Security Integrity and Confidentiality Sample Clauses

Security Integrity and Confidentiality. Personal Data must be secured by appropriate technical and organisational measures against unauthorised or unlawful Processing, and against accidental loss, destruction or damage. The employer will develop, implement and maintain safeguards appropriate to its size, scope and business, the employer’s available resources, the amount of Personal Data that the employer owns or maintains on behalf of others and identified risks (including use of encryption and Pseudonymisation where applicable). The employer will regularly evaluate and test the effectiveness of those safeguards to ensure security of its Processing of Personal Data. The employee is responsible for protecting the Personal Data the employer hold. The employee must implement reasonable and appropriate security measures against unlawful or unauthorised Processing of Personal Data and against the accidental loss of, or damage to, Personal Data. The employee must exercise particular care in protecting Special Categories of Personal Criminal Convictions Data from loss and unauthorised access, use or disclosure. The employee must follow all procedures and technologies the employer puts in place to maintain the security of all Personal Data from the point of collection to the point of destruction. The employee may only transfer Personal Data to third-party service providers who agree to comply with the required policies and procedures and who agree to put adequate measures in place, as requested. The employee must maintain data security by protecting the confidentiality, integrity and availability of the Personal Data, defined as follows:
AutoNDA by SimpleDocs
Security Integrity and Confidentiality. 12.1. Personal Data must be secured by appropriate technical and organisational measures against unauthorised or unlawful Processing, and against accidental loss, destruction or damage.
Security Integrity and Confidentiality 

Related to Security Integrity and Confidentiality

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • Integrity and Confidentiality Escrow Agent will be required to (i) hold and maintain the Deposits in a secure, locked, and environmentally safe facility, which is accessible only to authorized representatives of Escrow Agent, (ii) protect the integrity and confidentiality of the Deposits using commercially reasonable measures and (iii) keep and safeguard each Deposit for one (1) year. ICANN and Registry Operator will be provided the right to inspect Escrow Agent’s applicable records upon reasonable prior notice and during normal business hours. Registry Operator and ICANN will be provided with the right to designate a third-­‐party auditor to audit Escrow Agent’s compliance with the technical specifications and maintenance requirements of this Specification 2 from time to time. If Escrow Agent receives a subpoena or any other order from a court or other judicial tribunal pertaining to the disclosure or release of the Deposits, Escrow Agent will promptly notify the Registry Operator and ICANN unless prohibited by law. After notifying the Registry Operator and ICANN, Escrow Agent shall allow sufficient time for Registry Operator or ICANN to challenge any such order, which shall be the responsibility of Registry Operator or ICANN; provided, however, that Escrow Agent does not waive its rights to present its position with respect to any such order. Escrow Agent will cooperate with the Registry Operator or ICANN to support efforts to quash or limit any subpoena, at such party’s expense. Any party requesting additional assistance shall pay Escrow Agent’s standard charges or as quoted upon submission of a detailed request.

  • Intellectual Property and Confidentiality 9.1 All intellectual property rights in and relating to the goods we supply to you, their manufacture, development and creation (including improvements to them) will be or remain ours and you will, at our request, do any act and execute any documents necessary to confirm such rights.

  • File Security and Retention; Confidentiality A. USBFS and its agents will provide reasonable security provisions to ensure that unauthorized third parties do not have access to the Trust’s data bases, files, and other information provided by the Trust to USBFS for use with the Electronic Services, the names of End Users or End User transaction or account data (collectively, “Trust Files”). USBFS’s security provisions with respect to the Electronic Services, the Trust’s web site(s) and the Trust Files will be no less protected than USBFS’s security provisions with respect to its own proprietary information. USBFS agrees that any and all Trust Files maintained by USBFS for the Trust hereunder shall be available for inspection by the Trust’s regulatory authorities during regular business hours, upon reasonable prior written notice to USBFS, and will be maintained and retained in accordance with applicable requirements of the 1940 Act. USBFS will take such actions as are necessary to protect the intellectual property contained within the Trust’s web site(s) or any software, written materials, or pictorial materials describing or creating the Trust’s web site(s), including all interface designs or specifications. USBFS will take such actions as are reasonably necessary to protect all rights to the source code and interface of the Trust’s web site(s). In addition, USBFS will not use, or permit the use of, names of End Users for the purpose of soliciting any business, product, or service whatsoever except where the communication is necessary and appropriate for USBFS’s delivery of the Electronic Services.

