Sensitive and Classified Information Sample Clauses

Sensitive and Classified Information. Any document, drawing, information or communication (whether in written, oral or electronic form) issued or communicated to the Contractor by the Commonwealth, the Contract Administrator or anyone on the Commonwealth's behalf, whether or not owned by the Commonwealth: marked as "sensitive information" or "for official use only"; identified at the time of issue or communication as "Sensitive Information"; marked with a national security classification or as "Classified Information"; identified at the time of issue or communication as "Classified Information"; or the Contractor knows or ought to know is subject to, or ought to be treated as Sensitive and Classified Information in accordance with, the provisions of all Commonwealth requirements and policies, Statutory Requirements and Defence requirements (including the Australian Government Protective Security Policy Framework, the Australian Government Physical Security Management Protocol, the Australian Government Personnel Security Management Protocol, the Australian Government Information Security Manual and the Defence Security Principles Framework); and everything recording, containing, setting out or making reference to the document, drawing, information or communication (whether in written, oral or electronic form), including documents, notes, records, memoranda, materials, software, disks and all other media, articles or things.
AutoNDA by SimpleDocs
Sensitive and Classified Information. Any document, drawing, information or communication (whether in written, oral or electronic form) issued or communicated to the Consultant by the Commonwealth, the Contract Administrator or anyone on the Commonwealth's behalf, whether or not owned by the Commonwealth: identified at the time of issue or communication as "Sensitive Information"; marked with a national security classification or as "Classified Information"; identified at the time of issue or communication as "Classified Information"; or the Consultant knows or ought to know is subject to, or ought to be treated as Sensitive and Classified Information in accordance with, the provisions of all Commonwealth requirements and policies, Statutory Requirements and Government Requirements (including the Australian Government Protective Security Policy Framework, the Australian Government Physical Security Management Protocol, the Australian Government Personnel Security Management Protocol, the Australian Government Information Security Manual and the Defence Security Principles Framework); and everything recording, containing, setting out or making reference to the document, drawing, information or communication (whether in written, oral or electronic form), including documents, notes, records, memoranda, materials, software, disks and all other media, articles or things.
Sensitive and Classified Information. Sensitive and Classified Information: (Clause 16) Clause 16 [DOES/DOES NOT] apply. (Clause 16 does not apply unless otherwise stated) Current security clearance level/s: (Clause 16.2(b) and 16.3(c)(i)) [INSERT (IF APPLICABLE)] Information technology environment accreditation or certification level/s: (Clause 16.3(f)(i)D) [INSERT (IF APPLICABLE)] Information technology environment accreditation or certification level/s (caveated or compartmented information): (Clause 16.3(f)(i)E) [INSERT (IF APPLICABLE)]

Related to Sensitive and Classified Information

  • Classified Information In no event shall any of the Copyright Collateral, Patent Collateral or Trademark Collateral include any Copyright, Patent or Trademark, any application for a Copyright, Patent or Trademark, or any license or right under any Copyright, Patent or Trademark that is “classified” for reasons of national security or foreign policy under applicable laws or with respect to which Pledgor is not entitled to pledge, sublicense or assign pursuant to its terms or applicable law or regulation.

  • De-identified Information De-identified Information may be used by the Operator only for the purposes of development, product improvement, to demonstrate or market product effectiveness, or research as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Operator agrees not to attempt to re-identify De-identified Information and not to transfer De-identified Information to any party unless (a) that party agrees in writing not to attempt re- identification, and (b) prior written notice has been given to LEA who has provided prior written consent for such transfer. Operator shall not copy, reproduce or transmit any De-identified Information or other Data obtained under the Service Agreement except as necessary to fulfill the Service Agreement.

  • Sensitive Information Buyer will inform Licensor if Personal Data falls into any special categories of personal data as defined in Article 9(1) of Regulation (EU) 2016/679.

  • Excluded Information For purposes of this Agreement, the term “confidential and proprietary information” shall not include (i) information already known or independently developed by the recipient without the use of any confidential and proprietary information, or (ii) information known to the public through no wrongful act of the recipient.

  • Requested Information with reasonable promptness, such other data and information relating to the business, operations, affairs, financial condition, assets or properties of the Company or any of its Subsidiaries or relating to the ability of the Company to perform its obligations hereunder and under the Notes as from time to time may be reasonably requested by any such holder of Notes.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • Contractor Sensitive Information 17.1 The Authority must:

  • Protected Information 5.3.1 In this Section "

  • Information The Buyer and its advisors, if any, have been, and for so long as the Note remain outstanding will continue to be, furnished with all materials relating to the business, finances and operations of the Company and materials relating to the offer and sale of the Securities which have been requested by the Buyer or its advisors. The Buyer and its advisors, if any, have been, and for so long as the Note remain outstanding will continue to be, afforded the opportunity to ask questions of the Company. Notwithstanding the foregoing, the Company has not disclosed to the Buyer any material nonpublic information and will not disclose such information unless such information is disclosed to the public prior to or promptly following such disclosure to the Buyer. Neither such inquiries nor any other due diligence investigation conducted by Buyer or any of its advisors or representatives shall modify, amend or affect Buyer’s right to rely on the Company’s representations and warranties contained in Section 3 below. The Buyer understands that its investment in the Securities involves a significant degree of risk. The Buyer is not aware of any facts that may constitute a breach of any of the Company's representations and warranties made herein.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

Time is Money Join Law Insider Premium to draft better contracts faster.