Confidential Information Security and Recovery Sample Clauses

Confidential Information Security and Recovery 
AutoNDA by SimpleDocs

Related to Confidential Information Security and Recovery

  • Security of Confidential Information Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.

  • Confidential Information and Privacy (a) All non-public, confidential or proprietary information of Service Provider or Customer, as applicable, including, but not limited to, trade secrets, technology, inventions, samples, research, product designs, business plans, implementation plans, processes, document templates, information pertaining to business operations, methodologies, and strategies, and information pertaining to customers, pricing, and marketing (collectively, "Confidential Information"), disclosed by Service Provider or Customer (in such role the “Disclosing Party”) or Disclosing Party’s officers, directors or employees, whether disclosed orally or disclosed or accessed in written, electronic or other form or media, and whether or not marked, designated or otherwise identified as "confidential," in connection with the provision of the Services and this Agreement is confidential, and shall not be disclosed or copied by recipient Customer or Service Provider (in such role the “Recipient”), or Recipient’s officers, directors or employees, without the prior written consent of the Disclosing Party. Confidential Information does not include information that is:

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Protection of Confidential Information The Servicer shall keep confidential and shall not divulge to any party, without the Seller’s prior written consent, any nonpublic information pertaining to the Mortgage Loans or any borrower thereunder, except to the extent that it is appropriate for the Servicer to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies or it is otherwise in accordance with Accepted Servicing Practices.

  • Confidential Information The Executive shall hold in a fiduciary capacity for the benefit of the Company all secret or confidential information, knowledge or data relating to the Company or any of its affiliated companies, and their respective businesses, which shall have been obtained by the Executive during the Executive's employment by the Company or any of its affiliated companies and which shall not be or become public knowledge (other than by acts by the Executive or representatives of the Executive in violation of this Agreement). After termination of the Executive's employment with the Company, the Executive shall not, without the prior written consent of the Company or as may otherwise be required by law or legal process, communicate or divulge any such information, knowledge or data to anyone other than the Company and those designated by it. In no event shall an asserted violation of the provisions of this Section 10 constitute a basis for deferring or withholding any amounts otherwise payable to the Executive under this Agreement.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • E4 Confidential Information E4.1 Except to the extent set out in this clause or where disclosure is expressly permitted elsewhere in this Contract, each Party shall:

  • Treatment of Confidential Information (a) The Parties shall not, and shall cause all other Persons providing Services or having access to information of the other Party that is known to such Party as confidential or proprietary (the “Confidential Information”) not to, disclose to any other Person or use, except for purposes of this Agreement, any Confidential Information of the other Party; provided, however, that the Confidential Information may be used by such Party to the extent that such Confidential Information has been (i) in the public domain through no fault of such Party or any member of such Group or any of their respective Representatives or (ii) later lawfully acquired from other sources by such Party (or any member of such Party’s Group), which sources are not themselves bound by a confidentiality obligation; provided, further, that each Party may disclose Confidential Information of the other Party, to the extent not prohibited by applicable Law: (A) to its Representatives on a need-to-know basis in connection with the performance of such Party’s obligations under this Agreement; (B) in any report, statement, testimony or other submission required to be made to any Governmental Authority having jurisdiction over the disclosing Party; or (C) in order to comply with applicable Law, or in response to any summons, subpoena or other legal process or formal or informal investigative demand issued to the disclosing Party in the course of any litigation, investigation or administrative proceeding. In the event that a Party becomes legally compelled (based on advice of counsel) by deposition, interrogatory, request for documents subpoena, civil investigative demand or similar judicial or administrative process to disclose any Confidential Information of the other Party, such disclosing Party shall provide the other Party with prompt prior written notice of such requirement, and, to the extent reasonably practicable, cooperate with the other Party (at such other Party’s expense) to obtain a protective order or similar remedy to cause such Confidential Information not to be disclosed, including interposing all available objections thereto, such as objections based on settlement privilege. In the event that such protective order or other similar remedy is not obtained, the disclosing Party shall furnish only that portion of the Confidential Information that has been legally compelled, and shall exercise its commercially reasonable efforts (at such other Party’s expense) to obtain assurance that confidential treatment will be accorded such Confidential Information.

  • Disposition of Confidential Information Upon termination of Agreement or request of City, Contractor shall within forty-eight (48) hours return all Confidential Information which includes all original media. Once Contractor has received written confirmation from City that Confidential Information has been successfully transferred to City, Contractor shall within ten (10) business days purge all Confidential Information from its servers, any hosted environment Contractor has used in performance of this Agreement, work stations that were used to process the data or for production of the data, and any other work files stored by Contractor in whatever medium. Contractor shall provide City with written certification that such purge occurred within five (5) business days of the purge.

Time is Money Join Law Insider Premium to draft better contracts faster.