New York University (NYU) associate professor of radiology Yudong Zhu and NYU graduate student Xing Yang, both Chinese citizens, were arrested on 19 May on federal bribery charges in connection with an alleged conspiracy to pass
nonpublic information from research funded by the U.S. National Institutes of Health (NIH) to a Chinese company with ties to the Chinese government.
According to U.S. Securities and Exchange Commission (SEC), Stewart avoided a loss of $ 45,673 by selling all 3,928 shares of her ImClone Systems stock on December 27, 2001, after receiving material,
nonpublic information from Peter Bacanovic, who was Stewart's broker at Merrill Lynch.
Not exact matches
It bars staff
from discussing «all
nonpublic information I learn of or gain access to in the course of my official duties in the service of the United States Government on White House staff,» including «communications. . .
«I see the memo as the CFTC cautioning its employees on the ethical issues that could be raised by their trading in cryptocurrencies, encouraging them to consider and seek advice
from the CFTC ethics team before trading in cryptocurrencies, noting that employees may not transact in cryptocurrencies if they have
nonpublic information about them
from their work at the CFTC, and advising that those who participate in CFTC dealings related to cryptocurrencies may not trade in them for conflict of interest reasons.»
To conduct regular business, we may collect
nonpublic personal
information from sources such as:
Concussion or Sports - Related Head Injury: Code 20 -2-324.1 (2013) requires each local board of education, administration of a
nonpublic school and governing body of a charter school to adopt and implement a concussion management and return to play policy that includes the following components: 1) an
information sheet to all youth athletes» parents or legal guardians informing them of the nature and risk of concussion and head injury, 2) requirement for removal
from play and examination by a health care provider for those exhibiting symptoms of a concussion during a game, competition, tryout or practice and 3) for those youth that have sustained a concussion (as determined by a health care provider), the coach or other designated personnel shall not permit the youth athlete to return to play until they receive clearance
from a health care provider for a full or graduated return to play.
Prohibit employees
from engaging in financial transactions using
nonpublic Government
information, making unauthorized commitments, using public office for private gain, and engaging in nonofficial activities that conflict with the performance of duty.
If the item to the left is checked, this dealership reserves the right to disclose
nonpublic personal
information to third parties, such as market research firms, direct marketing companies, finance service providers and others who may
from time to time seek to provide you
information on valuable products or services.
The Fund's Chief Compliance Officer, or a Compliance Manager designated by the Chief Compliance Officer, may also grant exceptions to permit additional disclosure of Fund portfolio holdings
information at differing times and with different lag times (the period
from the date of the
information to the date the
information is made available), if any, in instances where the Fund has legitimate business purposes for doing so, it is in the best interests of shareholders, and the recipients are subject to a duty of confidentiality, including a duty not to trade on the
nonpublic information and are required to execute an agreement to that effect.
LoanStar Home Lending collects
nonpublic information about consumers
from the following sources:
On April 15, 2008, in response to a phone call
from Kevin Tang of Tang Capital LP, we began a series of communications with Mr. Tang over several months during which we attempted to negotiate a confidentiality agreement with Mr. Tang and Tang Capital to permit discussions covering
nonpublic information relating to Northstar and our operations.
collects
nonpublic personal
information included on forms, checks and gift letters we receive
from you, or through
information you communicate directly to us through other means.
A few lawmakers proposed a bill that would prevent members and employees of Congress
from trading securities based on
nonpublic information they obtain.
Carbone was accused of soliciting
information from Bachelor participants, cast, crew and other employees of the series and inducing them to breach contracts promising not to divulge
nonpublic information.
A lawyer for a party may «friend» an unrepresented adversary in order to obtain
information helpful to her representation
from the adversary's
nonpublic website only when the lawyer has been able to send a message that discloses his or her identity as the party's lawyer.
Another broker was fined $ 5,000 for sending unencrypted emails
from his firm email address to his personal email address, and to a third party that included attachments containing
nonpublic personal
information for firm customers.
The regulation does not specify the form that the program must take, but requires that it be «designed to perform the following core cybersecurity functions:» (1) identify internal and external cyber risks by, at a minimum, identifying the
Nonpublic Information stored on the Covered Entity's Information Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information stored on the Covered Entity's
Information Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information Systems, the sensitivity of such
Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information, and how and by whom such
Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's
Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information Systems and the
Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information stored on those
Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information Systems,
from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an
Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information System or
information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
information stored on an
Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting o
Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover
from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting obligations.
Multi-Factor Authentication A Covered Entity must (1) require Multi-Factor Authentication for any individual accessing the Covered Entity's internal systems or data
from an external network; (2) require Multi-Factor Authentication privileged access to database servers that allow access to
Nonpublic Information; (3) require Risk - Based Authentication to access web applications that capture, display or interface with
Nonpublic Information; and (4) support Multi-Factor Authentication for any individual accessing web applications that capture, display or interface with
Nonpublic Information.
We may obtain
nonpublic personal
information directly
from you or
from other parties, such as a consumer reporting agency.
Sources
from which we may collect
nonpublic information about you include:
information we receive
from you on applications or other forms in writing, via facsimile transmission, by telephone, by electronic means including e-mail and our website, or by other means of communication;
information resulting
from your transactions with us, our affiliates or others;
information resulting
from entitled services that you have received
from us, our affiliates or others;
information obtained
from governmental sources, such as your driving record and claims history (insurance clients); and
information obtained
from non-governmental sources, such as demographic data used for marketing purposes.
The app also scooped up
information from the typically
nonpublic profiles of the quiz - takers» friends — turning 270,000 people into 87 million.
He added that for many years, Coinbase has had a policy in place that prevents employees, their families, and friends
from trading cryptocurrencies on material
nonpublic information.