Security Sensitive Information Clause Samples

The Security Sensitive Information clause defines and governs the handling of information that, if disclosed or misused, could compromise the security of a party, system, or process. This clause typically outlines what constitutes security sensitive information, such as passwords, encryption keys, or system vulnerabilities, and sets strict requirements for its protection, including access controls and limitations on sharing. Its core function is to mitigate the risk of unauthorized access or breaches by ensuring that sensitive security-related data is properly safeguarded throughout the duration of the agreement.
Security Sensitive Information. For the purposes of this Agreement, "Security-Sensitive Information" means Confidential Information that DEP designates as security sensitive either orally or by marking the Confidential Information as "security-sensitive information" or with a similar legend denoting its status. Security-Sensitive Information may include, without limitation, technical information, infrastructure information, maps, drawings, research and development activities, and operating procedures. Company shall password protect all Security-Sensitive Information that is stored by Company in electronic format, and will secure such Security-Sensitive Information in a manner agreed to by the DEP Chief Information Officer and any other required DEP personnel. Company will notify DEP in writing in the most expeditious manner possible in case of any misuse or misappropriation of such Security-Sensitive Information that may come to Company’s attention. Notwithstanding anything to the contrary, Company further agrees to comply with all applicable federal, state, local, and foreign data protection laws, and all other applicable regulations and directives in connection with its collection, access, use, storage, disposal, and disclosure of Security-Sensitive Information. Company shall advise each of its employees, agents, consultants, contractors, subcontractors, suppliers, and sub-suppliers who may be exposed to Security-Sensitive Information of their obligation to maintain the confidentiality thereof in perpetuity starting from the date of execution of this Agreement or until DEP allows the disclosure of such Security-Sensitive Information in writing. In addition, Company agrees to cooperate fully and provide any assistance necessary to ensure the confidentiality of such Security-Sensitive Information In no event shall Company transmit, transfer, or otherwise store Confidential Information (including Security-Sensitive Information and Identifying Information) outside of the United States without DEP's prior written approval, which can be withheld, conditioned or withdrawn for any reason. To the fullest extent permitted by law, Company shall not publicize, issue, or disclose any release, statement, or other information relating to the ETL or DEP in any manner, including in advertisements, publications, press releases, articles, websites, social media, or speeches, without DEP's prior written approval, which may be withheld or withdrawn for any reason. Company acknowledges its understanding tha...
Security Sensitive Information. If any submissions contain information considered law enforcement sensitive, Protected Critical Infrastructure Information (PCII), or Sensitive Security Information (SSI), the Subgrantee shall identify, bracket, and mark such information appropriately and handle it according to applicable laws and protocols.
Security Sensitive Information. ATCS and SFMTA infrastructure design documents are Security Sensitive Information. Design Documents, Drawings, ATCS testing and performance specifications (and any other documents that the SMFTA identifies as SSI Documents) that the SFMTA provides to Thales and that Thales creates under this Contract constitute Security Sensitive Information and Critical Infrastructure Information under federal and State law. (See 49 CPR 15 and 1520.) Thales acknowledges that access to the SSI Documents by unauthorized persons or organizations would pose significant risk of grave harm to the SFMTA and public safety.
Security Sensitive Information. 1. All Contract Documents labeled as Sensitive Security Information (SSI) and shall be handled as defined in Title 49 CFR, Parts 15 & 1520. The LAWA ACAMS O&M Provider shall protect all documents and materials that identify LAWA’s security systems and equipment. All such documents and materials shall be uniquely numbered for identification. They shall be kept in locked containers when not in use or during non­ working hours. They shall not be transferred to subcontractors or others without assurances in writing that the same level of protection will be provided. Discarded documents (such as drawings) shall be destroyed by shredding or by other means rendering the document unreadable and precluding the reconstitution of the document to a readable state.