Sentences with phrase «nonpublic information from»

New York University (NYU) associate professor of radiology Yudong Zhu and NYU graduate student Xing Yang, both Chinese citizens, were arrested on 19 May on federal bribery charges in connection with an alleged conspiracy to pass nonpublic information from research funded by the U.S. National Institutes of Health (NIH) to a Chinese company with ties to the Chinese government.
According to U.S. Securities and Exchange Commission (SEC), Stewart avoided a loss of $ 45,673 by selling all 3,928 shares of her ImClone Systems stock on December 27, 2001, after receiving material, nonpublic information from Peter Bacanovic, who was Stewart's broker at Merrill Lynch.

Not exact matches

It bars staff from discussing «all nonpublic information I learn of or gain access to in the course of my official duties in the service of the United States Government on White House staff,» including «communications. . .
«I see the memo as the CFTC cautioning its employees on the ethical issues that could be raised by their trading in cryptocurrencies, encouraging them to consider and seek advice from the CFTC ethics team before trading in cryptocurrencies, noting that employees may not transact in cryptocurrencies if they have nonpublic information about them from their work at the CFTC, and advising that those who participate in CFTC dealings related to cryptocurrencies may not trade in them for conflict of interest reasons.»
To conduct regular business, we may collect nonpublic personal information from sources such as:
Concussion or Sports - Related Head Injury: Code 20 -2-324.1 (2013) requires each local board of education, administration of a nonpublic school and governing body of a charter school to adopt and implement a concussion management and return to play policy that includes the following components: 1) an information sheet to all youth athletes» parents or legal guardians informing them of the nature and risk of concussion and head injury, 2) requirement for removal from play and examination by a health care provider for those exhibiting symptoms of a concussion during a game, competition, tryout or practice and 3) for those youth that have sustained a concussion (as determined by a health care provider), the coach or other designated personnel shall not permit the youth athlete to return to play until they receive clearance from a health care provider for a full or graduated return to play.
Prohibit employees from engaging in financial transactions using nonpublic Government information, making unauthorized commitments, using public office for private gain, and engaging in nonofficial activities that conflict with the performance of duty.
If the item to the left is checked, this dealership reserves the right to disclose nonpublic personal information to third parties, such as market research firms, direct marketing companies, finance service providers and others who may from time to time seek to provide you information on valuable products or services.
The Fund's Chief Compliance Officer, or a Compliance Manager designated by the Chief Compliance Officer, may also grant exceptions to permit additional disclosure of Fund portfolio holdings information at differing times and with different lag times (the period from the date of the information to the date the information is made available), if any, in instances where the Fund has legitimate business purposes for doing so, it is in the best interests of shareholders, and the recipients are subject to a duty of confidentiality, including a duty not to trade on the nonpublic information and are required to execute an agreement to that effect.
LoanStar Home Lending collects nonpublic information about consumers from the following sources:
On April 15, 2008, in response to a phone call from Kevin Tang of Tang Capital LP, we began a series of communications with Mr. Tang over several months during which we attempted to negotiate a confidentiality agreement with Mr. Tang and Tang Capital to permit discussions covering nonpublic information relating to Northstar and our operations.
collects nonpublic personal information included on forms, checks and gift letters we receive from you, or through information you communicate directly to us through other means.
A few lawmakers proposed a bill that would prevent members and employees of Congress from trading securities based on nonpublic information they obtain.
Carbone was accused of soliciting information from Bachelor participants, cast, crew and other employees of the series and inducing them to breach contracts promising not to divulge nonpublic information.
A lawyer for a party may «friend» an unrepresented adversary in order to obtain information helpful to her representation from the adversary's nonpublic website only when the lawyer has been able to send a message that discloses his or her identity as the party's lawyer.
Another broker was fined $ 5,000 for sending unencrypted emails from his firm email address to his personal email address, and to a third party that included attachments containing nonpublic personal information for firm customers.
The regulation does not specify the form that the program must take, but requires that it be «designed to perform the following core cybersecurity functions:» (1) identify internal and external cyber risks by, at a minimum, identifying the Nonpublic Information stored on the Covered Entity's Information Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation stored on the Covered Entity's Information Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oinformation stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting obligations.
Multi-Factor Authentication A Covered Entity must (1) require Multi-Factor Authentication for any individual accessing the Covered Entity's internal systems or data from an external network; (2) require Multi-Factor Authentication privileged access to database servers that allow access to Nonpublic Information; (3) require Risk - Based Authentication to access web applications that capture, display or interface with Nonpublic Information; and (4) support Multi-Factor Authentication for any individual accessing web applications that capture, display or interface with Nonpublic Information.
We may obtain nonpublic personal information directly from you or from other parties, such as a consumer reporting agency.
Sources from which we may collect nonpublic information about you include: information we receive from you on applications or other forms in writing, via facsimile transmission, by telephone, by electronic means including e-mail and our website, or by other means of communication; information resulting from your transactions with us, our affiliates or others; information resulting from entitled services that you have received from us, our affiliates or others; information obtained from governmental sources, such as your driving record and claims history (insurance clients); and information obtained from non-governmental sources, such as demographic data used for marketing purposes.
The app also scooped up information from the typically nonpublic profiles of the quiz - takers» friends — turning 270,000 people into 87 million.
He added that for many years, Coinbase has had a policy in place that prevents employees, their families, and friends from trading cryptocurrencies on material nonpublic information.
a b c d e f g h i j k l m n o p q r s t u v w x y z