Confidential Information Requiring Special Handling Sample Clauses

Confidential Information Requiring Special Handling. Category 4 Data is information that is specifically protected from disclosure and for which: • Especially strict handling requirements are dictated, such as by statutes, regulations, or agreements; • Serious consequences could arise from unauthorized disclosure, such as threats to health and safety, or legal sanctions.
AutoNDA by SimpleDocs
Confidential Information Requiring Special Handling. Confidential information requiring special handling is information that is specifically protected from disclosure by law and for which:
Confidential Information Requiring Special Handling information that is specifically protected from disclosure by law and for which especially strict handling requirements are dictated, such as by statutes, regulations, or agreements; or serious consequences could arise from unauthorized disclosure, such as threats to health and safety, or legal sanctions. Information received under this contract may be Confidential Information Requiring Special Handling. CONTRACTOR agrees to protect all material and information, other than Public Information, obtained under this contract as Confidential Information, unless notified by the AGENCY in writing to treat the material or information with lessened or heightened protections. CONTRACTOR will not make use of material and information for any purpose other than the performance of this contract. CONTRACTOR will release information obtained under this contract, other than Public Information, only to authorized employees, agents, or subcontractors, requiring such information for the purposes of carrying out this contract, and only after such persons have signed the nondisclosure agreement provided to the CONTRACTOR by the AGENCY. CONTRACTOR will not release, divulge, publish, transfer, sell, disclose, or otherwise make the material and information known to any other party, person or entity except as provided in this contract. CONTRACTOR agrees to implement physical, electronic, and managerial safeguards to prevent unauthorized access, use, disclosure, modification or loss to material and information collected, used, or acquired in connection with this Contract. All Confidential Information, and information treated as Confidential Information, stored by the CONTRACTOR will be encrypted using industry standard algorithms or cryptographic modules validated by the National Institute of Standards and Technology (NIST). Confidential Information transmitted by the CONTRACTOR to the AGENCY or to any employee, agent, or subcontractor under this agreement must be made using a method that ensures:
Confidential Information Requiring Special Handling. Confidential information requiring special handling is information that is specifically protected from disclosure by law and for which: Especially strict handling requirements are dictated, such as by statutes, regulations, or agreements; Serious consequences could arise from unauthorized disclosure, such as threats to health and safety, or legal sanctions. Constraints on Use of Data The Data being shared is owned by the Disclosing Party that created it. In some cases, the Data may represent Confidential Information of multiple Disclosing Parties. This DSA does not constitute a release of the Data for the Receiving Party’s discretionary use. Receiving Party must use the Data received or accessed under this DSA only to carry out the purpose and justification of this agreement as set out in section 2, Purpose and Authority for Data Sharing. Any analysis, use, or reporting that is not within the Purpose of this DSA is not permitted. Any disclosure of Data contrary to this DSA is unauthorized and is subject to penalties identified in law. Security of Data Data Protection The Receiving Party must protect and maintain all Confidential Information gained by reason of this DSA against unauthorized use, access, disclosure, modification or loss. This duty requires the Receiving Party to employ reasonable security measures, which include restricting access to the Confidential Information by: Allowing access only to staff that have an authorized business requirement to view the Confidential Information. Physically securing any computers, documents, or other media containing the Confidential Information. Data Security Standards Receiving Party must comply with the Data Security Requirements set out in [Include Exhibit with agency-specific security requirements, if applicable. Consider at least data segregation, transmission, encryption and disposal.] and the Washington OCIO Security Standard No. 141.10. The Security Standard 141.10 is hereby incorporated by reference into this DSA. Data Disposition Upon request or when no longer needed, Confidential Information/Data must be securely disposed of as [Agreed by the parties. Include disposal requirements as part of security requirements, if applicable. Consider methods for paper and electronic information, as well as when it may impossible to immediately destroy data (for example, when complete destruction would require destroying network disks)], except as required to be maintained for compliance with the law or accountin...
Confidential Information Requiring Special Handling. For all Confidential Data to be electronically stored, processed, or transmitted, Licensee shall apply the following requirements:
Confidential Information Requiring Special Handling. 1.1.2. The CSHCD SCRBH shall protect all Personal Information, records, and data from unauthorized disclosure in accordance with 42 CFR §431.300 through §431.307, RCWs 70.02, 71.05, 71.34, and for Individuals receiving substance use disorder (SUD) treatment services, in

