SECURITY AND PROTECTION OF INFORMATION Sample Clauses

SECURITY AND PROTECTION OF INFORMATION. D1 Client Data
AutoNDA by SimpleDocs
SECURITY AND PROTECTION OF INFORMATION. 33 13.1 Information (Electronic) Access.......................................... 34 13.2 Personnel Access......................................................... 35 13.3
SECURITY AND PROTECTION OF INFORMATION. The State considers its information and communication capabilities to be a valued and important resource. The State's systems and databases contain private and
SECURITY AND PROTECTION OF INFORMATION. 1. The protection of information exchanged or generated under this Agreement shall be regulated between the Parties through an agreement for the protection of such information.
SECURITY AND PROTECTION OF INFORMATION. The Enterprise User’s User and System Data are private and confidential and are treated as such. Mindset Management takes all reasonable steps to secure and protect such data during hosting and transmission and to ensure that such information is handled in accordance with the Terms. However, it is possible for Internet-based communications to be intercepted or servers to be hacked. Unless otherwise stipulated in the applicable and relevant privacy and protection of information laws, regulations and code that apply to such data in the country of legal domicile of Mindset Management, Mindset Management will not be responsible for any damages the Enterprise User or any third party may suffer as a result of the hosting or transmission of confidential or disclosed information that the User makes to Mindset Management through the Internet, or that the Enterprise User expressly or implicitly authorises Mindset Management to make, or for any errors or any changes made to any transmitted information by unauthorised third parties. To ensure acquaintance with and awareness of the privacy measures and policies of Mindset Management, the Enterprise User is urged to take care to read and understand the underlying privacy clauses incorporated in these Terms.
SECURITY AND PROTECTION OF INFORMATION. The Enterprise User’s User and System Data are private and confidential and are treated as such. Mindset Management takes all reasonable steps to secure and protect such data during hosting and transmission and to ensure that such information is handled in accordance with the Terms. However, it is possible for Internet-based communications to be intercepted or servers to be hacked. Mindset Management will not be responsible for any damages the Enterprise User or any third party may suffer as a result of the hosting or transmission of confidential or disclosed information that the User makes to Mindset Management through the Internet, or that the Enterprise User expressly or implicitly authorises Mindset Management to make, or for any errors or any changes made to any transmitted information. To ensure acquaintance with and awareness of the privacy measures and policies of Mindset Management, the Enterprise User is urged to take care to read and understand the underlying privacy clauses incorporated in these Terms. Using and sharing of information Mindset Management may use and share the User and System Data collected from the Enterprise User in accordance with the Agreement and for the reasons and uses as detailed below: • To provide the Enterprise User with an optimal Engage service and experience; • To provide the Enterprise User with the necessary customer support and assistance where required or requested; • To contact the Enterprise User regarding their account or to update the Enterprise User with respect to changes in prices, policies or the Terms; • To provide the Enterprise User with news and information about products and services. Mindset Management undertakes not to share any of the Enterprise User’s User or Systems Data that are deemed of a personal or private nature. User responses to surveys will be combined with the responses of others and made available as aggregate data. Mindset Management retains the right to transfer the User’s information to a new owner if the ownership of all or substantially all of the business should change, in which case the terms of this Agreement will still apply until the Terms are updated or amended by the acquiring party upon notice to the Enterprise User. Mindset Management may release account information or User Data when deemed, in good faith, that such release is reasonably necessary to (a) comply with law, (b) enforce or apply the terms of any user agreement or
SECURITY AND PROTECTION OF INFORMATION. The Participants will take all lawful steps to ensure that all exercise-related information or material exchanged or generated pursuant to this TA is protected from further disclosure and is not released to any government, national organisation, individual or other entity of a third party without the prior written consent of the originating Participants.
AutoNDA by SimpleDocs
SECURITY AND PROTECTION OF INFORMATION. Security Requirements The Supplier shall comply, and shall procure the compliance of the Staff, with the Security Policy and the Security Management Plan (if any) and the Supplier shall ensure that the Security Management Plan produced by the Supplier fully complies with the Security Policy. The Customer shall notify the Supplier of any changes or proposed changes to the Security Policy. If the Supplier believes that a change or proposed change to the Security Policy will have a material and unavoidable cost implication to the provision of the Services it may notify the Customer. In doing so, the Supplier must support its request by providing evidence of the cause of any increased costs and the steps that it has taken to mitigate those costs. Any change to the Call Off Contract Charges shall then be subject to the Variation Procedure. Until and/or unless a change to the Call Off Contract Charges is agreed by the Customer pursuant to the Variation Procedure the Supplier shall continue to provide the Services in accordance with its existing obligations.
SECURITY AND PROTECTION OF INFORMATION 

