Transmitting information securely Clause Samples

Transmitting information securely. When sharing information both the sender and the receiver should deal with the information according to its protective marking. See Appendix 2 for handling requirements in line with information classification. Any e-mail or attachment containing personal data must be sent via a secure encrypted e- mail system. Where the partner does not have access to a secure encrypted e-mail system, the information must be encrypted via some other means, such as Windows password encryption, and the password sent via other means, such as telephone.
Transmitting information securely. When sharing information both the sender and the receiver should deal with the information according to its protective marking. See Appendix 2 for handling requirements in line with protective marking. Lincolnshire Police documents must display the Protective marking at the top and bottom of the relevant text or attachments. Insecure e-mail should not be used for any personalised information. The below secure e-mail addresses may be used for information protectively marked up to and including OFFICIAL - SENSITIVE: a) CJSM b) PNN c) GSI d) GSX

Related to Transmitting information securely

  • Personal Information security breach a) Each Party shall notify the other party in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal information and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal information and to restore the integrity of the affected personal information as quickly as is possible. The Parties shall also be required to provide each other with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal information. b) The Parties shall provide on-going updates on the progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Parties must notify the South African Police Service; and/or the State Security Agency and the Information Regulator and the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Parties undertake to co‑operate in any investigations relating to security which is carried out by or on behalf of the other including providing any information or material in its possession or control and implementing new security measures.

  • Supplying Information Each Purchaser shall deliver such records, documents, information and data to the applicable Seller as such Seller may reasonably request in order to properly and efficiently perform such Seller’s obligations hereunder or under any Serviced Corporate Trust Contract with respect to any Serviced Appointment (for clarity, including in connection with the Seller Group’s governance and reporting mechanisms) or to defend, prosecute, appeal, pursue or cooperate with any judicial, arbitral or regulatory proceeding, audit, claim or investigation to which any Seller or any of its Affiliates is a party with respect to any Serviced Appointment; provided, however, that the Purchasers shall not be required to deliver any records, documents, information or data that (a) in the Purchasers’ reasonable determination could violate applicable Law, or could result in the loss or waiver of any attorney-client, work product or similar legal privilege or (b) in the Purchasers’ reasonable determination could violate any contractual obligation of the Purchaser Group with respect to confidentiality; provided, however, that with respect to clauses (a) and (b), the Sellers and the Purchasers shall cooperate in good faith to put in place appropriate substitute disclosure arrangements, including by using commercially reasonable efforts to obtain the consent of such third party to such access.

  • Furnishing Information (a) No Holder shall use any free writing prospectus (as defined in Rule 405) in connection with the sale of Registrable Securities without the prior written consent of the Company. (b) It shall be a condition precedent to the obligations of the Company to take any action pursuant to Section 4 of this Annex E that the selling Holders and the underwriters, if any, shall furnish to the Company such information regarding themselves, the Registrable Securities held by them and the intended method of disposition of such securities as shall be required to effect the registered offering of their Registrable Securities.

  • Supporting Information The application shall be accompanied by the requested assignment, schedule and rationale.

  • Billing Information 6.1 NLT and the RL shall provide each other with information within their possession that is necessary to allow them to provide accurate and timely billing to each other and to any other relevant third parties.