Handling Confidential Information Sample Clauses

Handling Confidential Information. The receiving Party of any Confidential Information from the disclosing Party will use the same degree of care to protect the disclosing Party’s Confidential Information as it uses for its own Confidential Information of similar nature, but in no event less than a reasonable degree of care, and will use such Confidential Information only for the purpose of exercising its rights or fulfilling its obligations under this Agreement. The receiving Party will promptly return or destroy the disclosing Party’s Confidential Information upon request of the disclosing Party or upon termination of this Agreement (whichever occurs earlier), provided that the receiving Party shall have the right to retain a copy of the Confidential Information if and to the extent required (i) by applicable mandatory law for the required record retention period, or (ii) for the enforcement of any claims against the other Party that may arise under this Agreement until such claims become time-barred. In this event, the receiving Party shall return, destroy, or delete (as applicable) such copy upon the expiration of the applicable record retention or limitation period. Except as otherwise provided for in the Agreement, the receiving Party shall not disclose any Confidential Information to any person or entity other than to its employees, professional advisors and auditors and its Affiliates and their employees, professional advisors and auditors who have a strict business need to access such Confidential Information and who are bound by non-disclosure obligations as restrictive as the confidentiality obligations in the Agreement regarding the protection, use, and confidentiality of such Confidential Information.
AutoNDA by SimpleDocs
Handling Confidential Information. The parties mutually obligate themselves to keep confi- dential information from the respective other party confi- dential and to protect it against unauthorized access by and notice of third parties by taking suitable measures. The requirements concerning the content and scope of the protective measures are based on the type of infor- mation concerned and, apart from that, on the generally acknowledged protective mechanisms used for compara- ble information. Third parties in the sense of this non-disclosure agree- ment do not include employees of the respective receiving party or employees of affiliated companies (in the sense of Section 15 of the German Companies Act (Aktieng- esetz)) of the respective receiving party if the employees concerned are required to receive the confidential infor- mation due to the organizational structure of the receiving party. However, the prerequisite for this access right is that the employees concerned have been instructed concern- ing the handling of confidential information prior to ac- cess and have been obligated to maintain confidentiality concerning such information in a suitable manner. The receiving party is authorized to make confidential in- formation from the disclosing party available to its tax consultants, auditors, and lawyers to the extent necessary for the respective required consulting and auditing con- tract. If the receiving party is obligated to disclose confidential information to the other party concerned or to issue it to third parties owing to a binding order or decision issued by a court or authority, the receiving party must inform the disclosing party of this obligation without undue xx- xxx. The obligation to inform already comes into existence as of the point in time when the receiving party gains knowledge of the initiation of corresponding proceedings. Furthermore, during the proceedings concerning the dis- closure or surrender of confidential information. the re- ceiving party must work towards ensuring that the amount of information disclosed due to a court or official decision is limited to the minimum necessary.
Handling Confidential Information. The parties mutually obligate themselves to keep confi- dential information from the respective other party confi- dential and to protect it against unauthorized access by and notice of third parties by taking suitable measures. The requirements concerning the content and scope of the protective measures are based on the type of infor- mation concerned and, apart from that, on the generally acknowledged protective mechanisms used for compara- ble information. Third parties in the sense of this non-disclosure agree- ment do not include employees of the respective receiving party or employees of affiliated companies of the respective receiving party if the employees concerned are required to receive the confidential information due to the organizational structure of the receiving party. However, the prerequisite for this access right is that the employees concerned have been instructed concerning the handling of confidential information prior to access and have been obligated to maintain confidentiality concerning such in- formation in a suitable manner. The receiving party is authorized to make confidential in- formation from the disclosing party available to its tax consultants, auditors, and lawyers to the extent necessary for the respective required consulting and auditing con- tract. If the receiving party is obligated to disclose confidential information to the other party concerned or to issue it to third parties owing to a binding order or decision issued by a court or authority, the receiving party must inform the disclosing party of this obligation without undue xx- xxx. The obligation to inform already comes into existence as of the point in time when the receiving party gains knowledge of the initiation of corresponding proceedings. Furthermore, during the proceedings concerning the dis- closure or surrender of confidential information. the re- ceiving party must work towards ensuring that the amount of information disclosed due to a court or official decision is limited to the minimum necessary.
Handling Confidential Information. As a result, it is important to handle all confidential information with discretion, labeling it “confidential, ” safeguarding it when in use, filing or disposing of it properly when not in use, and discussing it only with those who have a need to know for a legitimate business reason. In most cases, University data of a personally identifiable nature shall remain secure from public disclosure (release to third parties) without specific permission from the individual to whom those data apply. All users of University data and information systems must follow the practices outlined below Data originated or stored on University computer systems are University property. Employees will access only data that are required for their job. Employees will not make or permit unauthorized use of any University data. They will not seek personal or financial benefit or allow others to benefit personally or financially by knowledge of any data that has come to them by virtue of their work assignment. Employees will not release University data in any format except as required in the performance of their job. Employees will not remove an official record or report, or copy of one, from the office where it is maintained, except as may be necessary in the performance of their job. They will not exhibit or divulge the contents of any record or report to any unauthorized person except in the conduct of their work assignment and in accordance with office and University policies and procedures. Employees will not share their computer login information, including password(s) with others or leave their written password(s) in a place that could be accessible by others. If a user has reason to believe others have learned their password(s), they will report the problem to their supervisor and will take appropriate action to have the password(s) reset. Employees will not attempt to use the logins and passwords of others, nor allow their logins and passwords to be used by others. In the near future, under the HIPAA law, employees must change their passwords regularly to assure PHI data is safeguarded. Employees will maintain security for University data in their possession or to which they have access by protecting computer media, forms and printouts from unauthorized access and will dispose in a safe manner. Further, employees will not leave their PC signed on when unauthorized people could access it, will change their password(s) on a regular basis, and will take other precautionary mea...
Handling Confidential Information. 1. Each Party undertakes to prevent any leakage, publishing or dissemination of Confidential Information obtained from the other Party/Parties and to protect the secrecy of Confidential Information at least to the extent to which it protects its own trade secrets and always in the manner which is usually used for the protection of trade secret.
Handling Confidential Information. Employees should observe the confidentiality of information that they acquire by virtue of their positions at the Company, including information concerning customers, suppliers, competitors, and other employees, except where disclosure is approved by the Company or otherwise legally mandated. Of special sensitivity is financial information, which should under all circumstances be considered confidential except where its disclosure is approved by the Company in writing in advance, or when it has been publicly available in a periodic or special report for at least two business days.
Handling Confidential Information. (1) The receiving party must treat all confidential information of the disclosing party as strictly confidential and ensure that no third parties obtain such information.
AutoNDA by SimpleDocs
Handling Confidential Information 

