Use of Territory Information by Training Provider Sample Clauses

Use of Territory Information by Training Provider. (1) Except as provided in this Agreement, the Training Provider must not disclose Territory Information to any person, nor deal with Territory Information in any way except for the purpose of this Agreement, without the prior written consent of the Territory except to the extent that the Territory Information is:
AutoNDA by SimpleDocs
Use of Territory Information by Training Provider. Except as provided in this Agreement, the Training Provider must not disclose Territory Information to any person, nor deal with Territory Information in any way except for the purpose of this Agreement, without the prior written consent of the Territory except to the extent that the Territory Information is: required or authorised to be disclosed by Law; disclosed to the Training Provider’s solicitors, auditors, insurers or advisers; generally available to the public; or in the possession of the Training Provider without restriction in relation to disclosure before the date of receipt from the Territory. The Training Provider must take all reasonable measures to ensure that Territory Information accessed or held by it in connection with this Agreement is protected against loss, unauthorised access, use, modification, disclosure or other misuse in accordance with reasonable procedures for that purpose and that only its authorised personnel have access to Territory Information. The Training Provider must do all things necessary to ensure that Territory Information accessible to the Training Provider and the Training Provider’s personnel by virtue of the performance of this Agreement is not accessed, published or communicated in any way, including imposing upon the Training Provider’s personnel obligations of confidentiality with respect to Territory Information. In respect of any Personal Information held in connection with this Agreement, the Training Provider must: comply with the TPPs and any applicable TPP Code as if the Training Provider wasa public sector agency and must not (and procure that any subcontractor engaged by the Training Provider under this Agreement does not) act or engage in a practice that breaches a TPP or a TPP Code; and co-operate with any reasonable requests or directions of the Territory arising directly from, or in connection with, the exercise of the functions of the information privacy commissioner under the Information Privacy Act.

Related to Use of Territory Information by Training Provider

  • Directory Information Within one week of completion, the Board shall provide the Association with a list of the names, addresses, telephone numbers and building assignments for all bargaining unit members. In addition, the contractual status of all bargaining unit members and the date of expiration of limited contracts shall be provided.

  • Contractor Sensitive Information 17.1 The Authority must:

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Use of Confidential Information The parties agree that during the term of this Agreement and thereafter, Confidential Information is to be used solely in connection with satisfying their obligations pursuant to this Agreement, and that a party shall neither disclose Confidential Information to any third party, nor use Confidential Information for its own benefit, except as may be necessary to perform its obligations pursuant to this Agreement or as expressly authorized in writing by the other party, as the case may be. Neither party shall disclose any Confidential Information to any other persons or entities, except on a “need to know” basis and then only: (i) to their own employees and Agents (as defined below); (ii) to their own accountants and legal representatives, provided that any such representatives shall be subject to subsection(iv) below; (iii) to their own affiliates, provided that such affiliates shall be restricted in use and redisclosure of the Confidential Information to the same extent as the parties hereto. “Agents”, for purposes of this Section, mean each of the parties’ advisors, directors, officers, employees, contractors, consultants affiliated entities (i.e., an entity controlling, controlled by, or under common control with a party), or other agents. If and to the extent any Agent of the recipient receive Confidential Information, such recipient party shall be responsible for such Agent’s full compliance with the terms and conditions of this Agreement and shall be liable for any such Agent’s non-compliance.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

  • Confidential Information The Executive shall hold in a fiduciary capacity for the benefit of the Company all secret or confidential information, knowledge or data relating to the Company or any of its affiliated companies, and their respective businesses, which shall have been obtained by the Executive during the Executive's employment by the Company or any of its affiliated companies and which shall not be or become public knowledge (other than by acts by the Executive or representatives of the Executive in violation of this Agreement). After termination of the Executive's employment with the Company, the Executive shall not, without the prior written consent of the Company or as may otherwise be required by law or legal process, communicate or divulge any such information, knowledge or data to anyone other than the Company and those designated by it. In no event shall an asserted violation of the provisions of this Section 10 constitute a basis for deferring or withholding any amounts otherwise payable to the Executive under this Agreement.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

Time is Money Join Law Insider Premium to draft better contracts faster.