Examples of Non-Public Information in a sentence
After completion and/or termination of the Master Agreement, Contractor shall either return all Confidential Information and Non-Public Information, and the copies thereof to Central Xxxxxx, or destroy and certify the destruction of, all Confidential Information and Non-Public Information, unless otherwise prohibited by law.
PROPRIETARY INFORMATION AND CONFIDENTIALITY All Confidential Information, Non-Public Information and BES Cyber Security Information shall remain the property of Central Xxxxxx and Contractor will not acquire any property rights in any of the information contained therein by virtue of such information being furnished to Contractor pursuant to the Master Agreement and/or this Rider.
If Contractor is served with a subpoena, court order or other legally compelling demand (collectively, a “Demand”) to produce, copy, furnish or allow the inspection of Confidential Information, Non-Public Information and BES Cyber Security Information or any portion thereof, Contractor agrees to immediately notify Central Xxxxxx of the Demand so as to allow Central Xxxxxx to seek a protective order or to contest the Demand, unless such notification is expressly prohibited by law.
All Confidential Information, Non-Public Information and BES Cyber Security Information furnished to Contractor shall be kept confidential by Contractor and used by Contractor solely for the intended purpose or purposes for which it was furnished, and Contractor shall not disclose the content of any such to any third party; provided, however, that Contractor shall not be liable for: The disclosure of any such information to a third party to the extent authorized, in writing, by Central Xxxxxx.
Theft, damage, destruction, or corruption of any data of Contractor or any employee, or customer of Contractor, including without limitation, unauthorized access, unauthorized use, identity theft, theft of Personal Data, Confidential Information, Non-Public Information or BES Cyber Security Information, transmission of a computer virus or other type of malicious code, including a denial of service attack on a third party.