No Sensitive Information Sample Clauses

The "No Sensitive Information" clause prohibits the sharing or inclusion of confidential or sensitive data within the scope of the agreement or related communications. In practice, this means parties must avoid transmitting personal data, trade secrets, or regulated information such as financial records or health data through the channels or platforms specified in the contract. This clause serves to protect both parties from potential legal liabilities and data breaches by ensuring that only non-sensitive information is exchanged, thereby reducing the risk of unauthorized disclosure or regulatory violations.
No Sensitive Information. YOU AGREE NOT TO USE THE PRODUCT TO COLLECT, MANAGE OR PROCESS SENSITIVE INFORMATION. WE WILL NOT HAVE ANY LIABILITY THAT MAY RESULT FROM YOUR USE OF THE PRODUCT TO COLLECT OR MANAGE SENSITIVE INFORMATION.
No Sensitive Information. YOU AGREE NOT TO USE THE SUBSCRIPTION SERVICE TO COLLECT, MANAGE OR PROCESS SENSITIVE INFORMATION. WE WILL NOT HAVE ANY LIABILITY THAT MAY RESULT FROM YOUR USE OF THE SUBSCRIPTION SERVICE TO COLLECT OR MANAGE SENSITIVE INFORMATION.
No Sensitive Information. Customer will not place the following “Sensitive Information” on the System: (a) personal information relating to an identified or identifiable person; (b) credit or debit card numbers, personal identification numbers (PIN), passwords or other similar information used for payment or to access personal or financial information; (c) patient, medical or other protected health information; (d) genetic data, biometric data, or data about an individual’s criminal history; (e) government-issued personal identification numbers (such as social security numbers, driver’s license numbers, or passport numbers) or (f) classified or technical data controlled by the US International Traffic in Arms Regulations; or (g) materials that require a United States export license, license exception or other United States government authorization. If Customer places any Sensitive Information on the System in violation of this section, Customer will reimburse SAS for any costs associated with its removal.
No Sensitive Information. Customer may not use the Platform to collect, manage, or process Sensitive Information. EnTech specifically disclaims any liability that may result from Customer’s use of the Platform to collect, process, or manage Sensitive Information.
No Sensitive Information. If you use the Subscription Service to collect, manage or process sensitive information, we will not have any liability that may result from your use of the Subscription Service to collect or manage sensitive information.
No Sensitive Information. Unless specifically agreed to by Company in the Services Addendum, Client will not submit to the Services any Client Data that is: (a) patient, medical or other protected health information regulated by the Health Insurance Portability and Accountability Act of 1996; (b) credit, debit or other payment card data subject to PCI DSS; (c) nonpublic personal information subject to regulation or protection under the ▇▇▇▇▇-▇▇▇▇▇-▇▇▇▇▇▇ Act (or related rules or regulations); (d) social security numbers, driver’s license numbers or other government ID numbers; or (e) any information about individuals or other data similar to the foregoing that is protected under foreign or domestic laws or regulations (collectively, and hereinafter referred to as, “Prohibited Data” or “Sensitive Data”). Notwithstanding the foregoing, Client is not prohibited from including any link that contains Prohibited Data stored outside the Services, provided that at no point is Prohibited Data stored in or submitted to the Services. Notwithstanding any other provision to the contrary, Company shall have no liability under the Agreement for any Client Data submitted in violation of this Section 7.9. In the event that Company agrees to Client’s use of the Services to process Sensitive Data, Client warrants that Client and Client’s Users comply with all applicable laws, regulations, and policies, including but not limited to Data Protection Laws. With the exception of Company’s gross negligence, Client agrees to indemnify and hold harmless Company against any and all claims and suits brought by any party, including government agencies, for violations of any laws relating to the protection, handling, storage, and/or processing of Sensitive Data.
No Sensitive Information. CUSTOMER ACKNOWLEDGES THAT THE SUBSCRIPTION SERVICE HAS NOT BEEN DESIGNED TO PROCESS OR MANAGE SENSITIVE INFORMATION (UNLESS EXPRESSLY AGREED BY THE PARTIES) AND ACCORDINGLY, AS APPLICABLE, CUSTOMER AGREES NOT TO USE THE
No Sensitive Information. YOU ACKNOWLEDGE THAT THE SUBSCRIPTION SERVICES HAVE NOT BEEN DESIGNED TO PROCESS OR MANAGE SENSITIVE INFORMATION AND ACCORDINGLY YOU AGREE NOT TO USE THE SUBSCRIPTION SERVICE TO COLLECT, MANAGE OR PROCESS SENSITIVE INFORMATION. WE WILL NOT HAVE AND WE SPECIFICALLY DISCLAIM ANY LIABILITY THAT MAY RESULT FROM YOUR USE OF THE SUBSCRIPTION SERVICE TO COLLECT, PROCESS OR MANAGE SENSITIVE INFORMATION.

Related to No Sensitive Information

  • Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Administrative information Time limit for receipt of tenders or requests to participate

  • Company Information Subscriber understands that the Company is subject to all the risks that apply to early-stage companies, whether or not those risks are explicitly set out in the Offering Circular. Subscriber has had such opportunity as it deems necessary (which opportunity may have presented through online chat or commentary functions) to discuss the Company’s business, management and financial affairs with managers, officers and management of the Company and has had the opportunity to review the Company’s operations and facilities. Subscriber has also had the opportunity to ask questions of and receive answers from the Company and its management regarding the terms and conditions of this investment. Subscriber acknowledges that except as set forth herein, no representations or warranties have been made to Subscriber, or to Subscriber’s advisors or representative, by the Company or others with respect to the business or prospects of the Company or its financial condition.