Related to SECURITY AND PROTECTION OF INFORMATION

  • Protection of Information E1 Data Protection Xxx X0 Official Secrets Acts 1911, 1989, Section 182 of the Finance Xxx 0000 E3 Confidentiality E4 Freedom of Information E5 Security of Confidential Information E6 Publicity, Media and Official Enquiries E7 Security E8 Intellectual Property Rights and Assigned Deliverables E9 Audit and the National Audit Office

  • Preservation of Information The Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of Certificateholders contained in the most recent list furnished to the Trustee as provided in Section 7.14, and the names and addresses of Certificateholders received by the Trustee in its capacity as Registrar, if so acting. The Trustee may destroy any list furnished to it as provided in Section 7.14, upon receipt of a new list so furnished.

  • Provision of Information (a) For so long as any of the Certificates of any Series or Class are “restricted securities” within the meaning of Rule 144(a)(3) under the Act, each of the Depositor, the Master Servicer and the Trustee agree to cooperate with each other to provide to any Certificateholders, and to any prospective purchaser of Certificates designated by such holder, upon the request of such holder or prospective purchaser, any information required to be provided to such holder or prospective purchaser to satisfy the condition set forth in Rule 144A(d)(4) under the Act. Any reasonable, out-of-pocket expenses incurred by the Trustee in providing such information shall be reimbursed by the Depositor.

  • Dissemination of Information The Borrower authorizes each Lender to disclose to any Participant or Purchaser or any other Person acquiring an interest in the Loan Documents by operation of law (each a "Transferee") and any prospective Transferee any and all information in such Lender's possession concerning the creditworthiness of the Borrower and its Subsidiaries, including without limitation any information contained in any Reports; provided that each Transferee and prospective Transferee agrees to be bound by Section 9.11 of this Agreement.

  • Return of Information Upon written request by the disclosing Party, all of the disclosing Party’s Confidential Information in whatever form shall be returned to the disclosing Party upon termination of this Agreement or destroyed with destruction certified by the receiving Party, without the receiving Party retaining copies thereof except that one copy of all such Confidential Information may be retained by a Party’s legal department for purposes of resolving any dispute that may arise hereunder or for complying with Applicable Law or the rules of any securities exchange applicable to the Party, and the receiving Party shall be entitled to retain any Confidential Information in electronic form stored on automatic computer back-up archiving systems during the period such backup or archived materials are retained under such Party’s customary procedures and policies; provided, however, that any Confidential Information retained by the receiving Party shall be maintained subject to confidentiality pursuant to the terms of this Section 8.6, and such archived or back-up Confidential Information shall not be accessed except as required by Applicable Law.

  • Protection of Trade Secrets The Executive agrees to maintain in strict confidence and, except as necessary to perform his duties for the Employer, the Executive agrees not to use or disclose any Trade Secrets of the Employer during or after his employment. “Trade Secret” means information, including a formula, pattern, compilation, program, device, method, technique, process, drawing, cost data or customer list, that: (i) derives economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

  • Supply of Information Following service of a notice by the Contractor pursuant to clause 16.1 (Notice), the Contractor shall promptly supply to the Authority any further information relating to the delay which:

Time is Money Join Law Insider Premium to draft better contracts faster.