Subjects legitimated to request mediation Sample Clauses

Subjects legitimated to request mediation. 1. For the mediations anticipated in Article 4.2 both parties must justify the legitimation indicated in the following section.
AutoNDA by SimpleDocs
Subjects legitimated to request mediation. In accordance with the type of disputes that may be subjected to the procedure, and provided that they arise in the fields anticipated by this Agreement and in accordance with the applicability of the same to the various sectors, sub-sectors, and companies, the following subjects will be legitimated to instigate the mediation of the disputes included in Article 4:

Related to Subjects legitimated to request mediation

  • INFORMATION OF LOCKHEED XXXXXX (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. XXXXXX agrees to comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and to comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. XXXXXX agrees not to use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and agrees not to disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information.

  • Required Confidentiality Claim Form This is a requirement of the TIPS Contract and is non-negotiable. TIPS provides the required TIPS Confidentiality Claim Form in the "Attachments" section of this solicitation. Vendor must execute this form by either signing and waiving any confidentiality claim, or designating portions of Vendor's proposal confidential. If Vendor considers any portion of Vendor's proposal to be confidential and not subject to public disclosure pursuant to Chapter 552 Texas Gov’t Code or other law(s) and orders, Vendor must have identified the claimed confidential materials through proper execution of the Confidentiality Claim Form. If TIPS receives a public information act or similar request, any responsive documentation not deemed confidential by you in this manner will be automatically released. For Vendor documents deemed confidential by you in this manner, TIPS will follow procedures of controlling statute(s) regarding any claim of confidentiality and shall not be liable for any release of information required by law, including Attorney General determination and opinion. Notwithstanding any other Vendor designation of Vendor's proposal as confidential or proprietary, Vendor’s submission of this proposal constitutes Vendor’s agreement that proper execution of the required TIPS Confidentiality Claim Form is the only way to assert any portion of Vendor's proposal as confidential.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Certification of Meeting or Exceeding Tobacco-Free Workplace Policy Minimum Standards A. Grantee certifies that it has adopted and enforces a Tobacco-Free Workplace Policy that meets or exceeds all of the following minimum standards of:

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • CONFIDENTIALITY AND NON-DISCLOSURE; SECURITY BREACH REPORTING 2.1 For purposes of this Contract, confidential information will not include information or material which (a) enters the public domain (other than as a result of a breach of this Contract); (b) was in the receiving party’s possession prior to its receipt from the disclosing party; (c) is independently developed by the receiving party without the use of confidential information; (d) is obtained by the receiving party from a third party under no obligation of confidentiality to the disclosing party; or (e) is not exempt from disclosure under applicable State law.

  • Confidentiality Clause 1. Both parties agree to endeavor to take all reasonable measures to keep in confidence the execution, terms and conditions as well as performance of this Agreement, and the confidential data and information of either party that the other party may know or access during performance of this Agreement (hereinafter referred to as “Confidential Information”), and shall not disclose, make available or assign such Confidential Information to any third party without the prior written consent of the party providing the information.

  • Notice of Legal Matter or Litigation Grantee will send notice to the Substance Use Disorder (SUD) email box, XxxxxxxxxXxxxx.Xxxxxxxxx@xxxx.xxxxx.xx.xx of any litigation or legal matter related to or affecting this Contract within seven (7) calendar days of becoming aware of the litigation or legal matter.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Ownership and License in Deliverables Unless otherwise specified in a specific Purchase Order concerning procurement of a SaaS product:

Time is Money Join Law Insider Premium to draft better contracts faster.