Handling In order to protect such Confidential Information from improper disclosure, each Party agrees: (a) That all Confidential Information shall be and shall remain the exclusive property of the source; (b) To limit access to such Confidential Information to authorized employees who have a need to know the Confidential Information for performance of this Agreement; (c) To keep such Confidential Information confidential and to use the same level of care to prevent disclosure or unauthorized use of the received Confidential Information as it exercises in protecting its own Confidential Information of a similar nature; (d) Not to copy, publish, or disclose such Confidential Information to others or authorize anyone else to copy, publish, or disclose such Confidential Information to others without the prior written approval of the source; (e) To return promptly any copies of such Confidential Information to the source at its request; and (f) To use such Confidential Information only for purposes of fulfilling work or services performed hereunder and for other purposes only upon such terms as may be agreed upon between the Parties in writing.
COMPLAINTS HANDLING 44.1 Either Party shall notify the other Party of any Complaints made by Other Contracting Bodies, which are not resolved by operation of the Supplier's usual complaints handling procedure within five (5) Working Days of becoming aware of that Complaint and, if the Supplier is the Party providing the notice, such notice shall contain full details of the Supplier's plans to resolve such Complaint. 44.2 Without prejudice to any rights and remedies that a complainant may have at Law (including under this Framework Agreement and/or a Call Off Agreement), and without prejudice to any obligation of the Supplier to take remedial action under the provisions of this Framework Agreement and/or a Call Off Agreement, the Supplier shall use its all reasonable endeavours to resolve the Complaint within ten (10) Working Days and in so doing, shall deal with the Complaint fully, expeditiously and fairly. 44.3 Within two (2) Working Days of a request by the Authority, the Supplier shall provide full details of a Complaint to the Authority, including details of steps taken to achieve its resolution.
Name Collision Report Handling 6.3.1 During the first two years after delegation of the TLD, Registry Operator’s emergency operations department shall be available to receive reports, relayed by ICANN, alleging demonstrably severe harm from collisions with overlapping use of the names outside of the authoritative DNS. 6.3.2 Registry Operator shall develop an internal process for handling in an expedited manner reports received pursuant to subsection 6.3.1 under which Registry Operator may, to the extent necessary and appropriate, remove a recently activated name from the TLD zone for a period of up to two years in order to allow the affected party to make changes to its systems.
Transport The Parents consent to the Pupil travelling by any form of public transport and / or in a motor vehicle driven by a responsible adult who is duly licensed and insured to drive a vehicle of that type.
Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.