Related to Handling Confidential Information

  • Confidential Information The Executive shall hold in a fiduciary capacity for the benefit of the Company all secret or confidential information, knowledge or data relating to the Company or any of its affiliated companies, and their respective businesses, which shall have been obtained by the Executive during the Executive's employment by the Company or any of its affiliated companies and which shall not be or become public knowledge (other than by acts by the Executive or representatives of the Executive in violation of this Agreement). After termination of the Executive's employment with the Company, the Executive shall not, without the prior written consent of the Company or as may otherwise be required by law or legal process, communicate or divulge any such information, knowledge or data to anyone other than the Company and those designated by it. In no event shall an asserted violation of the provisions of this Section 10 constitute a basis for deferring or withholding any amounts otherwise payable to the Executive under this Agreement.

  • Trade Secrets and Confidential Information The Executive represents and warrants that: (i) the Executive is not subject to any legal or contractual duty or agreement that would prevent or prohibit the Executive from performing the Executive’s Duties for the Company or otherwise complying with this Agreement, and (ii) the Executive is not in breach of any legal or contractual duty or agreement, including any agreement concerning trade secrets or confidential information owned by any other party. The Executive agrees that the Executive will not: (1) use, disclose, or reverse engineer the Trade Secrets or the Confidential Information for any purpose other than the Company’s Business, except as authorized in writing by the Company; (2) during the Executive’s employment with the Company, use, disclose, or reverse engineer (a) any confidential information or trade secrets of any former employer or third party, or (b) any works of authorship developed in whole or in part by the Executive during any former employment or for any other party, unless authorized in writing by the former employer or third party; or (3) upon the Executive’s resignation or termination (a) retain Trade Secrets or Confidential Information, including any copies existing in any form (including electronic form), which are in the Executive’s possession or control, or (b) destroy, delete, or alter the Trade Secrets or Confidential Information without the Company’s written consent. The obligations under this subsection A shall: (I) with regard to the Trade Secrets, remain in effect as long as the information constitutes a trade secret under applicable law, and (II) with regard to the Confidential Information, remain in effect during the Restricted Period. The confidentiality, property, and proprietary rights protections available in this Agreement are in addition to, and not exclusive of, any and all other rights to which the Company is entitled under federal and state law, including, but not limited to, rights provided under copyright laws, trade secret and confidential information laws, and laws concerning fiduciary duties.

Time is Money Join Law Insider Premium to draft better contracts faster.