Proprietary Data NASDAQ OMX grants to Subscriber a nonexclusive, non-transferable license during the term of the Agreement to receive and use the Information transmitted to it by Distributor and thereafter, to use such Information as permitted under the terms of this Agreement and/or the NASDAQ OMX Requirements. Subscriber acknowledges and agrees that NASDAQ OMX has proprietary rights to the Information that originates on or derives from markets regulated or operated by NASDAQ OMX, and compilation or other rights to Information gathered from other sources. Subscriber further acknowledges and agrees that NASDAQ OMX 's third-party information providers have exclusive proprietary rights to their respective Information. In the event of any misappropriation or misuse by Subscriber or anyone who accesses the Information through Subscriber, NASDAQ OMX or its third-party information providers shall have the right to obtain injunctive relief for its respective materials. Subscriber will attribute source as appropriate under all the circumstances.
Confidentiality & Proprietary Information The Consultant acknowledges that it will be necessary for the Client to disclose certain confidential and proprietary information to the Consultant in order for the Consultant to perform their duties under this Agreement. The Consultant acknowledges that disclosure to a third (3rd) party or misuse of this proprietary or confidential information would irreparably harm the Client. Accordingly, the Consultant will not disclose or use, either during or after the term of this Agreement, any proprietary or confidential information of the Client without the Client's prior written permission except to the extent necessary to perform the Services on the Client's behalf. Proprietary or confidential information includes, but is not limited to:
CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.
Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.
Proprietary and Confidential Information The Distributor agrees on behalf of itself and its managers, officers, and employees to treat confidentially and as proprietary information of the Trust, all records and other information relative to the Trust and prior, present or potential shareholders of the Trust (and clients of said shareholders), and not to use such records and information for any purpose other than the performance of its responsibilities and duties hereunder, except (i) after prior notification to and approval in writing by the Trust, which approval shall not be unreasonably withheld and may not be withheld where the Distributor may be exposed to civil or criminal contempt proceedings for failure to comply, (ii) when requested to divulge such information by duly constituted authorities, or (iii) when so requested by the Trust. Records and other information which have become known to the public through no wrongful act of the Distributor or any of its employees, agents or representatives, and information that was already in the possession of the Distributor prior to receipt thereof from the Trust or its agent, shall not be subject to this paragraph. Further, the Distributor will adhere to the privacy policies adopted by the Trust pursuant to Title V of the Gxxxx-Xxxxx-Xxxxxx Act, as may be modified from time to time. In this regard, the Distributor shall have in place and maintain physical, electronic and procedural safeguards reasonably designed to protect the security, confidentiality and integrity of, and to prevent unauthorized access to or use of, records and information relating to the Trust and its shareholders.
Prime Confidential Information The following shall constitute Confidential Information of the Contractor and should not be disclosed to third (3rd) parties: the deliverables, discoveries, ideas, concepts, software [in various stages of development], designs, drawings, specifications, techniques, models, data, source code, source files, object code, documentation, diagrams, flow charts, research, development, processes, procedures, “know-how”, marketing techniques and materials, marketing and development plans, customer names and other information related to customers, price lists, pricing policies and financial information, this Agreement and the existence of this Agreement, the relationship between the Contractor and Subcontractor, and any details of the Service under this Agreement. Subcontractor agrees not to use or reference the Contractor and/or their names, likenesses, or logos (“Identity”). Subcontractor will not use or reference Contractor or their Identity, directly or indirectly, in conjunction with any other third (3rd) parties.
Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.
Confidential Information Each party agrees that all code, inventions, know-how, business, technical and financial information it obtains (“Receiving Party”) from the disclosing party (“Disclosing Party”) constitutes the confidential information of the Disclosing Party (“Confidential Information”), provided that it is identified as confidential at the time of disclosure or should be reasonably known by the Receiving Party to be Confidential Information due to the nature of the information disclosed and the circumstances surrounding the disclosure. The Services and any updates, upgrades, modifications, derivatives, specifications, technical guides, other software, or other documentation provided by Xxxxxx (or its agents) shall be deemed Confidential Information of Xxxxxx without any marking or future designation. Except as expressly authorized herein, the Receiving Party will hold in confidence and not use or disclose any Confidential Information. The Receiving Party’s nondisclosure obligation shall not apply to information which the Receiving Party can document: (i) was rightfully in its possession or known to it prior to receipt of the Confidential Information; (ii) is or has become public knowledge through no fault of the Receiving Party; (iii) is rightfully obtained by the Receiving Party from a third party without breach of any confidentiality obligation; (iv) is independently developed by employees of the Receiving Party who had no access to such information; or (v) is required to be disclosed pursuant to the regulation, law, or court order (but only to the minimum extent required to comply with such regulation or order and with advance notice to the Disclosing Party). The Receiving Party acknowledges that disclosure of Confidential Information would cause substantial harm for which damages alone may not be a sufficient remedy, and therefore that upon any such disclosure by the Receiving Party the Disclosing Party shall be entitled to seek appropriate equitable relief in addition to whatever other remedies it might have at law. Upon termination or expiration of this Agreement, if Xxxxxx is in possession of any Customer Materials, Xxxxxx shall delete, return, or make available to Customer all Customer Materials then in its possession. Upon request by Customer within thirty (30) days after any expiration or termination of the applicable Order Form, Xxxxxx will either make Customer Materials available to Customer through the Services on a limited basis solely for the purposes of data retrieval or will reasonably assist Customer with such retrieval. After such thirty (30) day period, Xxxxxx will have no obligation to maintain or provide any Customer Materials and, unless legally prohibited, may delete all Customer Materials. Customer acknowledges that certain Xxxxxx Services do not store or maintain Customer Materials.