Protection of Luminex Sample Clauses

Protection of Luminex 
AutoNDA by SimpleDocs

Related to Protection of Luminex

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of Rights The Servicer shall take no action which, nor omit to take any action the omission of which, would impair the rights of the Trustee in any Receivable, if any, nor shall it reschedule, revise or defer payments due on any Receivable except in accordance with the applicable Credit Guidelines, nor shall it sell any assets in the Trust except as provided in this Agreement or a related Supplement.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • PROTECTION OF THIRD PARTIES No person (including a purchaser) dealing with the Collateral Agent or a Receiver or its or his agents will be concerned to enquire:

  • Protection of Proprietary Rights 8.1 Acknowledgment of Proprietary Materials. Distributor hereby --------------------------------------- acknowledges that all Software, Documentation and technical support and training materials provided to Distributor by Xxxxxx.xxx (collectively, the "Materials") are protected by the copyright laws of the United States and other countries and that the Materials embody valuable confidential and trade secret information of Xxxxxx.xxx, the development of which required the expenditure of considerable time and money by Xxxxxx.xxx.

  • Protection of Documents All documents, records and files, in any media of whatever kind and description, relating to the business, present or otherwise, of the Company or any of its Affiliates, and any copies, in whole or in part, thereof (the “Documents”), whether or not prepared by you shall be the sole and exclusive property of the Company. You agree to safeguard all Documents and to surrender to the Company, at the time your employment terminates or at such earlier time or times as the Committee or its designee may specify, all Documents then in your possession or control.

  • Ownership and Protection of Proprietary Information (i) As used herein, the term “

  • Protection of Proprietary Information The Seller has taken all reasonable steps to maintain the confidentiality of and otherwise protect and enforce their rights in all proprietary information pertaining to the Seller or any Seller Product. Without limiting the generality of the foregoing, no portion of the source code for any software ever owned or developed by the Seller has been disclosed or licensed to any escrow agent or other Person.

  • Protection of Trademarks Such Grantor shall, with respect to any Trademarks that are material to the business of such Grantor, use commercially reasonable efforts not to cease the use of any of such Trademarks or fail to maintain the level of the quality of products sold and services rendered under any of such Trademarks at a level at least substantially consistent with the quality of such products and services as of the date hereof, and shall use commercially reasonable efforts to take all steps reasonably necessary to ensure that licensees of such Trademarks use such consistent standards of quality, except as would not reasonably be expected to have a Material Adverse Effect.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

Time is Money Join Law Insider Premium to draft better contracts faster.