Confidentiality and Information Security Sample Clauses

POPULAR SAMPLE Copied 2 times
Confidentiality and Information Security. Processor shall keep Personal Data strictly confidential and represents that it has implemented adequate physical, technical and organizational measures, which are reasonable based upon the sensitivity of the Personal Data and/or necessary to secure the Personal Data and to prevent unauthorized access, disclosure, alteration or loss of the same in light of the relevant risks presented by the Processing. In particular, such measures shall include, but shall not be limited to: • Preventing access by unauthorized persons to Processing facilities and systems, where Personal Data is Processed or used (physical access control). • Preventing unauthorized use of Processing systems (admission control). • Ensuring that those persons authorized to use a Processing system are only able to access Personal Data within the scope of their access rights, and that Personal Data cannot be read, copied, modified or deleted without authorization during Processing or use and after recording (virtual access control). • Ensuring that, during electronic transfer, transportation or when being saved to data carriers, Personal Data cannot be read, copied, modified or deleted without authorization, and that it is possible to check and establish to which bodies the transfer of Personal Data by means of data transmission facilities is envisaged (transmission control). • Ensuring that it is possible to check and ascertain whether and by whom Personal Data has been accessed, modified or deleted from Processing systems (input control), and ensuring that such access, modification and deletion of Personal Data is, in fact, monitored for any unusual or suspicious activities. • Ensuring that Personal Data Processed under these Terms can only be Processed in accordance with the instructions issued by JCI (assignment control). • Ensuring that Personal Data is protected against accidental malfunctions or loss (availability control). • Ensuring that Personal Data collected for different purposes can be Processed separately (separation control). • Maintaining a process for regularly testing, assessing and evaluating the effectiveness of physical, technical and organizational measures to ensure the security of the Processing. • Ensuring that Processor has developed and implemented appropriate privacy and data protection policies and procedures, and that all Personnel who are involved in Processing the Personal Data have been appropriately trained to Process the Personal Data in accordance with such ...
Confidentiality and Information Security. A. BOSTON FINANCIAL agrees on behalf of itself, its affiliates, its officers and employees, except as provided in Section 19.D. hereof, or as otherwise required by law, BOSTON FINANCIAL will keep confidential all records and data of and information in its possession relating to the Trust or its shareholders or shareholder accounts in any form disclosed to BOSTON FINANCIAL hereunder, including but not limited to any data and information in any form disclosed by the Trust, anyone acting on behalf of the Trust, or the Trust’s customers, prospective customers, or employees to BOSTON FINANCIAL, BOSTON FINANCIAL Personnel or any Subcontractor including Consumer Information (as “Consumer Information” is defined in SEC Regulation S-P) and non-public information which is learned by BOSTON FINANCIAL without the Trust’s intentional disclosure to it. Such information includes all Trust software, specifications, documentation, product proposals, financial information, data, source or object code, documentation, manuals, studies, internally devised technology, system or network architecture or topology, security mechanisms, product or processing capacities, revenues, information relating to the business of the Trust (including internal procedures and policies, businesses plans, and products of the Trust), and all other trade secret, confidential or proprietary information and documentation of the Trust or its customers, prospective customers, employees, directors, outside directors, retirees and their respective spouses and families received in connection with this Agreement (whether or not it is designated as such) (collectively, the “Trust’s Confidential Information”). BOSTON FINANCIAL shall not disclose the same to any person except at the instruction (standing or specific), request or with the consent of the Trust. Notwithstanding the foregoing, BOSTON FINANCIAL shall be permitted in the ordinary course of business to provide such information to third parties providing services to BOSTON FINANCIAL which BOSTON FINANCIAL utilizes in connection with the services BOSTON FINANCIAL provides to the Trust under this Agreement or in accordance with Section 19.D. of this Agreement and where such third parties have entered into confidentiality agreements with BOSTON FINANCIAL that contain provisions at least as restrictive as those contained herein. (1) BOSTON FINANCIAL acknowledges that any unauthorized use, misuse, disclosure or taking of the Trust’s Confidential Informatio...
Confidentiality and Information Security. Employee will apply approved safeguards, in accordance with agency policy, to protect agency or state records from unauthorized disclosure or damage, and will comply with all records and data privacy requirements set forth in state law agency specific policies, and state policies. ● Employee will conduct work at the alternate work location in compliance with all information security standards.
