integrity and confidentiality of the Deposits using commercially reasonable measures and (iii) keep and safeguard each Deposit for one (1) year. ICANN and Registry Operator will be provided the right to inspect Escrow Agent’s applicable records upon reasonable prior notice and during normal business hours. Registry Operator and ICANN will be provided with the right to designate a third-­‐party auditor to audit Escrow Agent’s compliance with the technical specifications and maintenance requirements of this Specification 2 from time to time. If Escrow Agent receives a subpoena or any other order from a court or other judicial tribunal pertaining to the disclosure or release of the Deposits, Escrow Agent will promptly notify the Registry Operator and ICANN unless prohibited by law. After notifying the Registry Operator and ICANN, Escrow Agent shall allow sufficient time for Registry Operator or ICANN to challenge any such order, which shall be the responsibility of Registry Operator or ICANN; provided, however, that Escrow Agent does not waive its rights to present its position with respect to any such order. Escrow Agent will cooperate with the Registry Operator or ICANN to support efforts to quash or limit any subpoena, at such party’s expense. Any party requesting additional assistance shall pay Escrow Agent’s standard charges or as quoted upon submission of a detailed request.

  • Confidentiality/Privacy FTIS shall keep the Confidential Information (as defined in Section 16(a) below) of the Investment Company in confidence and will not use or disclose or allow access to or use of such Confidential Information except (A) as appropriate in connection with activities contemplated by this Agreement; (B) as required pursuant to a court order, subpoena, governmental or regulatory or self-regulatory authority or agency, law, regulation, or binding discovery request in pending litigation (provided the receiving party will provide the other party written notice of such requirement, to the extent such notice is permitted, and subject to proper jurisdiction, if applicable); (C) as requested by a governmental, regulatory or self-regulatory authority or agency in connection with an inquiry, examination, audit or other review; or (D) the information or data is relevant and material to any claim or cause of action between the parties or the defense of any claim or cause of action asserted against FTIS.

  • Publicity and Confidentiality 12.1 Publicity. Partner will keep confidential and will not disclose, market or advertise to third parties the terms of this Agreement (including the fees paid hereunder). Partner or Red Hat may reference its relationship with the other, in the normal course of business including during earnings calls, discussions with analysts, meetings with the press, customer briefings, general marketing activities and in regulatory filings. Neither Party will issue formal press releases or other similar activities referencing the other Party without the written consent of the other Party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!