National Academies Press: OpenBook

Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management (2007)

Chapter: Appendix B Sample Confidentiality Agreement

« Previous: Appendix A List of Acronyms
Suggested Citation:"Appendix B Sample Confidentiality Agreement." National Research Council. 2007. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management. Washington, DC: The National Academies Press. doi: 10.17226/11793.
×

Appendix B
Sample Confidentiality Agreement

This Confidentiality Agreement (“Agreement”) is effective as of the [Enter Day of Month] day of [Select Month] 2003 by and among


Name of Company Possessing the Data to Be Shared (hereinafter referred to as “Company”)


and


[Enter Name of Company]

[Enter Type of Company]

Having its principal office at [Enter Address of Company]

(hereinafter referred to as “Contractor”)


WITNESSETH:


WHEREAS, the Parties hold information and data that are proprietary to each Party respectively and desire to share certain confidential and proprietary information with each other in connection with [Enter Brief Description of Subject Matter] (hereinafter referred to as “Matter”).


NOW, THEREFORE, the Parties agree as follows:

Suggested Citation:"Appendix B Sample Confidentiality Agreement." National Research Council. 2007. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management. Washington, DC: The National Academies Press. doi: 10.17226/11793.
×
  1. Definitions

    1. “Confidential Information” includes any and all information, including but not limited to all oral, written, graphical, and electronic information disclosed to the Party receiving the information. If Confidential Information is disclosed in written, recorded, graphical, electronic, or otherwise in a tangible form, it may be labeled as “proprietary” or “confidential” or with a similar legend denoting confidentiality, or it may otherwise be verbally designated as such.

    2. “Company” includes description of company, affiliates, and subsidiaries.

    3. “Party” or “Parties” refers to Company, Contractor A and Contractor B, individually and collectively.

  1. The Parties agree not to use or disclose Confidential Information except for the purpose of the Matter. The Parties agree only to disclose the Confidential Information received from each other to the Parties’ respective employees whose duties justify their need to know such Confidential Information. The Party disclosing Confidential Information shall ensure compliance by its employees with the terms and conditions of this Agreement.

  2. Confidential Information is not information that

    1. Now is or becomes generally known to the public without fault of the Party or Parties receiving the information; or

    2. Is proven by written documentation to have been in the receiving Party’s possession prior to its receipt from the disclosing Party; or

    3. Is received from an independent third party who is not under obligation of confidentiality.

  1. To the extent the Party receiving Confidential Information is required by an order of a court of competent jurisdiction to reveal such information, the Party will promptly notify the Party that provided the Confidential Information in order to allow the Party to take necessary action including a protective order, as appropriate, and will cooperate with the disclosing Party in protecting the confidentiality of the Confidential Information in a lawful manner.

  2. Disclosure of Confidential Information by any Party under this Agreement does not grant the receiving party any right or license to use the Confidential Information unless explicitly set forth

Suggested Citation:"Appendix B Sample Confidentiality Agreement." National Research Council. 2007. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management. Washington, DC: The National Academies Press. doi: 10.17226/11793.
×

herein or in a letter of authorization from the disclosing Party and signed by an employee of that Party authorized to grant such authorization.

  1. All Confidential Information, unless specified in writing, remains the property of the disclosing Party, and must be used by the receiving Party only for the purpose intended by the disclosing Party. Upon termination of this Agreement, all copies of written, recorded, graphical, electronic, or other tangible Confidential Information must be returned to the disclosing Party. The disclosing Party may in its sole discretion direct the receiving Party to destroy and certify in writing that it has destroyed the Confidential Information.

  2. Confidential Information supplied is not to be reproduced in any form except as required to accomplish the intent of the Matter. 8. All Confidential Information must be retained by the receiving Party in a secure place with access limited to only such of the receiving Party’s employees (or agents or subcontractors who have a non-disclosure obligation at least as restrictive as this Agreement) who need to know such information for the purposes of the Matter, and to such third parties as the disclosing Party has consented to by prior written approval. The receiving Party must provide the same care to avoid disclosure or unauthorized use of the Confidential Information as it provides to protect its own confidential and proprietary information.

