Sentences with phrase «confidential information through»

We serve to protect trade secrets and confidential information through various means, including confidentiality and intellectual property assignment agreements, employee non-solicitation provisions, and other restrictive covenants.
Note: Please do not send us unsolicited confidential information through this form.
In cases where confidentiality of sensitive information is a concern, erring on the side of caution is important since, unlike superior courts, which can prevent misuse of confidential information through court order, professional regulatory bodies have no express power to control what complainants do with information once in their possession.
He oversaw investigations and prosecutions involving significant cyber breaches of personal and financial data, sales of the use of «botnets,» cyber frauds committed against multinational corporations, and insider trading schemes that obtained confidential information through cyber breaches.
Crowley Fleck attorneys assist clients in protecting their trade secrets and other confidential information through the use of appropriate nondisclosure agreements, employee manuals / policies, and employment / independent contractor agreements (including customer non-solicitation provisions).
This means you can't breach the agreement, encourage others to breach it, or allow others to access the confidential information through improper or unconventional methods.

Not exact matches

Actual results, including with respect to our targets and prospects, could differ materially due to a number of factors, including the risk that we may not obtain sufficient orders to achieve our targeted revenues; price competition in key markets; the risk that we or our channel partners are not able to develop and expand customer bases and accurately anticipate demand from end customers, which can result in increased inventory and reduced orders as we experience wide fluctuations in supply and demand; the risk that our commercial Lighting Products results will continue to suffer if new issues arise regarding issues related to product quality for this business; the risk that we may experience production difficulties that preclude us from shipping sufficient quantities to meet customer orders or that result in higher production costs and lower margins; our ability to lower costs; the risk that our results will suffer if we are unable to balance fluctuations in customer demand and capacity, including bringing on additional capacity on a timely basis to meet customer demand; the risk that longer manufacturing lead times may cause customers to fulfill their orders with a competitor's products instead; the risk that the economic and political uncertainty caused by the proposed tariffs by the United States on Chinese goods, and any corresponding Chinese tariffs in response, may negatively impact demand for our products; product mix; risks associated with the ramp - up of production of our new products, and our entry into new business channels different from those in which we have historically operated; the risk that customers do not maintain their favorable perception of our brand and products, resulting in lower demand for our products; the risk that our products fail to perform or fail to meet customer requirements or expectations, resulting in significant additional costs, including costs associated with warranty returns or the potential recall of our products; ongoing uncertainty in global economic conditions, infrastructure development or customer demand that could negatively affect product demand, collectability of receivables and other related matters as consumers and businesses may defer purchases or payments, or default on payments; risks resulting from the concentration of our business among few customers, including the risk that customers may reduce or cancel orders or fail to honor purchase commitments; the risk that we are not able to enter into acceptable contractual arrangements with the significant customers of the acquired Infineon RF Power business or otherwise not fully realize anticipated benefits of the transaction; the risk that retail customers may alter promotional pricing, increase promotion of a competitor's products over our products or reduce their inventory levels, all of which could negatively affect product demand; the risk that our investments may experience periods of significant stock price volatility causing us to recognize fair value losses on our investment; the risk posed by managing an increasingly complex supply chain that has the ability to supply a sufficient quantity of raw materials, subsystems and finished products with the required specifications and quality; the risk we may be required to record a significant charge to earnings if our goodwill or amortizable assets become impaired; risks relating to confidential information theft or misuse, including through cyber-attacks or cyber intrusion; our ability to complete development and commercialization of products under development, such as our pipeline of Wolfspeed products, improved LED chips, LED components, and LED lighting products risks related to our multi-year warranty periods for LED lighting products; risks associated with acquisitions, divestitures, joint ventures or investments generally; the rapid development of new technology and competing products that may impair demand or render our products obsolete; the potential lack of customer acceptance for our products; risks associated with ongoing litigation; and other factors discussed in our filings with the Securities and Exchange Commission (SEC), including our report on Form 10 - K for the fiscal year ended June 25, 2017, and subsequent reports filed with the SEC.
As a consequence of this interconnected style of doing business, companies are at greater risk of having confidential information spill into the outside world, either accidentally or through some form of data theft.
