Protected secrets Sample Clauses

Protected secrets. The device must prevent access to content security keys and access control metadata to software executing outside of the secure OS/security processor.
AutoNDA by SimpleDocs

Related to Protected secrets

  • Trade Secrets (i) With respect to each Trade Secret, the documentation relating to such Trade Secret is current, accurate, and sufficient in detail and content to identify and explain it and to allow its full and proper use without reliance on the knowledge or memory of any individual.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Protected Information 5.3.1 In this Section "

  • Company Information Subscriber understands that the Company is subject to all the risks that apply to early-stage companies, whether or not those risks are explicitly set out in the Offering Circular. Subscriber has had such opportunity as it deems necessary (which opportunity may have presented through online chat or commentary functions) to discuss the Company’s business, management and financial affairs with managers, officers and management of the Company and has had the opportunity to review the Company’s operations and facilities. Subscriber has also had the opportunity to ask questions of and receive answers from the Company and its management regarding the terms and conditions of this investment. Subscriber acknowledges that except as set forth herein, no representations or warranties have been made to Subscriber, or to Subscriber’s advisors or representative, by the Company or others with respect to the business or prospects of the Company or its financial condition.

  • Confidential Information The Executive shall hold in a fiduciary capacity for the benefit of the Company all secret or confidential information, knowledge or data relating to the Company or any of its affiliated companies, and their respective businesses, which shall have been obtained by the Executive during the Executive's employment by the Company or any of its affiliated companies and which shall not be or become public knowledge (other than by acts by the Executive or representatives of the Executive in violation of this Agreement). After termination of the Executive's employment with the Company, the Executive shall not, without the prior written consent of the Company or as may otherwise be required by law or legal process, communicate or divulge any such information, knowledge or data to anyone other than the Company and those designated by it. In no event shall an asserted violation of the provisions of this Section 10 constitute a basis for deferring or withholding any amounts otherwise payable to the Executive under this Agreement.

  • Protected Health Information “Protected Health Information” shall have the same meaning as the term “protected health information” in Section 160.103 and is limited to the information created or received by Contractor from or on behalf of County.

  • Confidential Information Defined For the purposes of this ARR Agreement, “Confidential Information” means nonpublic proprietary information of a Party (the “Disclosing Party”) that is disclosed to another Party (each such Party, a “Receiving Party”), including but not limited to: (i) business or technical processes, formulae, source codes, object code, product designs, sales, cost and other unpublished financial information, customer information, product and business plans, projections, marketing data or strategies, trade secrets, intellectual property rights, know-how, expertise, methods and procedures for operation, information about employees, customer names, business or technical proposals, and any other information which is or should reasonably be understood to be confidential or proprietary to the Disclosing Party; and (ii) PII (as defined in Section 7.03 of this ARR Agreement). The foregoing definition of Confidential Information applies to: (i) all such information, whether tangible or intangible and regardless of the medium in which it is stored or presented; and (ii) all copies of such information, as well as all memoranda, notes, summaries, analyses, computer records, and other materials prepared by the Receiving Party or any of its employees, agents, advisors, directors, officers, and subcontractors (collectively “Representatives”) that contain or reflect the Confidential Information.

  • Membership Information 4.3.1 The District shall take all reasonable steps to safeguard the privacy of CSEA members’ personal information, including but not limited to members Social Security Numbers, personal addresses, personal phone number, personal cellular phone number, and status as a union member.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Proprietary Information The Software, any data base and any proprietary data, processes, information and documentation made available to the Fund (other than which are or become part of the public domain or are legally required to be made available to the public) (collectively, the “Information”), are the exclusive and confidential property of Custodian or its suppliers. The Fund shall keep the Information confidential by using the same care and discretion that the Fund uses with respect to its own confidential property and trade secrets, but not less than reasonable care. Upon termination of the Agreement or the Software license granted herein for any reason, the Fund shall return to Custodian any and all copies of the Information which are in its possession or under its control.

Time is Money Join Law Insider Premium to draft better contracts faster.