  3. Each Party warrants that it has the right to disclose the Confidential Information that it will disclose to the other Parties pursuant to this Agreement, and each Party agrees to indemnify and hold harmless the Parties from all claims by third parties relating specifically to the subject matter of this Agreement. Otherwise, no Party makes any representation or warranty, express or implied, with respect to any Confidential Information. No Party is liable for indirect, incidental, consequential, or punitive damages of any nature or kind resulting from or arising in any manner whatsoever in connection with this Agreement.

  4. The Parties acknowledge that a receiving Party’s unauthorized disclosure of Confidential Information may result in irreparable harm. The Parties, therefore, agree that in the event of a violation or threatened violation of this Agreement, without limiting the rights and remedies of each Party to seek damages, a temporary restraining order and/or an injunction to enjoin disclosure of Confidential Information may be sought against the Party who has breached or threatened to breach this Agreement and the

Suggested Citation:"Appendix B Sample Confidentiality Agreement." National Research Council. 2007. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management. Washington, DC: The National Academies Press. doi: 10.17226/11793.
×

Party who has breached or threatened to breach this Agreement agrees not to raise the defense of an adequate remedy at law.

  1. All media releases, public announcements, and demonstrations by any Party to this Agreement relating to the Matter, its subject matter, or the purpose of this Agreement must be approved in writing in advance signed by all Parties prior to the release, announcement, or demonstration.

  2. No party shall assign any of its obligations under the Agreement without the prior written consent of the Company, which shall not be unreasonably withheld or delayed.

    1. Not withstanding the foregoing, the Company shall have the right to assign this Agreement to an entity as a result of merger, acquisition, reorganization, or sale of substantially all of the Company’s assets.

  1. The obligation to hold Confidential Information confidential is perpetual and shall survive this Agreement.

  2. This Agreement represents the entire understanding between the Parties, and the terms and conditions of this Agreement supersede the terms of any prior agreements or understanding, express or implied, written or oral.

  3. This Agreement may not be amended except in writing signed by all Parties.

  4. The provisions of this Agreement are considered to be severable, and in the event that any provision is held to be invalid or unenforceable, the Parties intend that the remaining provisions will remain in full force and effect to the extent possible and in keeping with the intent of the Parties.

  5. There are no additional party beneficiaries to this Agreement.

  6. Failure by a Party to enforce or exercise any provision, right, or option contained in this Agreement will not be construed as a present or future waiver of such provision, right, or option.

Accepted by

[Enter Name of Company]

Accepted by

[Enter Name of Company Possessing the Data to Be Shared]

By:

Name:

Title:

Date:

By:

Name:

Title:

Date:

Suggested Citation:"Appendix B Sample Confidentiality Agreement." National Research Council. 2007. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management. Washington, DC: The National Academies Press. doi: 10.17226/11793.
×
Page 159
Suggested Citation:"Appendix B Sample Confidentiality Agreement." National Research Council. 2007. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management. Washington, DC: The National Academies Press. doi: 10.17226/11793.
×
Page 160
Suggested Citation:"Appendix B Sample Confidentiality Agreement." National Research Council. 2007. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management. Washington, DC: The National Academies Press. doi: 10.17226/11793.
×
Page 161
Suggested Citation:"Appendix B Sample Confidentiality Agreement." National Research Council. 2007. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management. Washington, DC: The National Academies Press. doi: 10.17226/11793.
×
Page 162
Next: Appendix C Preparedness Checklist »
Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management Get This Book
×
Buy Paperback | $50.00 Buy Ebook | $39.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In the past few years the United States has experienced a series of disasters, such as Hurricane Katrina in 2005, which have severely taxed and in many cases overwhelmed responding agencies. In all aspects of emergency management, geospatial data and tools have the potential to help save lives, limit damage, and reduce the costs of dealing with emergencies. Great strides have been made in the past four decades in the development of geospatial data and tools that describe locations of objects on the Earth's surface and make it possible for anyone with access to the Internet to witness the magnitude of a disaster. However, the effectiveness of any technology is as much about the human systems in which it is embedded as about the technology itself.

Successful Response Starts with a Map assesses the status of the use of geospatial data, tools, and infrastructure in disaster management, and recommends ways to increase and improve their use. This book explores emergency planning and response; how geospatial data and tools are currently being used in this field; the current policies that govern their use; various issues related to data accessibility and security; training; and funding. Successful Response Starts with a Map recommends significant investments be made in training of personnel, coordination among agencies, sharing of data and tools, planning and preparedness, and the tools themselves.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!