Security Obligations Regarding Confidential Information Sample Clauses

Security Obligations Regarding Confidential Information. Consultant agrees to comply with the following security obligations as well as any other such obligations conveyed to him/her during the course of the Engagement: Unless otherwise authorized by ITS, Confidential Information may NOT be stored on personal (non-ITS) computing or other electronic or mobile storage devices, or taken or removed in any form from ITS. Consultant shall comply with all federal and State laws. Consultant shall comply with all ITS policies and procedures including but not limited to those that provide for accessing, protecting and preserving State assets. Consultant shall take no action to intrude upon, disrupt or deny services to ITS. Consultant shall use only those access rights granted by ITS.
AutoNDA by SimpleDocs
Security Obligations Regarding Confidential Information. Any person(s) who receive, possess, store, access, or view Confidential Information from either Vendor or its approved Subcontractor or Consultant (hereinafter “Custodian”) shall be subject to the following security obligations: Custodian is the SOLE entity authorized to duplicate, distribute or otherwise transmit Confidential Information. Custodian’s legal representative must approve any process used to duplicate, distribute or otherwise transmit Confidential Information to Authorized Person(s), and may NOT approve or use any process which involves the use of any public internet or other non-secure medium. Unless otherwise authorized by Custodian’s legal representative, Confidential Information may NOT be stored on personal (non-business) computing or other electronic devices, or taken or removed in any form outside of the physical premises of Custodian.
Security Obligations Regarding Confidential Information. The Vendor agrees to comply with the following security obligations as well as any other such obligations specified in the contract or conveyed to him/her during the course of the Agreement. The Vendor agrees to: A. Implement administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity and availability of any Confidential Information that is created, received, maintained, used, possessed, stored, accessed, viewed and/or transmitted on behalf of OIT or through OIT or any agency, instrumentality or political subdivision of the State of Maine Government; B. Continually monitor its operations and take any action necessary to assure that Confidential Information is safeguarded in accordance with OIT policies and standards and all applicable federal and state laws and regulations; C. Unless otherwise authorized by OIT, not to store Confidential Information on personal (i.e., non-OIT / non-Vendor) computing or other electronic or mobile storage devices or taken or removed in any form from OIT; D. Comply with all applicable federal and State laws and regulations; E. Comply with all OIT policies and procedures including but not limited to those that provide for accessing, protecting and preserving State assets; F. Hold all Confidential Information in the strictest confidence; X. Xxxxxx fingerprint-based criminal history record checks for all Vendor's employees, agents and subcontractors when requested by OIT pursuant to federal and state statutory and regulatory directives, at the expense of the vendor; H. Make reasonable efforts to comply with any request by OIT to conduct an audit, including a request to audit the Vendor’s third-party or contractor work; I. Not to intrude upon, disrupt or deny services to OIT; and J. Use only those access rights granted by OIT.
Security Obligations Regarding Confidential Information. Any person(s) who receive, possess, store, access, or view Confidential Information from a Party, or an approved third-party consultant or subcontractor (hereinafter “Custodian”) shall be subject to the following security obligations: a. Custodian is the SOLE entity authorized to duplicate, distribute, or otherwise transmit Confidential Information, b. Custodian’s legal representative must approve any process used to duplicate, distribute, or otherwise transmit Confidential Information to Authorized Person(s), and may NOT approve or use any process which involves the use of any public internet or other non-secure medium, c. Unless otherwise authorized by Custodian’s legal representative, Confidential Information may NOT be stored on personal (non-business) computing or other electronic devices (including zip drives, thumb drives, disks, or any similar computing storage or copying device) or taken or removed in any form outside of the physical premises of the Custodian. d. Confidential Information may only be duplicated, distributed, or otherwise transmitted “as is”, without alteration of any kind. “Confidential” or “Copyright” notices, whether originally in physical or electronic medium, shall not be removed from and shall be duplicated on Confidential Information when such information is duplicated, distributed, or otherwise transmitted pursuant to (b) above.
Security Obligations Regarding Confidential Information. Consultant agrees to comply with the following security obligations, as well as any other such obligations conveyed to him/her during the course of the Engagement: a. Unless otherwise authorized by OASAS, Confidential Information may NOT be stored on personal (non-OASAS) computing or other electronic or mobile storage devices, or taken or removed in any form from OASAS. b. Consultant shall comply with all Federal and State laws including but not limited to Health Insurance Portability and Accountability Act of 1996 (HIPAA) and Confidentiality of Substance Use Disorder Patient Records (42 CFR Part 2). c. Consultant shall comply with all OASAS policies and procedures, including but not limited to those that provide for accessing, protecting, and preserving State assets. d. Consultant shall take no action to intrude upon, disrupt, or deny services to OASAS. e. Consultant shall use only those access rights granted by OASAS.
Security Obligations Regarding Confidential Information. Any person(s) who receive, possess, store, access, or view Confidential Information from either the Recipient Party or its approved Subcontractor or Consultant shall be subject to the following security obligations: a. The Recipient Party must approve any process used to duplicate, distribute or otherwise transmit Confidential Information to Authorized Person(s), and may NOT approve or use any process which involves the use of any public internet or other non-secure medium. b. Confidential Information may NOT be stored on personal (non-business) computing or other electronic devices or taken or removed in any form outside of the physical premises of Recipient Party. c. Upon termination of employment, Authorized Person(s) shall be required to return Confidential Information to Recipient Party’s legal representative, and/or to affirm that all electronic, optical or other copies have been destroyed within any electronic storage or other medium.

