Security Vetting and Confidentiality Sample Clauses

Security Vetting and Confidentiality. A3.4.1 Where the Client requires and indicates that the service is to be carried out in a secure area, as per clause A11 (Staff Vetting and Government Baseline Security Standard) of the terms and conditions, the Contractor must ensure that the staff accessing the secure areas have been security vetted.
AutoNDA by SimpleDocs

Related to Security Vetting and Confidentiality

  • Privacy and Confidentiality A. Contractors may use or disclose Medi-Cal PII only to perform functions, activities or services directly related to the administration of the Medi-Cal program in accordance with Welfare and Institutions Code section 14100.2 and 42 Code of Federal Regulations section 431.300 et.seq, or as required by law. Disclosures which are required by law, such as a court order, or which are made with the explicit written authorization of the Medi-Cal client, are allowable. Any other use or disclosure of Medi-Cal PII requires the express approval in writing of DHCS. Contractor shall not duplicate, disseminate or disclose Medi-Cal PII except as allowed in the Agreement.

  • Data Confidentiality All data, regardless of form, including originals, images and reproductions, prepared by, obtained by or transmitted to the Professional in connection with this Agreement is confidential, proprietary information owned by NBU. Except as specifically provided in this Agreement, the Professional shall not intentionally disclose data generated in the performance of the Services to any third party without the prior, written consent of NBU.

  • Data Protection and Confidentiality 3.1. We obtain, use, process and disclose personal data about you and data subjects (as defined in the DPA) in order that we may provide the Services and for other related purposes including updating and enhancing client records, analysis for management purposes and statutory returns, crime prevention and legal and regulatory compliance.

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • Integrity and Confidentiality Escrow Agent will be required to (i) hold and maintain the Deposits in a secure, locked, and environmentally safe facility, which is accessible only to authorized representatives of Escrow Agent, (ii) protect the integrity and confidentiality of the Deposits using commercially reasonable measures and (iii) keep and safeguard each Deposit for one (1) year. ICANN and Registry Operator will be provided the right to inspect Escrow Agent’s applicable records upon reasonable prior notice and during normal business hours. Registry Operator and ICANN will be provided with the right to designate a third-­‐party auditor to audit Escrow Agent’s compliance with the technical specifications and maintenance requirements of this Specification 2 from time to time. If Escrow Agent receives a subpoena or any other order from a court or other judicial tribunal pertaining to the disclosure or release of the Deposits, Escrow Agent will promptly notify the Registry Operator and ICANN unless prohibited by law. After notifying the Registry Operator and ICANN, Escrow Agent shall allow sufficient time for Registry Operator or ICANN to challenge any such order, which shall be the responsibility of Registry Operator or ICANN; provided, however, that Escrow Agent does not waive its rights to present its position with respect to any such order. Escrow Agent will cooperate with the Registry Operator or ICANN to support efforts to quash or limit any subpoena, at such party’s expense. Any party requesting additional assistance shall pay Escrow Agent’s standard charges or as quoted upon submission of a detailed request.

  • INFORMATION AND CONFIDENTIALITY 20.1 Each party recognises that under this Agreement it may receive Confidential Information belonging to the other.

  • Publicity and Confidentiality 12.1 Publicity. Partner will keep confidential and will not disclose, market or advertise to third parties the terms of this Agreement (including the fees paid hereunder). Partner or Red Hat may reference its relationship with the other, in the normal course of business including during earnings calls, discussions with analysts, meetings with the press, customer briefings, general marketing activities and in regulatory filings. Neither Party will issue formal press releases or other similar activities referencing the other Party without the written consent of the other Party.

  • Access, Information and Confidentiality (i) From the Signing Date until the date on which all of the Preferred Shares have been redeemed in whole, the Company will permit, and shall cause each of the Company’s Subsidiaries to permit, Treasury, the Oversight Officials and their respective agents, consultants, contractors and advisors to (x) examine any books, papers, records, Tax returns (including all schedules attached thereto), data and other information; (y) make copies thereof; and (z) discuss the affairs, finances and accounts of the Company and the Company Subsidiaries with the personnel of the Company and the Company Subsidiaries, all upon reasonable notice; provided, that:

  • Staff Confidentiality Any confidential personal information about staff of the Employer, which is directly learned by the Employer in the normal course of business, will be treated as strictly confidential and the Employer will take all reasonable precautions to safeguard it.

  • RPS Confidentiality Notwithstanding Section 10.7(a) of this Agreement, at any time on or after the date on which the Buyer makes its advice filing letter seeking CPUC Approval of this Agreement, either Party shall be permitted to disclose the following terms with respect to such Transaction: Party names, the number of bids per company, Project size, resource type, Delivery Term, Project location, Capacity Factor and Contract Capacity, Commercial Operation Date, Expected Initial Energy Delivery Date, Contract Quantity, Delivery Point, and the achievement of Project development Milestones.

Time is Money Join Law Insider Premium to draft better contracts faster.