INC.
<br />Basic Applicant Data (as defined in this Section) will remain on the eSOPH System and be visible to other MMI
<br />clients. Further information regarding another agency's entry of an Applicant, must be gained through that agency's
<br />permission and their own internal process(es).
<br />5.5 Security Incident. In the event MMI learns of a Security Incident, MMI will make every effort to
<br />notify Client within 24-hours of learning of the breach. Notification will be made to at least one of Client's
<br />Administrative Users listed on Exhibit A via telephone and email. Notifications will only be made when an actual
<br />Security Incident has occurred; if the data is encrypted, by industry standards, no Security Incident is considered to
<br />have occurred and no notification will be made. At the request of Client, and with Client's cooperation and
<br />assistance, MMI will work together with law enforcement and other personnel in connection with the unauthorized
<br />access into the eSOPH System. MMI takes the privacy and security of data seriously, and uses reasonable
<br />administrative, technical, and physical safeguards to protect the confidentiality and security of all Client Data.
<br />Clients are encouraged to review MMI's eSOPH Security Overview, which is updated as needed by MMI from time
<br />to time and is available upon request.
<br />5.6 Ownership of Client Data. Client owns all Client Data entered into the eSOPH System by its
<br />Authorized Users and its Applicants, including Applicant Data entered in response to the Client's request for
<br />information to process an Applicant's background investigation.
<br />5.7 Post -Termination Retention of Data. Without limiting Client's rights to Client Data and
<br />Applicant Data hereunder, MMI may retain and store the following data during and after the term of this Agreement:
<br />Applicant name, Applicant telephone number, Applicant mailing address, Applicant email address, Applicant year
<br />of birth, date the Applicant was entered into the eSOPH System, Applicant's background investigation close date,
<br />position Applicant has applied for with Client, and the legal agreements (e.g., MMI's Electronic Signature
<br />Agreement, Terms of Use and Privacy Policy) related to any Authorized User's or Applicant's use of the eSOPH
<br />System. MMI may retain such information and use it to comply with applicable law and the eSOPH System Terms
<br />of Use and Privacy Policy and for the purposes described in Section 5.4 (MMI's Sharing of Basic Applicant Data).
<br />Other than as stated in this Agreement, MMI will not use such information for other purpose.
<br />5.8 Confidential Information. In performance of this Agreement, the Parties may directly or
<br />indirectly disclose to each other confidential information, proprietary information, or confidential data
<br />("Confidential Information"). "Confidential Information" shall include any data and/or information that is
<br />identified by either Party as confidential (either orally or in writing) or is of such a nature that a reasonable person
<br />would understand such information to be confidential, including, but not limited to, (a) trade secrets or confidential
<br />business information of either Party, including without limitation information about such Party's technology,
<br />financial information, and plans; and (b) personal information of employees, Applicants, and Authorized Users,
<br />including but not limited to, images, names, addresses, Social Security numbers, e-mail addresses, telephone
<br />numbers, financial profiles, credit card information, driver's license numbers, medical data, law enforcement
<br />records, educational records or other information identifiable to a specific individual that relates to any of these
<br />types of information ("Personally Identifiable Information" or "PII").
<br />5.9 Exclusions from Confidential Information. Notwithstanding the foregoing, Confidential
<br />Information shall not include information the receiving Party can prove by clear and convincing written
<br />contemporaneous evidence is: (1) publicly known through no fault or negligence of the receiving Party; (2) rightfully
<br />possessed by the receiving Party prior to disclosure by the disclosing Party; (3) rightfully obtained by the receiving
<br />Party from a third -party in lawful possession of such Confidential Information without obligation of confidentiality;
<br />(4) independently developed by the receiving Party without reference to or use of the disclosing Party's Confidential
<br />Information.
<br />5.10 Restrictions on Use and Disclosure. Each party shall not use the other party's Confidential
<br />Information for any purpose other than performance of its obligations and exercise of its rights under this Agreement.
<br />Furthermore, each party shall not disclose the other party's Confidential Information to any third party except to
<br />such parry's employees, contractors, and other representatives who (a) have a bona fide need to know such
<br />Confidential Information for purposes of performing this Agreement, (b) have been informed of the confidential
<br />MASTER SOFTWARE SUBSCRIPTION SERVICES AGREEMENT ('°MSSSA") PAGE 13 OF 24
<br />Version: May 30, 2023
<br />
|