Related to Security Obligations Regarding Confidential Information

  • Security of Confidential Information Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • E4 Confidential Information Except to the extent set out in this clause or where disclosure is expressly permitted elsewhere in this Contract, each Party shall:

  • Trade Secrets and Confidential Information (i) Executive represents and warrants that Executive (A) is not subject to any legal or contractual duty or agreement that would prevent or prohibit Executive from performing the duties contemplated by this Agreement or otherwise complying with this Agreement, and (B) is not in breach of any legal or contractual duty or agreement, including any agreement concerning trade secrets or confidential information owned by any other party. (ii) Executive agrees that Executive will not (A) use, disclose or reverse engineer Trade Secrets or Confidential Information for any purpose other than the Company’s Business, except as authorized in writing by the Company; (B) during Executive’s employment with the Company, use, disclose or reverse engineer (1) any confidential information or trade secrets of any former employer or third party or (2) any works of authorship developed in whole or in part by Executive during any former employment or for any other party, unless authorized in writing by the former employer or third party; or (C) upon Executive’s resignation or termination with the Company (1) retain Trade Secrets or Confidential Information, including any copies existing in any form (including electronic form), which are in Executive’s possession or control or (2) destroy, delete or alter Trade Secrets or Confidential Information without the Company’s prior written consent. (iii) The obligations under this Section 8 shall remain in effect as long as Trade Secrets and Confidential Information constitute trade secrets or confidential information under applicable law. The confidentiality, property and proprietary rights protections available in this Agreement are in addition to, and not exclusive of, any and all other rights to which the Company is entitled under federal and state law, including, but not limited to, rights provided under copyright laws, trade secret and confidential information laws and laws concerning fiduciary duties.

  • Maintaining Confidential Information Executive reaffirms his obligations under the Confidentiality Agreement. Executive acknowledges and agrees that the payments provided in Section 3 above shall be subject to Executive’s continued compliance with Executive’s obligations under the Confidentiality Agreement.

  • Protection of Confidential Information The Servicer shall keep confidential and shall not divulge to any party, without the Seller’s prior written consent, any nonpublic information pertaining to the Mortgage Loans or any borrower thereunder, except to the extent that it is appropriate for the Servicer to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies or it is otherwise in accordance with Accepted Servicing Practices.

  • Access, Information and Confidentiality (a) From the date of this Agreement, until the date when the Investor no longer beneficially owns at least fifty percent (50%) or more of all of the Purchased Shares (a “Qualifying Ownership Interest”), subject to applicable law or regulatory requirements, the Company will use reasonable efforts to afford the Investor and its representatives (including employees of the Investor, and counsel, accountants, investment advisors and other professionals retained by the Investor) such access during normal business hours to its and the Company Subsidiaries’ books, records, properties and personnel and to such other information as the Investor may reasonably request. (b) Each party to this Agreement will hold, and will cause its respective subsidiaries and their directors, officers, employees, agents, consultants, and advisors to hold, in strict confidence, unless disclosure to a Governmental Entity (and, solely with respect to the Company, the Bankruptcy Court) is necessary or appropriate in connection with any necessary regulatory approval or unless compelled to disclose by judicial or administrative process or by other requirement of law or the applicable requirements of any Governmental Entity (and, solely with respect to the Company, the Bankruptcy Court), all nonpublic records, books, contracts, instruments, computer data and other data and information (collectively, “Information”) concerning the other party hereto furnished to it by such other party or its representatives pursuant to this Agreement (except to the extent that such Information can be shown to have been (1) previously known by such party on a nonconfidential basis, (2) in the public domain through no fault of such party, or (3) later lawfully acquired from other sources by the party to which it was furnished), and neither party hereto shall release or disclose such Information to any other person, except its auditors, attorneys, financial advisors, other consultants, and advisors and, to the extent permitted above, to bank regulatory authorities. Prior to any disclosure of Information permitted by the prior sentence, the party proposing to disclose such Information shall, to the extent legally permissible, provide notice to the other party so that the other party may, at its own expense, seek an protective order or other appropriate remedy and/or waive compliance with the provisions of this Section 3.2(b). If such protective order or other remedy is denied, the party proposing to disclose such Information shall (x) furnish only that portion of the Information that, based upon the advice of counsel, is necessary to be disclosed in connection with such necessary regulatory approval or is compelled to be disclosed by such judicial or administrative process or by such other requirement of law or such applicable requirements and (y) use its reasonable best efforts to obtain assurances that confidential treatment will be accorded to the Information.

  • Prime Confidential Information The following shall constitute Confidential Information of the Contractor and should not be disclosed to third (3rd) parties: the deliverables, discoveries, ideas, concepts, software [in various stages of development], designs, drawings, specifications, techniques, models, data, source code, source files, object code, documentation, diagrams, flow charts, research, development, processes, procedures, “know-how”, marketing techniques and materials, marketing and development plans, customer names and other information related to customers, price lists, pricing policies and financial information, this Agreement and the existence of this Agreement, the relationship between the Contractor and Subcontractor, and any details of the Service under this Agreement. Subcontractor agrees not to use or reference the Contractor and/or their names, likenesses, or logos (“Identity”). Subcontractor will not use or reference Contractor or their Identity, directly or indirectly, in conjunction with any other third (3rd) parties.

  • Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it.

  • Company Creation and Use of Confidential Information The Executive understands and acknowledges that the Company has invested, and continues to invest, substantial time, money and specialized knowledge into developing its resources, creating a customer base, generating customer and potential customer lists, training its employees, and improving its product offerings in the field of financial services. The Executive understands and acknowledges that as a result of these efforts, the Company has created, and continues to use and create Confidential Information. This Confidential Information provides the Company with a competitive advantage over others in the marketplace.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!