Access to Sensitive Information Clause Samples

POPULAR SAMPLE Copied 1 times
Access to Sensitive Information. [Applicable to the extent this Agreement involves access to sensitive information] (i) As used in this part, “sensitive information” refers to information that User has developed at private expense, or that the Government has generated that qualifies for an exception to the Freedom of Information Act, which is not currently in the public domain, and which may embody trade secrets or commercial or financial information, and which may be sensitive or privileged. (ii) To assist NASA in accomplishing management activities and administrative functions, User shall provide the services specified elsewhere in this Agreement. (iii) If performing this Agreement entails access to sensitive information, as defined above, User agrees to – (A) Utilize any sensitive information coming into its possession only for the purposes of performing the services specified in this Agreement, and not to improve its own competitive position in another procurement. (B) Safeguard sensitive information coming into its possession from unauthorized use and disclosure. (C) Allow access to sensitive information only to those employees that need it to perform services under this Agreement. (D) Preclude access and disclosure of sensitive information to persons and entities outside of User’s organization. (E) Train employees who may require access to sensitive information about their obligations to utilize it only to perform the services specified in this Agreement and to safeguard it from unauthorized use and disclosure. (F) Obtain a written affirmation from each employee that he/she has received and will comply with training on the authorized uses and mandatory protections of sensitive information needed in performing this Agreement. (G) Administer a monitoring process to ensure that employees comply with all reasonable security procedures, report any breaches to CASIS, and implement any necessary corrective actions. (iv) User will comply with all procedures and obligations specified in its Organizational Conflicts of Interest Avoidance Plan, which this Agreement incorporates as a compliance document. (v) The nature of the work on this Agreement may subject User and its employees to a variety of laws and regulations relating to ethics, conflicts of interest, corruption, and other criminal or civil matters relating to the award and administration of government contracts. Recognizing that this Agreement establishes a high standard of accountability and trust, the Government will carefully revi...
Access to Sensitive Information. 2.1 Information shall be designated "Sensitive Information" by Micro Focus if in its opinion it is: (A) not publicly available; (B) is commercially sensitive; and (C) might be expected to influence the commercial strategy of Open Text. Micro Focus shall only disclose Sensitive Information to the Confidentiality Team Members to the extent reasonably necessary for the Permitted Purposes. 2.2 However, any such information that does not need to be shared with Open Text itself will instead be designated "Restricted Information" and shall be shared only with the External Antitrust/Regulatory Clean Team (as defined in the PS 30 Letters). For the avoidance of doubt, Restricted Information will not be considered Sensitive Information and shall be disclosed in accordance with the PS 30 Letters only. Please see Section 3 below on Restricted Information. 2.3 Annex 1 sets out an indicative list of information that may, without limitation, be treated as Sensitive Information. Sensitive Information shall be disclosed in a manner which is accessible only by the relevant Confidentiality Team Members and/or by communications clearly marked with "Confidentiality Team Only'' or "Sensitive Information". 2.4 Open Text shall limit access to Sensitive Information received from Micro Focus to the Confidentiality Team Members only. Open Text shall procure that its advisers who may have access to Sensitive Information do not disclose the Sensitive Information to any person who is not a Confidentiality Team Member. 2.5 No Confidentiality Team Member will disclose relevant Sensitive Information to anyone other than another relevant Confidentiality Team Member or use any Sensitive Information for any purpose other than for the Permitted Purposes. If either Party becomes aware of an actual or potential breach of any term of this Agreement it shall inform the other Party without delay of such actual or potential breach and take such action as may reasonably be required to mitigate any consequences of the actual or potential breach. 2.6 The Confidentiality Team can report to other Open Text personnel any conclusions or findings from the Sensitive Information on a strictly need to know basis for the Permitted Purposes provided that Open Text's internal or external legal advisers have confirmed, prior to any such reports being shared outside the Confidentiality Team, that any Sensitive Information has been omitted, redacted, anonymised or sufficiently obscured from such reports so as to ren...
Access to Sensitive Information. Data Center shall require its employees, contractors and agents who have, or may be expected to have, access to Sensitive Information to comply with the provisions of the Agreement, including this Exhibit and any confidentiality agreement(s) binding upon Data Center. Data Center will remain responsible for any breach of this Exhibit by its employees, contractors, and agents.
Access to Sensitive Information a. Work under this contract may involve access to sensitive information, as described in paragraph d below, which shall not be disclosed by the contractor unless authorized by the contracting officer. To protect sensitive information, the contractor shall provide training to any contractor employee authorized access to sensitive information and, upon request of the Government, provide information as to an individual's suitability to have such authorization. Contractor employees found by the Government to be unsuitable or whose employment is deemed contrary to the public interest or inconsistent with the best interest of national security may be prevented from performing work under the particular contract when requested by the contracting officer. b. The contractor shall ensure that contractor employees are: (1) citizens of the United States of America or an alien who has been lawfully admitted for permanent residence or employment (indicated by immigration status) as evidenced by Immigration and Naturalization Service documentation; and (2) have background investigations in accordance with DOT Order 1630.2B, Personnel Security Management. DTRT57-05-R-20120 c. The contractor shall include the above requirements in any subcontract awarded involving access to Government facilities, sensitive information, and/or resources. d. Sensitive Information is proprietary data or other information that, if subject to unauthorized access, modification, loss or misuse could adversely affect national interest, conduct of Federal programs, or privacy of individuals specified in the Privacy Act, but has not been specifically authorized to be kept secret in the interest of national defense or foreign policy under an Executive Order or Act of Congress."
Access to Sensitive Information. All Agreements and work under this Agreement where sensitive information is accessed.

Related to Access to Sensitive Information

  • Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.

  • Access to Company Information (a) During the period from the date of this Agreement to the Effective Time, the Company shall permit representatives of the Parent to have reasonable access (at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Company) to all premises, properties, financial and accounting records, contracts, other records and documents, and personnel, of or pertaining to the Company. (b) The Parent and each of its Subsidiaries (i) shall treat and hold as confidential any Company Confidential Information (as defined below), (ii) shall not use any of the Company Confidential Information except in connection with this Agreement, and (iii) if this Agreement is terminated for any reason whatsoever, shall return to the Company all tangible embodiments (and all copies) thereof which are in its possession. For purposes of this Agreement, “Company Confidential Information” means any information of the Company that is furnished to the Parent or any of its Subsidiaries by the Company in connection with this Agreement; provided, however, that it shall not include any information (A) which, at the time of disclosure, is available publicly other than as a result of non-permitted disclosure by the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (B) which, after disclosure, becomes available publicly through no fault of the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (C) which the Parent or any of its Subsidiaries knew or to which the Parent or any of its Subsidiaries had access prior to disclosure, as demonstrated by competent evidence, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company, or (D) which the Parent or any of its Subsidiaries rightfully obtains from a source other than the Company, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.