AAG and the Independent Financial Expert’s Confidential Information Sample Clauses

AAG and the Independent Financial Expert’s Confidential Information. Plan Sponsor acknowledges that information regarding AAG, the Independent Financial Expert, and Reality Investing including, without limitation, the databases, hardware, software, programs, engine, protocols, models, displays and manuals, including, without limitation, the selection, coordination, and arrangement of the contents thereof are intellectual property and trade secrets, proprietary to AAG and/or the Independent Financial Expert, as applicable, and constitute “Confidential Information.” Plan Sponsor acknowledges that all nonpublic information regarding the business and affairs of AAG and the Independent Financial Expert including, but not limited to, business plans, agreements with third parties, fees, services, customers, and finances, constitute Confidential Information.
AutoNDA by SimpleDocs

Related to AAG and the Independent Financial Expert’s Confidential Information

  • Exceptions to Confidential Information The obligations set forth in Section 13.1 (Confidential Information) shall not apply to the extent that Confidential Information includes information which is: (a) now or hereafter, through no unauthorized act or failure to act on the Receiving Party’s part, in the public domain; (b) was in the Receiving Party’s possession before receipt from the Disclosing Party and obtained from a source other than the Disclosing Party and other than through the prior relationship of the Disclosing Party and the Receiving Party before the Separation Date; (c) hereafter furnished to the Receiving Party by a third party as a matter of right and without restriction on disclosure; (d) furnished to others by the Disclosing Party without restriction on disclosure; or (e) independently developed by the Receiving Party without use of the Disclosing Party’s Confidential Information. Nothing in this Agreement shall prevent the Receiving Party from disclosing Confidential Information to the extent the Receiving Party is legally compelled to do so by any governmental, investigative or judicial agency pursuant to proceedings over which such agency has jurisdiction; provided, however, that prior to any such disclosure, the Receiving Party shall: (i) assert the confidential nature of the Confidential Information to the agency; (ii) immediately notify the Disclosing Party in writing of the agency’s order or request to disclose; and (iii) cooperate fully with the Disclosing Party in protecting against any such disclosure and/or obtaining a protective order narrowing the scope of the compelled disclosure and protecting its confidentiality.

  • Exclusions to Confidential Information For purposes of this Confidentiality Agreement, Confidential Information does not include information that:

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Listing Information Confidentiality BellSouth will accord <<customer_name>>’s directory listing information the same level of confidentiality that BellSouth accords its own directory listing information, and BellSouth shall limit access to <<customer_name>>’s customer proprietary confidential directory information to those BellSouth employees or agents who are involved in the preparation of listings or directories.

  • Prime Confidential Information The following shall constitute Confidential Information of the Contractor and should not be disclosed to third (3rd) parties: the deliverables, discoveries, ideas, concepts, software [in various stages of development], designs, drawings, specifications, techniques, models, data, source code, source files, object code, documentation, diagrams, flow charts, research, development, processes, procedures, “know-how”, marketing techniques and materials, marketing and development plans, customer names and other information related to customers, price lists, pricing policies and financial information, this Agreement and the existence of this Agreement, the relationship between the Contractor and Subcontractor, and any details of the Service under this Agreement. Subcontractor agrees not to use or reference the Contractor and/or their names, likenesses, or logos (“Identity”). Subcontractor will not use or reference Contractor or their Identity, directly or indirectly, in conjunction with any other third (3rd) parties.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • E4 Confidential Information E4.1 Except to the extent set out in this clause or where disclosure is expressly permitted elsewhere in this Contract, each Party shall:

  • Access to Confidential Information Each party acknowledges that the other party, its employees or agents, may be given access to Confidential Information relating to the other parties' business or the operation of this Agreement or any negotiations relating to this Agreement.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

Time is Money Join Law Insider Premium to draft better contracts faster.