If you are not a current client of Mintz Levin, please do not send any confidential information to us through this web site or otherwise concerning any potential or actual legal matter you have.
If we terminate Mr. Drexler's employment without cause or he terminates his employment with good reason, Mr. Drexler will be entitled to receive (i) a payment of his earned but unpaid annual base salary through the termination date, any accrued vacation pay and any un-reimbursed expenses, and (ii) subject to Mr. Drexler's execution of a valid general release and waiver of claims against us, as well as his compliance with the non-competition, non-solicitation and confidential information restrictions described below, (a) a payment equal to his annual base salary and target cash incentive award, one - half of such payment to be paid on the first business day that is six (6) months and one (1) day following the termination date and the remaining one - half of such payment to be paid in six equal monthly installments commencing on the first business day of the seventh calendar month following the termination date, (b) a payment equal to the product of (x) the last annual cash incentive award Mr. Drexler received prior to the termination date and (y) a fraction, the numerator of which is the number of days of service completed by Mr. Drexler in the year of termination and the denominator of which is 365, such amount to be paid on the first business day that is six (6) months and one (1) day following the termination date, and (c) the immediate vesting of such portion of unvested restricted shares and stock options as provided and pursuant to the terms of the relevant grant agreements under our 2003 Equity Incentive Plan.
Any information gained through the use of the «Support» feature will be considered confidential and only accessible by our employees.
Confidential, personally identifiable information is not available through Fidelity Access; however, if you want to provide that information on your own — and at your own risk — to a third - party financial website or application, you are free to do so.
The remedies listed in the agreement include the payment of $ 1 million per breach of the agreement (Daniels is also required to hand over money she earns through disclosing confidential information about Trump).
In this agreement, «Confidential Information» means all confidential information relating to a party or its business, strategies, pricing, personnel, suppliers, products or services, but excludes information that the recipient proves: (a) was lawfully in its possession before receiving it from the discloser, (b) was provided in good faith to it by a third party without breaching any of discloser's rights or any rights of a third party, or (c) is or becomes generally available to the public through no fault of thConfidential Information» means all confidential information relating to a party or its business, strategies, pricing, personnel, suppliers, products or services, but excludes information that the recipient proves: (a) was lawfully in its possession before receiving it from the discloser, (b) was provided in good faith to it by a third party without breaching any of discloser's rights or any rights of a third party, or (c) is or becomes generally available to the public through no fault of theInformation» means all confidential information relating to a party or its business, strategies, pricing, personnel, suppliers, products or services, but excludes information that the recipient proves: (a) was lawfully in its possession before receiving it from the discloser, (b) was provided in good faith to it by a third party without breaching any of discloser's rights or any rights of a third party, or (c) is or becomes generally available to the public through no fault of thconfidential information relating to a party or its business, strategies, pricing, personnel, suppliers, products or services, but excludes information that the recipient proves: (a) was lawfully in its possession before receiving it from the discloser, (b) was provided in good faith to it by a third party without breaching any of discloser's rights or any rights of a third party, or (c) is or becomes generally available to the public through no fault of theinformation relating to a party or its business, strategies, pricing, personnel, suppliers, products or services, but excludes information that the recipient proves: (a) was lawfully in its possession before receiving it from the discloser, (b) was provided in good faith to it by a third party without breaching any of discloser's rights or any rights of a third party, or (c) is or becomes generally available to the public through no fault of theinformation that the recipient proves: (a) was lawfully in its possession before receiving it from the discloser, (b) was provided in good faith to it by a third party without breaching any of discloser's rights or any rights of a third party, or (c) is or becomes generally available to the public through no fault of the recipient.
No Confidential Information World Rugby does not want to receive confidential or proprietary information from you througConfidential Information World Rugby does not want to receive confidential or proprietary information from you throughInformation World Rugby does not want to receive confidential or proprietary information from you througconfidential or proprietary information from you throughinformation from you through this site.
MomLifeTV does not receive confidential or proprietary information from you through the Service or by email.
