Storage of Confidential Information. The Receiving Party:
Storage of Confidential Information. All Storm King Confidential Information shall be stored in at least as secure a manner as Contractor’s similar information. For electronic Confidential Information, this includes but is not limited to: complex password protected, MFA, or biometric access to all electronic devices; at least monthly software updates; network intrusion protection; instant-update firewall and anti-virus software; remote access encryption; and closed port by default systems; For physical Confidential Information, this shall include but not be limited to: physical site access controls and internal controls to prevent inadvertent staff or visitor disclosure.
Storage of Confidential Information. Associate shall store Confidential Information only on devices and systems that provide reasonable access protection (such as passwords or other identification methods), including but not limited to mobile phones, laptop computers, and customer relationship management (CRM) software. Adizes hall only use a Adizes provided email address for any and all communications related to the Services.
Storage of Confidential Information. 5.1 The Parties undertake in relation to the Confidential Information received to take the same precautions and the same safeguards as those applied by the Party in relation to its own Confidential Information.
Storage of Confidential Information. 3.1 Where Confidential Information is held in hardcopy form, it must be stored in a locked location when not in use.
Storage of Confidential Information. The Receiving Party shall only store the Confidential Information, whether electronically or in hardcopy form, at the business premises connected with IVES PRODUCT DESIGN LIMITED. Where the Receiving Party holds the Confidential Information in hardcopy form, it must be stored in a locked cabinet/drawer when not in use. Where the Receiving Party holds the Confidential Information electronically, the Confidential Information shall be stored only on a local computer or tablet device, at business premises connected with IVES PRODUCT DESIGN LIMITED and shall not be stored on a remote server of any kind. The Confidential Information stored on the computer or tablet device may be made accessible over the local area network to which it is connected, operating at any business premises connected with IVES PRODUCT DESIGN LIMITED, provided it is not accessible via the internet. The computer or tablet device on which the Confidential Information is stored must be protected using a password. The Disclosing Party shall have the right to access and inspect the location(s) at which the Receiving Party is to hold the Confidential Information upon not less than 5 business days written notice. If the Disclosing Party is not satisfied with any aspect of the Receiving Party’s storage arrangements, it shall have the right to request any such reasonable changes to those arrangements as it may deem necessary to satisfy the requirements described in this Agreement.
Storage of Confidential Information. Supplier’s employee agrees that Confidential Information accessed by or in his/her possession shall be protected and stored using the same measures used to protect his or her employer’s proprietary or confidential information, unless the project office has other directive or contractual protection/storage requirements.
Storage of Confidential Information. The Recipient shall provide proper and secure storage for Ewellix's written Confidential Information as well as for all models or notes containing Confidential Information.
Storage of Confidential Information a. Confidential Participant Information that is received by the THSA in either electronic form or hard copy shall be properly secured to minimize risks to unauthorized access. Access to the systems and storage locations designated for Confidential Participant Information will be limited to the THSA and such support staff and advisors who require access to such information for performance of their work, as determined by the THSA. On a routine basis, but no less frequently than every six (6) months, the THSA will review a list of those who have access to the systems designated for Confidential Participant Information and confirm the accuracy of the list.
Storage of Confidential Information. The Confidential Information must not be copied, reproduced, distributed, stored digitally or by other means, or passed to others at any time other than in accordance with this Confidentiality Agreement or with the prior written consent of Transnet.