DATA COLLECTION
To complete the assessment, Trinsio will need to collect 24 hours of inbound & outbound firewall traffic logs. This can be done by either the end user organization or by Trinsio.
Confidentiality. The parties to this assessment agree that each shall treat as confidential all information provided by a party to the others regarding such data relevant to the threat assessment.
All confidential information provided by a party hereto shall be used by any other parties hereto solely for the purposes of rendering an assessment for the potential need of cybersecurity services, and, except as may be required in carrying out the threat assessment, shall not be disclosed to any third party without the prior consent of such providing party.
The foregoing shall not be applicable to any information that is publicly available when provided or which thereafter becomes publicly available or which is required to be disclosed by any regulatory authority in the lawful and appropriate exercise of its jurisdiction over a party, any auditor of the parties hereto, by judicial or administrative process or otherwise by applicable law or regulation.