Three of those measures would authorize the gifting of legally possessed firearms to family members through estate planning, expand the definition of «immediate family» in the law's language, and make all personal information regarding pistol permit applications confidential except to law enforcement.
All through the late 1990s, the paper had been hiring an investigator called John Boyall, who, among other services, specialised in acquiring information from confidential databases.
There's a good case for saying if its confidential information that's price sensitive it should be disclosed through the proper channels.»
A confidential report on the six former Aqueduct race track contract bidders had been released to the New York Times, which sought the document through a Freedom of Information Act request, raising more questions over the legitimacy of Aqueduct Entertainment Group's selection.
We provide support to foster carers through independent, confidential advice and information and by advocating for the needs of foster carers throughout the sector, to improve outcomes for foster carers and the children and young people in their care.
That site was shockingly popular, and had millions of users, basically all of which were exposed through the leak of their confidential information.
We provide support to foster carers through independent, confidential advice and information and by advocating for the needs of foster carers throughout the sector, to improve outcomes for foster carers and the children and young people in their care.
All correspondence through email or chat can be completely confidential, masking your contact information until you want them to know who you are.
You can communicate with the members through the website, and your personal information as well as email id will be kept completely confidential.
THE USE OF THE INFORMATION RECEIVED BY A USER THROUGH RUSSIAN BRIDES CYBER GUIDE WEBSITE: The information of members of Russian Brides Cyber Guide can not be used for the means of a media broadcast, unless otherwise is explicitly agreed in writing, and should be treated as private and confidential, including but not limited to photos of Russian Brides Cyber Guide members, the personal ads of Russian Brides Cyber Guide members, the success stories of Russian Brides Cyber Guide members and any other information that the members and visitors of Russian Brides Cyber Guide shared in confidence with Russian Brides Cyber Guide or agreed on being published on Russian Brides Cyber GuiINFORMATION RECEIVED BY A USER THROUGH RUSSIAN BRIDES CYBER GUIDE WEBSITE: The information of members of Russian Brides Cyber Guide can not be used for the means of a media broadcast, unless otherwise is explicitly agreed in writing, and should be treated as private and confidential, including but not limited to photos of Russian Brides Cyber Guide members, the personal ads of Russian Brides Cyber Guide members, the success stories of Russian Brides Cyber Guide members and any other information that the members and visitors of Russian Brides Cyber Guide shared in confidence with Russian Brides Cyber Guide or agreed on being published on Russian Brides Cyber Guiinformation of members of Russian Brides Cyber Guide can not be used for the means of a media broadcast, unless otherwise is explicitly agreed in writing, and should be treated as private and confidential, including but not limited to photos of Russian Brides Cyber Guide members, the personal ads of Russian Brides Cyber Guide members, the success stories of Russian Brides Cyber Guide members and any other information that the members and visitors of Russian Brides Cyber Guide shared in confidence with Russian Brides Cyber Guide or agreed on being published on Russian Brides Cyber Guiinformation that the members and visitors of Russian Brides Cyber Guide shared in confidence with Russian Brides Cyber Guide or agreed on being published on Russian Brides Cyber Guide website.
All information you submit through the site is kept strictly confidential and not distributed to.
All information you submit through the site is kept strictly confidential and not distributed.
Any information, proposals, requests, manuscripts, creative works, pictures, photographs, letters, documents, demos, ideas, suggestions, concepts, methods, systems, designs, plans, techniques or other materials submitted, posted, uploaded, sent or otherwise transmitted to us on or through the Website in any manner, or by email (collectively, the «Content»), will be deemed to be not confidential or secret, and may be used by us in any manner consistent with these General Terms of Use and the Privacy Policy.
Avoid sending personal (confidential) information through regular email.
However, the Message Centre of our client site is a secure communication platform through which confidential information can be shared.
You access Mobile Check Deposit through UFCU's Mobile Banking app, which uses encryption similar to Online Banking to keep your information secure and confidential.
Information you submit is not private or confidential, nor is it protected by attorney - client, doctor - patient, or any other privilege and (regardless of restrictions we impose in our Terms of Use or other policies) it might be read, collected and used by others, including through third party search engines which may index the informatioInformation you submit is not private or confidential, nor is it protected by attorney - client, doctor - patient, or any other privilege and (regardless of restrictions we impose in our Terms of Use or other policies) it might be read, collected and used by others, including through third party search engines which may index the informationinformation you post.
