Merchant’s expense, all Terminals, forms, and other materials bearing the trade-mark of Motion Pay of any Payment System. 10. Limitation of Liability and Indemnities 10.1. All disputes between the Merchant and a Payment Device Holder relating to the delivery and receipt, quality and price of the goods or services sold by Merchant must be handled directly by merchant without any liability to motion Pay or the Payment Systems. 10.2. Motion Pay will not responsible for any claims, damages, losses or expenses incurred directly or indirectly by the Merchant resulting from any failure or delay in the provision of the Merchant Services, unless such failure constitutes gross negligence or wilful misconduct. 10.3. Motion shall in no event …show more content…
11.2. The following information does not form part of Confidential Information: a) information which is in the public domain at the time of the disclosure or later case into the public domain through no fault of the Receiving Party; b) information which was known to the receiving Party prior to disclosure by the Disclosing Party; c) information which was disclosed to the receiving Party by a third party, free from any obligation of confidence to such third party; and d) information which was later independently developed by or for the Receiving Party without reference to the Confidential Information disclosed under this Agreement. 11.3. Except with the prior written consent of the other party, each party agrees : a) to limit access to any Confidential Information received by it only to its employees and agents who have a need to know in connection with this Agreement; b) to safeguard all the Confidential Information received by it using a reasonable standard of care which is not less than the degree of care with which that party safeguards its own confidential information; c) to use any Confidential Information only for the purposes of this Agreement, and for no
An employee should uphold the confidentiality of information assigned to them by the company and its customers, except when revelation of such information is authorized or required by applicable laws, rules or regulations. “Confidential information” includes all records, non-public information related to the company and its business, customers, or vendors that come to an employee in the course of carrying out the employee’s duties and that can be value to competitors or damaging to the company or its business if revealed.
Identify relevant legal requirements and procedures covering confidentiality data protection and the disclosure of information.
To ensure that all concerns / complaints are dealt with in accordance with the
Although sometimes constraints make it impossible to choose a perfect setting, it is important to, where possible, consider privacy. Privacy is one of the keys to good communication, as the client is likely to be disclosing information of a confidential and sensitive nature (Argyle 1998).
Information will also be retrieved in situations where information might have to be shared with partner companies and with the police or Tax Services.
(b) Notice of Intent to Breach – if the Δ gave notice of intent to breach, then
* Confidentiality – the steps that are taken when people’s information is not kept confidential and on a need to know basis
* Secured against accidental loss, destruction or damage and against unauthorised or unlawful processing - this applies to you even if your business uses a third party to process personal information on your behalf.
4.3 Describe situations where information normally considered to be confidential might need to be passed on.
information might be granted. In order for security policies to be effective, they must be
u. P2) This implies that the seller who intends to enter a contract with a customer has a duty to disclose exactly what the customer is buying and what the terms of the sale are.
Provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use, or disposition of the company’s assets that could have a material effect on the financial statements.
This section will touch upon legality of purpose. Certainly, businesses often have a valid concern regarding employees who serve out their contract or are employed at will who then scurry off to a competing company and potentially divulge sensitive information and/or use said information against the prior employer. This can occur with a pre-existing competing company or it can be a solo venture of the person who is taking advantage of the trade secrets or other privileged information. For that reason, employers often
Confidentiality was explained to Lorena, and also the exceptions in which, confidentiality would have to be breached. Lorena was asked if she understood this, she replied “Yea”. ACA (2005, Section, 2.3.3.1. Breaching the confidentiality and therefore trust between Lorena and myself in this instance, was necessary and unavoidable, ACA, 2.3.4.1, (2008), and 2.3.4.3 and ACA, , B.2a, B.2c(2005).
As my project was market sensitive, I signed a contract for information disclosure before starting to work on the project. Talking about my project was always simplified and important details were excluded, especially in project seminar for the public. The slides for presentation and prepared speech were approved by my supervisor before releasing to the public. As confidentiality was crucial for my project, I understand the importance of these concepts (confidentiality and privacy) and familiar with handling sensitive