Unauthorized Use, Disclosure, or Loss Sample Clauses

Unauthorized Use, Disclosure, or Loss. If Contractor becomes aware of any threatened or actual use or disclosure of any Confidential Information that is not specifically authorized by this Contract, or if any Confidential Information is lost or cannot be accounted for, Contractor shall notify T APFIN and the Authorized User within the same business day the Contractor becomes aware of such use, disclosure, or loss. Such notice shall include, to the best of the Contractor's knowledge at that time, the persons affected, their identities, and the Confidential Information disclosed. The Contractor shall take immediate steps to mitigate any harmful effects of the unauthorized use, disclosure, or loss. The Contractor shall reasonably cooperate with TAPFIN or the State's efforts to seek appropriate injunctive relief or otherwise prevent or curtail such threatened or actual breach, or to recover its Confidential Information, including complying with a reasonable Corrective Action Plan. If the unauthorized use, disclosure, or loss is of Personally Identifiable Information, or reasonably could otherwise identify individuals, Contractor shall, at its own cost, take any or all of the following measures that are directed by TAPFIN or the State as part of a Corrective Action Plan:
AutoNDA by SimpleDocs
Unauthorized Use, Disclosure, or Loss. If a Party becomes aware of any threatened or actual use or disclosure of any Confidential Information that is not specifically authorized by this Contract, or if any Confidential Information is lost or cannot be accounted for, the Party shall notify the other Party’s or MCO's contract manager within the same business day the Party becomes aware of such use, disclosure, or loss. Such notice shall include, to the best of the Party's knowledge at that time, the persons affected, their identities, and the Confidential Information disclosed. Each Party shall take immediate steps to mitigate any harmful effects of the unauthorized use, disclosure, or loss. The Party shall reasonably cooperate with the other’s efforts to seek appropriate injunctive relief or otherwise prevent or curtail such threatened or actual breach, or to recover its Confidential Information, including complying with a reasonable Corrective Action Plan. If the unauthorized use, disclosure, or loss is of Personally Identifiable Information, or reasonably could otherwise identify individuals, the Party shall, at its own cost, take any or all of the following measures that are directed by the other Party or MCO as part of a Corrective Action Plan:
Unauthorized Use, Disclosure, or Loss. Promptly upon becoming aware of any threatened or actual use or disclosure of any Confidential Information of the disclosing party that is in violation of this Contract, the receiving party shall notify the disclosing party promptly, but no later than three business days after receiving party becomes aware of such use or disclosure. Such notice shall include, to the best of the Contractors knowledge at that time, the Confidential Information disclosed. The receiving party shall take prompt steps to mitigate any harmful effects of the unauthorized use, disclosure, or loss of Confidential Information of the disclosing party. The receiving party shall reasonably cooperate with the disclosing party's efforts to seek appropriate injunctive relief or otherwise prevent or curtail such threatened or actual breach, or to recover its Confidential Information, including complying with a Corrective Action Plan.
Unauthorized Use, Disclosure, or Loss. If Contractor becomes aware of any threatened or actual use or disclosure of any Confidential Information that is not specifically authorized by this Agreement, or if any Confidential Information is lost or cannot be accounted for, Contractor shall notify the State's (Contract Manager/Contact Liaison/Privacy Officer) within the same business day the Contractor becomes aware of such use, disclosure, or loss. Such notice shall include, to the best of the Contractor's knowledge at that time, the persons affected, their identities, and the Confidential Information disclosed. The Contractor shall take immediate steps to mitigate any harmful effects of the unauthorized use, disclosure, or loss. The Contractor shall reasonably cooperate with the State's efforts to seek appropriate injunctive relief or otherwise prevent or curtail such threatened or actual breach, or to recover its Confidential Information, including complying with a reasonable Corrective Action Plan. If the unauthorized use, disclosure, or loss is of Personally Identifiable Information, or reasonably could otherwise identify individuals, Contractor shall, at its own cost, take any or all of the following measures that are directed by the State as part of a Corrective Action Plan:

Related to Unauthorized Use, Disclosure, or Loss

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • LIABILITY FOR UNAUTHORIZED USE If any Card is lost or stolen or otherwise may be used without your permission (express or implied), you must immediately notify us orally or in writing at the following phone number or address: 0-000-000-0000 or at TIB, National Association, P.O Box 569120, Dallas, Texas 75356-9120. If unauthorized use of a Card occurs before you notify us of the loss, theft or unauthorized use, you may be liable up to a maximum amount of $50. If unauthorized use of a Credit Device occurs, you may be liable for all of the unauthorized use.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

Time is Money Join Law Insider Premium to draft better contracts faster.