Confidentiality Practices Sample Clauses

The Confidentiality Practices clause establishes the obligation of parties to protect and not disclose sensitive information shared during the course of their relationship. Typically, this clause outlines what constitutes confidential information, the duration of the confidentiality obligation, and any exceptions, such as disclosures required by law or information already in the public domain. Its core function is to safeguard proprietary or private data, ensuring that valuable or sensitive business information is not misused or exposed to unauthorized parties.
Confidentiality Practices. Each of Talecris and CHR represents and warrants that it has implemented, and will use in the provision of the Product or Services, business practices, technology, operating procedures and methodologies consistent with industry best practices to prevent the disclosure or distribution of the other’s Confidential Information in any form or manner not specifically authorized or requested by the other, including without limitation distributing any of the other’s Confidential Information in a form or manner that is not approved by the other in advance, and sending any of the other’s Confidential Information to third parties.
Confidentiality Practices. Recipient shall only be required to use reasonable efforts to protect the confidentiality of the Discloser’s Confidential Information in a manner consistent with the efforts used by Recipient to protect its own Confidential Information. Company acknowledges that University is an educational and research institution with practices for protection of confidential information which may differ from Company’s standards and practices.
Confidentiality Practices. The Company has maintained commercially reasonable practices to maintain the confidentiality of and otherwise protect and enforce the Company’s rights in its proprietary information, confidential information, trade secrets, and any confidential information provided by any other Person to the Company. Without limiting the foregoing, except as described in Schedule 3.16(j), all current and former employees and consultants of Company and other Persons involved in the development of Company Intellectual Property have entered into an agreement regarding confidentiality and assignment of Intellectual Property sufficient to transfer to Company ownership of all right, title and interest in Company Intellectual Property. In each case in which Company has acquired any Intellectual Property from any Person, Company has obtained a valid and enforceable assignment sufficient to irrevocably transfer all rights in such Intellectual Property to Company.
Confidentiality Practices. Buyer’s policies with respect to maintaining the confidentiality and nondisclosure of consumer personal identification information and patient records are at least as protective of consumers’ and patients’ rights and information as the Seller’s policies or, if Buyer does not have such policies in place as of the Closing Date, Buyer shall adopt Seller’s policies.
Confidentiality Practices. Appropriate confidentiality was maintained throughout the entirety of the project. When identifying participants to be interviewed, the PI made sure to explain the purpose of the project and privacy procedures to participants to ensure participant comprehension of project goals and procedures. Prior to beginning the interview, the PI noted that all participant answers would remain confidential and that all recordings would be destroyed upon project completion. Participants were informed that they were not obligated to participate and that they could end the interview at any time without penalty and their answers would be discarded. The interviewer also noted that participants could choose not to answer any and all of questions posed in the interview. Permission to record interview responses was obtained prior to any interview using verbal consent and a specified VA audio consent form. Participants were assigned a unique identifier that was used throughout the project. Other identifying information was removed during the transcription process. All digital data were stored on password-protected computers and kept in locked spaces when not in use. All hard-copy data were also stored in locked spaces at the Atlanta VAMC when not in use.
Confidentiality Practices. Recipient shall only be required to use reasonable efforts to protect the confidentiality of the Discloser’s Confidential Information in a manner consistent with the efforts used by Recipient to protect its own Confidential Information.
Confidentiality Practices. Definition of Confidential Information: The term

Related to Confidentiality Practices

  • Confidentiality/Privacy FTIS shall keep the Confidential Information (as defined in Section 16(a) below) of the Investment Company in confidence and will not use or disclose or allow access to or use of such Confidential Information except (A) as appropriate in connection with activities contemplated by this Agreement; (B) as required pursuant to a court order, subpoena, governmental or regulatory or self-regulatory authority or agency, law, regulation, or binding discovery request in pending litigation (provided the receiving party will provide the other party written notice of such requirement, to the extent such notice is permitted, and subject to proper jurisdiction, if applicable); (C) as requested by a governmental, regulatory or self-regulatory authority or agency in connection with an inquiry, examination, audit or other review; or (D) the information or data is relevant and material to any claim or cause of action between the parties or the defense of any claim or cause of action asserted against FTIS.

  • Confidentiality Requirements Employees shall comply with all confidentiality requirements imposed by agency policy, federal or state law, federal regulation, or administrative rule, including rules or codes of conduct governing attorney conduct as promulgated by the Supreme Court of the State of Florida, or the Florida Bar or other professional certification or regulatory body that governs the ability of an employee to practice his particular profession.

  • CONFIDENTIALITY & DATA PROTECTION Subject to the Texas Public Information Act and any similar legal requirements, neither Party shall disclose any confidential information obtained from the other Party without such Party's prior written approval. As applicable, Contractor shall maintain and process all information it receives in compliance with all applicable data protect/privacy laws and regulations and University policies.

  • CONFIDENTIALITY; PROPRIETARY RIGHTS 3.1 Each party (the “Receiving Party”) understands that the other party (the “Disclosing Party”) has disclosed or may disclose business, technical or financial information relating to the Disclosing Party’s business (hereinafter referred to as “Proprietary Information” of the Disclosing Party). Proprietary Information of Provider includes non-public information regarding features, functionality and performance of the Network. The Receiving Party agrees: (i) to take reasonable precautions to protect the Proprietary Information of the Disclosing Party; and (ii) not to use (except in performance of the Network or as otherwise permitted herein) or divulge to any third person the Proprietary Information of the Disclosing Party. The Disclosing Party agrees that the foregoing shall not apply with respect to any information after five (5) years following the disclosure thereof or any information that the Receiving Party can document: (a) is or becomes generally available to the public; (b) was in its possession or known by it prior to receipt from the Disclosing Party; (c) was rightfully disclosed to it without restriction by a third party; (d) was independently developed without use of any Proprietary Information of the Disclosing Party; or (e) is required to be disclosed by law. 3.2 Provider shall own and retain all right, title and interest in and to (a) the Network and Software, all improvements, enhancements or modifications thereto, (b) any software, applications, inventions or other technology developed in connection with the Network or support, and (c) all intellectual property rights related to any of the foregoing. 3.3 Subscriber hereby grants Provider a royalty-free, worldwide, transferable, sublicenseable, irrevocable, perpetual license to use or incorporate into the Network and/or Software any suggestions, enhancement requests, recommendations, correction or other feedback provided by Subscriber, including Users, relating to the functionality and/or operation of the Network and/or Software. 3.4 Notwithstanding anything to the contrary, Provider shall have the right to collect and analyze data and other information relating to the provision, use and performance of various aspects of the Network and related systems and technologies, and Provider shall also have the right (during and after the Term hereof) to (a) use such information and data to improve and enhance the Network and for other development, diagnostic and corrective purposes in connection with the Network and other Provider offerings, and (b) disclose such data, so long as it doesn’t otherwise disclose the Proprietary Information of Subscriber. 3.5 No rights or licenses are granted except as expressly set forth herein.