Sharing information securely Sample Clauses

Sharing information securely. It is important that information is shared securely. Those who receive personal data should take appropriate measures to protect the data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, and against all other unlawful forms of processing. This includes when data is being shared and stored both electronically and manually (e.g. paper). All designated Officers who have access to personal data should have been assessed for reliability in line with the employer’s requirements for the role, for example Disclosure and Barring Scheme (DBS) checks. A greater degree of staff vetting and/or training is needed where there is a greater importance that relevant data be secure. The information Commissioner has issued the following guidelines concerning obligations for agencies: a) Does the data controller have a security policy setting out management commitment to information security within the organisation? b) Is the responsibility for the organisations security policy clearly placed on a particular person or department? c) Are sufficient resources and facilities made availability to enable that responsibility to be fulfilled? Shared information should be stored securely, and if no statutory guidance dictates otherwise the recipient organisation should destroy the information when it is no longer needed for the purpose for which it was provided. If an organisation does not have the means to securely destroy shared information, they should consider returning the data to the originating organisation for destruction.
AutoNDA by SimpleDocs
Sharing information securely. It is important that information is shared securely. Those who receive personal data should take appropriate measures to protect the data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, and against all other unlawful forms of processing. This includes when data is being shared and stored both electronically and manually (e.g. paper). All designated Officers who have access to personal data should have been assessed for reliability in line with the employer’s requirements for the role, for example Disclosure and Barring Scheme (DBS) checks. A greater degree of staff vetting and/or training is needed where there is a greater importance that relevant data be secure. The information Commissioner has issued the following guidelines concerning obligations for agencies:
Sharing information securely. The Automated Schools Data Exchange is a secure method of data transfer between the schools and the Local Authority. The software application being used benefits from RSA secured encryption, which makes the information useless if it is not delivered to its intended recipient. Each data report (including School name, LEA code and DfE number) is transferred to a pre-defined location on the LA’s network which is located behind the corporate firewall.

Related to Sharing information securely

  • Sharing Information Each party hereto shall as promptly as possible, and in any event within two (2) business days, inform the other of any material communications between such party and the FCC or any other Governmental Authority regarding this Agreement or the transactions contemplated hereby. If any party receives a request for additional information or documentary material from any such Governmental Authority, then such party shall endeavor in good faith to make, or cause to be made, as promptly as practicable and after consultation with the other party, an appropriate response to such request.

  • Funding Information A. Grantee must establish and maintain a separate cost center to capture costs incurred for carrying out the FY20 activities for each allocation within this Contract as provided below. X. Xxxxxxx’s allocations are as follows: 1. EMS/CO

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Pricing Information Each Fund or its designee will furnish Plan Provider on each business day that the New York Stock Exchange is open for business ("Business Day"), with (i) net asset value information as of the close of trading (currently 4:00 p.m. Eastern Time) on the New York Stock Exchange or as at such later times at which a Fund's net asset value is calculated as specified in such Fund's prospectus ("Close of Trading"), (ii) dividend and capital gains information as it becomes available, and (iii) in the case of income Funds, the daily accrual or interest rate factor (mil rate). The Funds shall use their best efforts to provide such information to Plan Provider by 6:00 p.m. Central Time on the same Business Day. Distributor or its affiliate will provide Plan Provider (a) daily confirmations of Account activity within five Business Days after each day on which a purchase or redemption of Shares is effected for the particular Account, (b) if requested by Plan Provider, quarterly statements detailing activity in each Account within fifteen Business Days after the end of each quarter, and (c) such other reports as may be reasonably requested by Plan Provider.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Supplying Information Each Seller shall deliver or provide access to such records, documents, information and data to the applicable Purchaser as such Purchaser may reasonably request in order to properly and efficiently perform its obligations hereunder; provided, however, that the Sellers shall not be required to deliver or provide access to any records, documents, information or data that (a) relates to a part of the business of the Seller Group that is not being serviced by the Purchasers pursuant to this Agreement, (b) in the Sellers’ reasonable determination could violate applicable Law, or could result in the loss or waiver of any attorney-client, work product or similar legal privilege or (c) in the Sellers’ reasonable determination could violate any contractual obligation of the Seller Group with respect to confidentiality; provided, however, the Sellers and the Purchasers shall cooperate in good faith to put in place appropriate substitute disclosure arrangements, including, in the case of clause (a), by separating or redacting the portion of the information that relates to a part of the business of the Seller Group that is not being serviced by the Purchasers pursuant to this Agreement and, in the case of clauses (b) and (c), by using commercially reasonable efforts to obtain the consent of such third party to such access.

  • Updating information You must tell us promptly if information you have provided to us changes, including if your billing address changes or if your use of energy changes (for example, if you start running a business at the premises).

  • Confidentiality; Sharing Information Agent, each Lender and each Transferee shall hold all non-public information obtained by Agent, such Lender or such Transferee pursuant to the requirements of this Agreement in accordance with Agent’s, such Lender’s and such Transferee’s customary procedures for handling confidential information of this nature; provided, however, Agent, each Lender and each Transferee may disclose such confidential information (a) to its examiners, Affiliates, outside auditors, counsel and other professional advisors, (b) to Agent, any Lender or to any prospective Transferees, and (c) as required or requested by any Governmental Body or representative thereof or pursuant to legal process; provided, further that (i) unless specifically prohibited by Applicable Law, Agent, each Lender and each Transferee shall use its reasonable best efforts prior to disclosure thereof, to notify the applicable Borrower of the applicable request for disclosure of such non-public information (A) by a Governmental Body or representative thereof (other than any such request in connection with an examination of the financial condition of a Lender or a Transferee by such Governmental Body) or (B) pursuant to legal process and (ii) in no event shall Agent, any Lender or any Transferee be obligated to return any materials furnished by any Borrower other than those documents and instruments in possession of Agent or any Lender in order to perfect its Lien on the Collateral once the Obligations have been paid in full and this Agreement has been terminated. Each Borrower acknowledges that from time to time financial advisory, investment banking and other services may be offered or provided to such Borrower or one or more of its Affiliates (in connection with this Agreement or otherwise) by any Lender or by one or more Subsidiaries or Affiliates of such Lender and each Borrower hereby authorizes each Lender to share any information delivered to such Lender by such Borrower and its Subsidiaries pursuant to this Agreement, or in connection with the decision of such Lender to enter into this Agreement, to any such Subsidiary or Affiliate of such Lender, it being understood that any such Subsidiary or Affiliate of any Lender receiving such information shall be bound by the provisions of this Section 16.15 as if it were a Lender hereunder. Such authorization shall survive the repayment of the other Obligations and the termination of this Agreement.

  • Billing Information 6.1 NLT and the RL shall provide each other with information within their possession that is necessary to allow them to provide accurate and timely billing to each other and to any other relevant third parties.

  • Supporting Information Each Franchise Fee payment shall be accompanied by a brief report prepared by a representative of Franchisee showing the basis for the computation.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!