Consequences of Entrustment with Sensitive Information Clause Samples

Consequences of Entrustment with Sensitive Information. Executive recognizes that his position with Company requires considerable responsibility and trust. Relying on Executive’s responsibilities hereunder and undivided loyalty, Company expects to entrust Executive with highly sensitive confidential, restricted, and proprietary information involving Trade Secrets and other intellectual property. Executive should recognize that it could prove very difficult to isolate these Trade Secrets from business activities that Executive might consider pursuing after termination of employment, and in some instances, Executive may not be able to compete with Company in certain ways because of the risk that Company's Trade Secrets might be compromised. Executive is responsible for protecting and preserving Company's proprietary rights for use only for Company's benefit, and these responsibilities may impose unavoidable limitations on Executive’s ability to pursue some kinds of business opportunities that might interest Executive during or after his employment.
Consequences of Entrustment with Sensitive Information. Executive's position with SynQuest requires considerable responsibility and trust. Relying on Executive's ethical responsibility and undivided loyalty, SynQuest expects to entrust Executive with highly sensitive confidential, restricted, and proprietary information involving Trade Secrets (as defined in Section 10.2) and Confidential Information (as defined in Section 10.4
Consequences of Entrustment with Sensitive Information. Executive's position
Consequences of Entrustment with Sensitive Information. You should recognize that your position with Employer requires considerable responsibility and trust. Relying on your ethical responsibility and undivided loyalty, Employer expects to entrust you with highly sensitive confidential, restricted, and proprietary information involving Trade Secrets (as defined in ARTICLE 3.2) and Confidential Information (as defined in ARTICLE 3.
Consequences of Entrustment with Sensitive Information. Employee should recognize that Employee's position with BINDVIEW requires considerable responsibility and trust Relying on Employee's ethical responsibility and undivided loyalty, BINDVIEW expects to entrust Employee with highly sensitive confidential, restricted, and proprietary information involving Trade Secrets (as defined in Section 3.2). Employee should recognize that it could prove very difficult to isolate these Trade Secrets from business activities that Employee might consider pursuing after termination of Employee's employment, and in some instances, Employee may not be able to compete with BINDVIEW in certain ways because of the risk that BINDVIEW's Trade Secrets might be compromised. Employee is legally and ethically responsible for protecting and preserving BINDVIEW's rights for use only for BINDVIEW's benefit, and these responsibilities may, therefore, impose unavoidable limitations on Employee's ability to pursue some kinds of business opportunities that might interest Employee during or after Employee's employment.
Consequences of Entrustment with Sensitive Information. Distributor's relationship with Company requires considerable responsibility and trust. Relying on Distributor's ethical responsibility and undivided loyalty, Company agrees to and expects to entrust Distributor with highly sensitive, confidential, restricted, and proprietary information involving Trade Secrets and Confidential Information (as defined herein). Distributor should recognize that it could prove very difficult to isolate these Trade Secrets and Confidential Information from business activities that Distributor might consider pursuing after termination of Distributor's Services, and in some instances Distributor may not be able to compete with Company in certain ways because of the risk that Company's Trade Secrets and Confidential Information might be compromised. Distributor acknowledges and agrees that Distributor is legally and ethically responsible for protecting and preserving Company's proprietary rights for use only for Company's benefit, and these responsibilities may impose unavoidable limitations on Distributor's ability to pursue some kinds of business opportunities that might interest Distributor during or after Distributor's relationship with Company.
Consequences of Entrustment with Sensitive Information. Executive's position with SynQuest requires considerable responsibility and trust. Relying on
Consequences of Entrustment with Sensitive Information. Consultant should recognizes that Consultant’s relationship with the Company requires considerable responsibility and trust. The Company agrees to and expects to entrust Consultant with highly sensitive confidential, restricted, and proprietary information involving Trade Secrets and Confidential Information (as defined herein). Consultant acknowledges and agrees that Consultant is legally and ethically responsible for protecting and preserving the Company’s proprietary rights for use only for the Company’s benefit, and these responsibilities may impose unavoidable limitations on Consultant’s ability to pursue some kinds of business opportunities that might interest Consultant during or after Consultant’s relationship with the Company.
Consequences of Entrustment with Sensitive Information. Programmer should recognize that Programmer's position with LSG requires considerable responsibility and trust. Relying on Programmer's ethical responsibility and undivided loyalty, LSG expects to entrust Programmer with highly sensitive confidential, restricted, and proprietary information involving Trade Secrets (as defined in Section 3.2). Programmer should recognize that it could prove very difficult to isolate these Trade Secrets from business activities that Programmer might consider pursuing after termination of Programmer's employment, and in some instances, Programmer may not be able to compete with LSG in certain ways because of the risk that LSG's Trade Secrets might be compromised. Programmer is legally and ethically responsible for protecting and preserving LSG's proprietary rights for use only for LSG's benefit, and these responsibilities may impose unavoidable limitations on Programmer's ability to pursue some kinds of business opportunities that might interest Programmer during or after Programmer's employment.

Related to Consequences of Entrustment with Sensitive Information

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Return of material containing or pertaining to the Confidential Information 7.1 The Disclosing Party may, at any time, and in its sole discretion request the Receiving Party to return any material and/or data in whatever form containing, pertaining to or relating to Confidential Information disclosed pursuant to the terms of this Agreement and may, in addition request the Receiving Party to furnish a written statement to the effect that, upon such return, the Receiving Party has not retained in its possession, or under its control, either directly or indirectly, any such material and/or data. 7.2 If it is not practically able to do so, the Receiving Party shall destroy or ensure the destruction of all material and/or data in whatever form relating to the Confidential Information disclosed pursuant to the terms of this Agreement and delete, remove or erase or use best efforts to ensure the deletion, erasure or removal from any computer or database or document retrieval system under its or the Representatives' possession or control, all Confidential Information and all documents or files containing or reflecting any Confidential Information, in a manner that makes the deleted, removed or erased data permanently irrecoverable.The Receiving Party shall furnish the Disclosing Party with a written statement signed by one of its directors or duly authorized senior officers to the effect that all such material has been destroyed. 7.3 The Receiving Party shall comply with any request by the Disclosing Party in terms of this clause, within 7 (seven) business days of receipt of any such request.

  • Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

  • Confidential Information Definition Grantee acknowledges it and its employees or agents may, in the course of performing its responsibilities, be exposed to or acquire information that is: (i) confidential to Agency or Project participants or (ii) the disclosure of which is restricted under federal or state law, including without limitation: (a) personal information, as that term is used in ORS 646A.602(12), (b) social security numbers, and (c) information protected by the federal Family Educational Rights and Privacy Act under 20 USC § 1232g (items (i) and (ii) separately and collectively “Confidential Information”).