Confidentiality and Information Security. 8.01 You acknowledge that The Freedom of Information and Protection of Privacy Act (“FIPPA") and PHIA each impose obligations on the WCB to collect, use or disclose "personal information" and "personal health information", as those terms are defined in FIPPA and PHIA (collectively called "Personal Information"), in the strictest of confidence, and in accordance with those Acts. In performing the Services under the Agreement, you acknowledge that you may collect, use, or have access to Personal Information. 8.02 While the Agreement is in effect, and at all times thereafter, you agree to treat as confidential all information andmaterials acquired by you, or to which you have been given access, in the course of the performance of the Agreement (collectively called "Confidential Information"), excluding information that is in the public domain (for greater certainty, this does not include information in the public domain which was made public as a result of an unauthorized disclosure by a third party). For the purposes of the Agreement, Personal Information shall be considered to be Confidential Information. 8.03 You agree that during the Term of the Agreement and at all times thereafter: (a) the Personal Information disclosed to you by the WCB may only be used by you in a manner expressly permittedby FIPPA or PHIA (as the case may be); (b) you shall not disclose or permit the disclosure of Confidential Information, or any copies of it, in any format, to any third party without the express prior written consent of the WCB; (c) you shall comply with all directives given to you by the WCB with respect to safeguarding, or otherwise ensuringthe confidentiality, of any Confidential Information disclosed to you by the WCB; (d) you shall ensure that access to the Confidential Information by your Representatives is on a "need-to-know" basis, and that access, when given, shall be to the minimum amount of Confidential Information necessary to accomplish the task; (e) you shall use the Confidential Information only for those purposes that have been expressly permitted by the WCB; (f) you shall not reproduce Confidential Information, in any format, without the express prior written consent of the WCB, provided that you shall be able to reasonably reproduce the Confidential Information for internal use onlyin the normal performance of the Services; (g) you shall ensure that you and your Representatives do not transport or store any Confidential Information outsideof Canada...
Confidentiality and Information Security. (1) SELLER shall keep confidential and secure at all times Personal Data relating to the Data Subjects. (2) SELLER shall take reasonable steps to ensure the reliability of any SELLER personnel who have access to the Personal Data. (3) SELLER shall ensure that all SELLER personnel required to access the Personal Data are informed of the confidential nature of the Personal Data and comply with the obligations set out in this Contract. (4) SELLER shall ensure that none of the its personnel publish, disclose or divulge any of the Personal Data to any third party unless directed in writing to do so by LOCKHEED ▇▇▇▇▇▇.
Confidentiality and Information Security. 5.01 The Parties each acknowledge that certain information made available to the other party hereunder may be deemed nonpublic personal information under the ▇▇▇▇▇-▇▇▇▇▇-▇▇▇▇▇▇ Act, other federal or state privacy laws, as amended from time to time, and the rules and the regulations promulgated thereunder (collectively, the “Privacy Laws”). The Parties hereby agree (i) not to disclose or use such information except as required to carry out their respective duties under this Agreement or as otherwise permitted by law in their ordinary course of business, (ii) to establish and maintain procedures reasonably designed to assure the security and privacy of all such information and (iii) to cooperate with each other and provide reasonable assistance in ensuring compliance with such Privacy Laws to the extent applicable to the Parties. 5.02 The Parties agree to develop, implement and maintain a comprehensive written information security program (the “Security Program”) that contains administrative, technical, and physical safeguards compliant with applicable federal and/or state laws designed to: (i) protect the confidentiality, integrity and availability of non-public personal information; (ii) protect against anticipated threats or hazards to the security, confidentiality, integrity and/or availability of non-public personal information; (iii) protect against any unauthorized access, disclosure or use of non-public personal information; (iv) address computer and network security; (v) address physical security; (vi) address business continuity and disaster recovery, (vii) address a security incident response program and (viii) provide for the secure destruction and disposal of non-public personal information. 5.03 The Parties shall notify the other within forty-eight (48) hours upon learning of an actual or potential security breach involving the unauthorized access to or acquisition of unencrypted electronics non-public personal information or paper copy of non-public personal information or where the potential exists that such information could be compromised.