  • Publicity and Confidentiality 12.1 Publicity. Partner will keep confidential and will not disclose, market or advertise to third parties the terms of this Agreement (including the fees paid hereunder). Partner or Red Hat may reference its relationship with the other, in the normal course of business including during earnings calls, discussions with analysts, meetings with the press, customer briefings, general marketing activities and in regulatory filings. Neither Party will issue formal press releases or other similar activities referencing the other Party without the written consent of the other Party.

  • Information and Confidentiality 20.1 Each party recognises that under this Agreement it may receive Confidential Information belonging to the other.

  • Data Protection and Confidentiality 3.1. We obtain, use, process and disclose personal data about you and data subjects (as defined in the DPA) in order that we may provide the Services and for other related purposes including updating and enhancing client records, analysis for management purposes and statutory returns, crime prevention and legal and regulatory compliance.

  • Access and Confidentiality (a) Until the earlier of the Closing Date and the date on which the Agreement is terminated pursuant to Article 10, Seller shall afford to Purchaser and its officers and authorized agents and representatives reasonable access during normal business hours to the properties, books, records, contracts, documents, files and other information of or relating to the Assets and the Assumed Liabilities; provided, however, that nothing herein shall afford Purchaser the right to review any information to the extent relating solely to loans held by Seller not constituting Loans, including information regarding borrowers, or any information to the extent relating solely to Seller’s other branches, facilities and operations not subject to this Agreement. Seller shall identify to Purchaser, within fifteen (15) calendar days after the date hereof, a group of its salaried personnel (with the necessary expertise and experience to assist Purchaser) that shall constitute a “transition group” who will be available to Purchaser at reasonable times during normal business hours to provide information and assistance in connection with Purchaser’s investigation of matters relating to the Assets, the Assumed Liabilities and transition matters. Such transition group will also work cooperatively to identify and resolve issues arising from any commingling of Records with Seller’s records for its other branches, assets and operations not subject to this Agreement. Seller shall furnish Purchaser with such additional financial and operating data and other information about its business operations at the Branches as may be reasonably necessary for the orderly transfer of the business operations of the Branches, and Purchaser shall be responsible for any documented, out-of-pocket third party costs reasonably incurred by Seller in connection with furnishing such information; provided, however, that nothing herein shall afford Purchaser the right to review any information relating to loans held by Seller not constituting Loans, including information regarding borrowers or any information relating to Seller’s other branches, facilities and operations not subject to this Agreement. Any investigation pursuant to this Section 7.2(a) shall be conducted in such manner as not to unreasonably interfere with the conduct of Seller’s business. Notwithstanding the foregoing, Seller shall not be required to provide access to or disclose information where such access or disclosure would impose an unreasonable burden on Seller, or any employee of Seller, or would violate or prejudice the rights of customers, jeopardize any attorney-client privilege or contravene any law, rule, regulation, order, judgment, decree, fiduciary duty or binding agreement entered into and disclosed to Purchaser prior to the date of this Agreement. Seller and Purchaser shall use reasonable best efforts to make appropriate substitute disclosure arrangements under circumstances in which the restrictions of the preceding sentence apply.

  • Investigation and Confidentiality (a) Prior to the Effective Time, each Party shall keep the other Party advised of all material developments relevant to its business and to consummation of the Merger and shall permit the other Party to make or cause to be made such investigation of the business and properties of it and its Subsidiaries and of their respective financial and legal conditions as the other Party reasonably requests, provided that such investigation shall be reasonably related to the transactions contemplated hereby and shall not interfere unnecessarily with normal operations. No investigation by a Party shall affect the representations and warranties of the other Party.

  • Access, Information and Confidentiality (i) From the Signing Date until the date on which all of the Preferred Shares have been redeemed in whole, the Company will permit, and shall cause each of the Company’s Subsidiaries to permit, Treasury, the Oversight Officials and their respective agents, consultants, contractors and advisors to (x) examine any books, papers, records, Tax returns (including all schedules attached thereto), data and other information; (y) make copies thereof; and (z) discuss the affairs, finances and accounts of the Company and the Company Subsidiaries with the personnel of the Company and the Company Subsidiaries, all upon reasonable notice; provided, that:

Time is Money Join Law Insider Premium to draft better contracts faster.