Related to Confidential Information Requiring Special Handling

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Treatment of Confidential Information (a) The Parties shall not, and shall cause all other Persons providing Services or having access to information of the other Party that is known to such Party as confidential or proprietary (the “Confidential Information”) not to, disclose to any other Person or use, except for purposes of this Agreement, any Confidential Information of the other Party; provided, however, that the Confidential Information may be used by such Party to the extent that such Confidential Information has been (i) in the public domain through no fault of such Party or any member of such Group or any of their respective Representatives or (ii) later lawfully acquired from other sources by such Party (or any member of such Party’s Group), which sources are not themselves bound by a confidentiality obligation; provided, further, that each Party may disclose Confidential Information of the other Party, to the extent not prohibited by applicable Law: (A) to its Representatives on a need-to-know basis in connection with the performance of such Party’s obligations under this Agreement; (B) in any report, statement, testimony or other submission required to be made to any Governmental Authority having jurisdiction over the disclosing Party; or (C) in order to comply with applicable Law, or in response to any summons, subpoena or other legal process or formal or informal investigative demand issued to the disclosing Party in the course of any litigation, investigation or administrative proceeding. In the event that a Party becomes legally compelled (based on advice of counsel) by deposition, interrogatory, request for documents subpoena, civil investigative demand or similar judicial or administrative process to disclose any Confidential Information of the other Party, such disclosing Party shall provide the other Party with prompt prior written notice of such requirement, and, to the extent reasonably practicable, cooperate with the other Party (at such other Party’s expense) to obtain a protective order or similar remedy to cause such Confidential Information not to be disclosed, including interposing all available objections thereto, such as objections based on settlement privilege. In the event that such protective order or other similar remedy is not obtained, the disclosing Party shall furnish only that portion of the Confidential Information that has been legally compelled, and shall exercise its commercially reasonable efforts (at such other Party’s expense) to obtain assurance that confidential treatment will be accorded such Confidential Information.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Return of Confidential Information Upon termination or expiration of this Agreement, the Receiving Party shall return all copies of the Disclosing Party’s confidential information (with the exception of 1 archival copy for the purpose of compliance with these obligations) or remove same from all media and destroy same.

  • Definition of Confidential Information The term “Confidential Information” shall mean all information that either party discloses (a “Disclosing Party”) to the other party (a “Receiving Party”), whether in writing, electronically, or orally and in any form (tangible or intangible), that is confidential, proprietary, or relates to clients or shareholders (each either existing or potential). Confidential Information includes, but is not limited to:

  • Release of Confidential Information No Party shall release or disclose Confidential Information to any other person, except to its Affiliates (limited by FERC Standards of Conduct requirements), subcontractors, employees, consultants, or to parties who may be considering providing financing to or equity participation with Developer, or to potential purchasers or assignees of a Party, on a need-to-know basis in connection with this Agreement, unless such person has first been advised of the confidentiality provisions of this Article 22 and has agreed to comply with such provisions. Notwithstanding the foregoing, a Party providing Confidential Information to any person shall remain primarily responsible for any release of Confidential Information in contravention of this Article 22.

  • Required Confidential Information Status Form CONFIDENTIAL INFORMATION SUBMITTED IN RESPONSE TO COMPETITIVE PROCUREMENT REQUESTS OF EDUCATION SERVICE CENTER REGION 8 AND TIPS (ESC8) IS GOVERNED BY TEXAS GOVERNMENT CODE, CHAPTER 552 If you consider any portion of your proposal to be confidential information and not subject to public disclosure pursuant to Chapter 552 Texas Gov't Code or other law(s), you must attach a copy of all claimed confidential materials within your proposal and put this COMPLETED form as a cover sheet to said materials then scan, name “CONFIDENTIAL” and upload with your proposal submission. (You must include all the confidential information in the submitted proposal. The copy uploaded is to indicate which material in your proposal, if any, you deem confidential in the event the receives a Public Information Request.) ESC8 and TIPS will follow procedures of controlling statute(s) regarding any claim of confidentiality and shall not be liable for any release of information required by law. Upon your claim and your defense to the Office of Texas Attorney General is required to make the final determination whether the information submitted by you and held by ESC8 and TIPS is confidential and exempt from public disclosure. American Technologies, Inc. Name of company Xxxxxxx Xxxxxxxxx - Administrative Services Director Printed Name and Title of authorized company officer declaring below the confidential status of material 0000 X. Xx Xxxxx Ave Anaheim CA 92806 (800) 400-9353 Address City State ZIP Phone I DO CLAIM parts of my proposal to be confidential and DO NOT desire to expressly waive a claim of confidentiality of all information contained within our response to the solicitation. The attached contains material from our proposal that I classify and deem confidential under Texas Gov't Code Sec. 552 or other law(s) and I invoke my statutory rights to confidential treatment of the enclosed materials. ATTACHED ARE COPIES OF PAGES OF CLAIMED CONFIDENTIAL MATERIAL FROM OUR PROPOSAL THAT WE DEEM TO BE NOT PUBLIC INFORMATION AND WILL DEFEND THAT CLAIM TO THE TEXAS ATTORNEY GENERAL IF REQUESTED WHEN A PUBLIC INFORMAITON REQUEST IS MADE FOR OUR PROPOSAL. Signature Date OR I DO NOT claim any of my proposal to be confidential, complete the section below only.

Time is Money Join Law Insider Premium to draft better contracts faster.