Activity Data Sample Clauses

Activity Data. Activity Data is any data generated in the providing of services under this Agreement by Passport to Customer and by end users’ interactions with the services or with Passport directly that is not otherwise PCI-DSS information or PII as defined above. Activity Data may include, but is not limited to, user interaction data, geolocation data, opt-in/opt-out status (including compliance logs), purchase and session data, application diagnostic data, service performance data, and support data. Data that is derived from Activity Data is also Activity Data. Activity Data is the sole and exclusive property of Passport. Passport grants Customer an irrevocable, royalty-free, non-exclusive, non-assignable, and nontransferable license to Activity Data for the Term to the extent and in the format that Passport chooses in its sole discretion to expose such Activity Data through its administrative portal or as otherwise agreed upon with Customer and only for Customer’s internal use in connection with the services provided under this agreement.
AutoNDA by SimpleDocs
Activity Data. Activity Identification - Each activity in the Project Schedules shall have an activity identifier (Activity ID). The Contractor shall utilize an Activity ID that is simple and allows space between existing activities for the future addition of activities for continuing sort and display capability. The Activity ID of an existing activity shall not be modified or assigned to another activity. The scope of work for an activity shall not be substantially changed once the Baseline Schedule is approved since this would result in re-use of the Activity ID for a different scope of work. Activity Description - The activity description shall identify the unique scope of the activity. There shall not be any two activities with the same activity description. It shall not be necessary to investigate activity code assignments or logic relationships to identify the scope of an activity. For example, the description "POUR FOOTING" will not be acceptable; the description “POUR FOOTING RAMP RT-Sta. 42+0O-42+5O will be acceptable. At the same time the Activity Description shall be concise enough so as to not require excessive column width in the Oracle Primavera P6 layout. The terms “Miscellaneous," "Misc." or other vague adjectives shall not be used in an activity description. The Contractor shall standardize the use of terms and their spelling in all activity descriptions. Abbreviations used in activity descriptions shall be consistent with the abbreviations used throughout the Contract and the Contractor’s design drawings. Activity DurationUnless otherwise specified construction activities shall have duration from five (5) to thirty (30) working days. At the request of the Authority, the Contractor shall substantiate the need for specific activities having shorter or longer durations than stated herein. After approval of the Baseline Schedule, changes in activity durations shall be addressed exclusively through the use of the Duration Remaining data field. EXECUTION VERSION Activity Type - The implementation of scheduling software features that may impact schedule calculations shall be in accordance with the software manufacturer’s recommendations unless otherwise directed by the Authority. For example, P6 has the default activity type of “task.” Activity Dates - Early and Late start and finish dates of activities shall be calculated for each activity based upon the schedule data date, actual dates, schedule logic, schedule constraints, calendars, and original duratio...
Activity Data. We will provide you with access to your existing Activity Data promptly following your request.

Related to Activity Data

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Contractor Designation of Trade Secrets or Otherwise Confidential Information If the Contractor considers any portion of materials to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to Contract-related materials it has designated trade secret or otherwise confidential.

  • Independence from Material Breach Determination Except as set forth in Section X.D.1.c, these provisions for payment of Stipulated Penalties shall not affect or otherwise set a standard for OIG’s decision that Xxxxx has materially breached this IA, which decision shall be made at OIG’s discretion and shall be governed by the provisions in Section X.D, below.

  • Confidential Information and Restricted Activities Employee has entered into the Company’s Employee Proprietary Information Agreement (“EPIA”) and acknowledges his or her obligations thereunder. The EPIA is specifically incorporated into this Agreement.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Proprietary Materials Each of the Parties shall own its own intellectual property including without limitation all trade secrets, know-how, proprietary data, documents, and written materials in any format. Any materials created exclusively by IPS for the School shall be owned by IPS, and any materials created exclusively by Operator for the School shall be Operator’s proprietary material. The Parties acknowledge and agree that neither has any intellectual property interest or claims in the other Party’s proprietary materials. Notwithstanding the foregoing, materials and work product jointly created by the Parties shall be jointly owned by the Parties and may be used by the individual Party as may be agreed upon by both Parties from time to time.

  • Market Information Exchange and Xxxxxxxxxx brochures and research are often provided as trading tools. In addition, a CTS Platform may also contain certain market information. Customer acknowledges that: (a) any information Xxxxxxxxxx’x research department may communicate to Customer does not constitute an offer to sell or a solicitation of any offer to buy any Contract; (b) such recommendations and information, although based upon information obtained from sources believed by Xxxxxxxxxx to be reliable, are incidental to Xxxxxxxxxx’x business as a futures commission merchant, may be incomplete and not subject to verification, and will not serve as the primary basis for any decision by Customer; (c) Xxxxxxxxxx makes no representation, warranty, or guarantee as to, and shall not be responsible for, the accuracy or completeness of any information or trading recommendation furnished to Customer; (d) recommendations to Customer as to any particular transaction at any given time may differ among Xxxxxxxxxx’x personnel due to diversity in analysis of fundamental and technical factors and may vary from any standard recommendation made by Xxxxxxxxxx in its market letters or otherwise; and (e) Xxxxxxxxxx has no obligation or responsibility to update any market recommendations or information it communicates to Customer. Customer understands that Xxxxxxxxxx and its officers, directors, affiliates, stockholders, representatives, or associated persons may have positions in and may intend to buy or sell Contracts which are the subject of market recommendations furnished to Customer, and that the market positions of Xxxxxxxxxx or any such officer, director, affiliate, stockholder, representative, or associated person may or may not be consistent with the recommendations furnished to Customer by Xxxxxxxxxx.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!