Confidentiality and Information Security. 13.1 The parties shall keep confidential all information relating to this Agreement or the other par- ty, its business, operations and customers unless such information has become public knowledge (otherwise than in breach of this clause) or disclosure is required by law or a party’s regulatory body or disclosure is made in confidence to a party’s professional advisers. This clause shall survive termination of this Agreement. 13.2 The Service Provider acknowledges that the Borsa Italiana may record telephone calls and emails between the Service Provider and the Borsa Italiana for regulatory or security purposes. 13.3 In storing and processing personal information for the purposes of this Agreement, each Party shall comply with the provisions of the Legislative Decree 196 dated 30 June 2003. Each party agrees to indemnify the other in respect of any claims, demands or losses incurred by the non- defaulting party in respect of any breach of this Article.
Confidentiality and Information Security. 5.1 Each party (the “Receiving Party”) may obtain or learn from the other party (the “Disclosing Party”) in connection with the performance of this Agreement information that is confidential or proprietary to the Disclosing Party (“Confidential Information”). Confidential Information shall not include information that (i) is in the public domain through no fault of or action by the Receiving Party; (ii) was available to the Receiving Party without any known obligation of confidentiality prior to its disclosure hereunder to the Receiving Party; and (iii) was independently developed by the Receiving Party without any access to or use of the Disclosing Party’s Confidential Information. The Receiving Party shall not use Confidential Information or disclose such Confidential Information to any third party except as set forth herein. Without limiting the foregoing, the Receiving Party shall use at least the same degree of care to keep the Disclosing Party’s Confidential Information confidential that it uses with respect to its own confidential information, but in no event less than a reasonable standard of care. The Receiving Party shall promptly notify the Disclosing Party of any actual or suspected misuse of the Disclosing Party’s Confidential Information. The Receiving Party shall limit disclosure of Confidential Information to such party’s Affiliates, and its Affiliates’ directors, officers, employees, contractors, subcontractors, professional advisors, and regulators (collectively, “Representatives”), in each case who have a need to know such Confidential Information, and shall only disclose Confidential Information to such Representatives pursuant to confidentiality agreements or, in the case of the party’s attorneys, auditors, and regulators, their professional or legal obligations of confidentiality, provided that such obligations are at least as protective of Confidential Information as the terms of this Agreement. 5.2 Disclosure of Confidential Information shall not be precluded if disclosure is (i) required by law, regulation, or legal process, or if required by any regulatory agency with jurisdiction over the Receiving Party, or (ii) requested by the Disclosing Party. In the event the Receiving Party is required to make such permitted disclosure, the Receiving Party shall, unless prohibited by law, promptly provide written notice thereof to the Disclosing Party so as to permit the Disclosing Party the opportunity to protect its privileges and interes...
Confidentiality and Information Security. The parties undertake to treat all material information received from the other party as confidential. Each party is responsible for that its employees and advisers comply with the obligations of the party as set forth in the freight forwarding contract. The parties shall take appropriate technical and organizational measures to safeguard the information security of its services and the storage and use of information processed in its information system having regard to the security of the functions, telecommunication, hardware and software as well as the confidentiality and integrity of the data content. All access to the information systems of the removal company or the customer must be conducted in a manner which safeguards the security of the accessed information system. The parties shall exercise reasonable care in observing the obligations above taking into account technology available and the risks and costs involved.
Confidentiality and Information Security. (a) Confidentiality of Agreement. Purchaser and Seller shall employ proper procedures and standards designed to maintain the confidential nature of the terms of this Agreement, except to the extent: (a) the disclosure thereof is reasonably believed by such party to be required in connection with regulatory requirements or other legal requirements relating to its affairs; (b) disclosed to any one or more of such party’s employees, officers, directors, agents, attorneys or accountants who would have access to the contents of this Agreement and such data and information in the normal course of the performance of such person’s duties for such party, to the extent such party has procedures in effect to inform such person of the confidential nature thereof; (c) disclosed in a prospectus, prospectus supplement or private placement memorandum relating to a securitization of the Mortgage Loans by Purchaser (or an affiliate assignee thereof) or to any Person in connection with the resale or proposed resale of all or a portion of the Mortgage Loans by such party in accordance with the terms of this Agreement; or (d) reasonably believed by such party to be necessary for the enforcement of such party’s rights under this Agreement.