We provide support to foster carers through independent, confidential advice and information and by advocating for the needs of foster carers throughout the sector, to improve outcomes for foster carers and the children and young people in their care.
You explicitly agree that: (i) playing beta games is at your own risk and you know that the games may include known or unknown bugs, (ii) any value or status indicators that you achieve through game play may be erased at any time, (iii) Koch Media has no obligation to make these games available for play without charge for any period of time, nor to make them available at all, (iv) these games may be available only by subscription once the Beta Test process is complete or at any time in the future; (v) Koch Media «s Terms of Service apply to your use of the games during the testing phase, and (vi) if it is a closed beta test, you will keep all information about the beta games confidential as stated above and not disclose such information to any other person.
By selecting a «Play» button to start a Alpha Version, you agree that: (i) playing Alpha Versions is at your own risk and you know that the Alpha Versions may include known or unknown bugs, (ii) any Virtual Goods or other value or status indicators that you achieve through game play may be erased at any time, (iii) RSI has no obligation to make these Alpha Versions available for play with or without charge for any period of time, nor to make them available at all, (iv) you may need to pay a subscription or access fee in order to access these Alpha Versions once the Alpha Test process is complete or at any time in the future; (v) these TOS apply to your use of the Alpha Versions during the Alpha Test, and (vi) if it is a closed Alpha Test, you will keep all information about the Alpha Materials confidential as stated above and not disclose such information to any other person.
Unsolicited Materials In operating this site, Brooklyn Based does not solicit nor does it wish to receive any confidential, secret or proprietary information or other material from you through the Web Site or Brooklyn Based mail and e-mail addresses, or in any other way.
When we transmit highly confidential information over the Internet, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol.
As a result, if you choose to communicate with an attorney through the Services, please note that any such communications between you and a participating attorney may not necessarily be treated as confidential information by the attorney or protected by the attorney - client privilege doctrine.
Basically, misappropriation boils down to the acquisition or disclosure of confidential information by improper or unauthorized ways, including through theft, bribery, fraud or even hacking.
Our lawyers recognize the severe impact that may arise if sensitive, confidential information is made publicly available, and are familiar with the most effective strategies to contain and resolve such matters as quickly as possible — whether through emergency injunctive relief, by sealing court records, or by obtaining protective orders related to the trade secrets at issue.
CONFIDENTIAL OR TIME - SENSITIVE INFORMATION SHOULD NOT BE SENT THROUGH THIS FORM
Conspicuously absent in the case, in the view of Stinson J., was any evidence of precautions that would prevent any sharing — inadvertent or otherwise — of confidential information pertaining to the clients of any particular lawyer (e.g., instructions to support staff to take appropriate precautions regarding maintaining confidentiality, precautions dealing with faxes, mail or phone calls arriving through shared means, etc..)
Not only would it save money, it would mean fast access to digital recordings via CM / ECF for lawyers involved in the case (and the public, through PACER, although I suppose courts would have to be extra-vigilant when it comes to confidential information).
Confidential or time - sensitive information should not be sent through this website or its forms.
Paragraphs 8 through 20 of the ITO contain information from three other confidential informants described as # 1, # 2, and # 3.
First, I would argue that Apple's servers are analogous to the third party servers through which emails between lawyers and clients travel, and the use of email between lawyers and clients to discuss confidential information was given the green light by ethics committees as far back as the late 1990s.
Julian also has extensive experience in helping businesses protect their confidential information and trade secrets both in the form of drafting enforceable terms and where necessary seeking interim relief through an injunction, freezing order or search order.
Communications and information transmitted over the Internet is not a secure medium, regardless of the steps taken to secure it, therefore you should be aware of security risks when contacting and sending confidential and personal information through online forms of electronic communication.
Or is the onus on the party creating the document to take appropriate measures to protect confidential information and access of that information by the receiving party through whatever means possible is fair game?
a b c d e f g h i j k l m n o p q r s t u v w x y z