Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.
Sublicense to Use the Scudder Trademarks As exclusive licensee of the rights to use anx xxxxxcense the use of the "Scudder," "Scudder Investments" and "Scudder, Stevens & Clark, Inx." xxxdemaxxx (xxgether, the "Scuddex Xxxxx"), xxx xerexx xxant the Trust a nonexclusive right xxx xxxlicense to use (i) the "Scudder" name and mark as part of the Trust's name (the "Fund Namx"), xxd (ii) the Scudder Marks in connection with the Trust's investment products xxx xxxvices, in each case only for so long as this Agreement, any other investment management agreement between you or any organization which shall have succeeded to your business as investment manager ("your Successor") and the Trust, or any extension, renewal or amendment hereof or thereof remains in effect, and only for so long as you are a licensee of the Scudder Marks, provided however, that you agree to use your best xxxxxxx to maintain your license to use and sublicense the Scudder Marks. The Trust agrees that it shall have no right to suxxxxxxxe or assign rights to use the Scudder Marks, shall acquire no interest in the Scudder Marks othxx xxxx the rights granted herein, that all of txx Xxxxt's uses of the Scudder Marks shall inure to the benefit of Scudder Trust Company xx xxxer and licensor of the Scudder Marks (xxx "Xrademark Owner"), and that the Trust shall nxx xxxxlenge the validity of the Scudder Marks or the Trademark Owner's ownership thereof. The Truxx xxxxher agrees that all services and products it offers in connection with the Scudder Marks shall meet commercially reasonable standards of duaxxxx, xs may be determined by you or the Trademark Owner from time to time, provided that you acknowledge that the services and products the Trust rendered during the one-year period preceding the date of this Agreement are acceptable. At your reasonable request, the Trust shall cooperate with you and the Trademark Owner and shall execute and deliver any and all documents necessary to maintain and protect (including but not limited to in connection with any trademark infringement action) the Scudder Marks and/or enter the Trust as a registered user thereof. Xx xxch time as this Agreement or any other investment management agreement shall no longer be in effect between you (or your Successor) and the Trust, or you no longer are a licensee of the Scudder Marks, the Trust shall (to the extent that, and as soon ax, xx xawfully can) cease to use the Fund Name or any other name indicating that it is advised by, managed by or otherwise connected with you (or your Successor) or the Trademark Owner. In no event shall the Trust use the Scudder Marks or any other name or mark confusingly similar therexx (xxxluding, but not limited to, any name or mark that includes the name "Scudder") if this Agreement or any other investment advisory agrexxxxx xetween you (or your Successor) and the Fund is terminated.
Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.
Pre-Existing Materials 5.3.1. Citizens acknowledges that, in the course of performing the Services, Vendor may use materials, software, reports, routines, language, instructions, methods, techniques, trade secrets, patents, copyrights, or other intellectual property that have been previously developed, purchased, licensed, or acquired by Vendor or by third parties (collectively, the "Pre-Existing Materials"), and that such Pre-Existing Materials shall remain the sole and exclusive property of Vendor or the third parties. Where Vendor seeks to embed Pre-Existing Materials in the Work Product, Vendor must first obtain written approval from Citizens. 5.3.2. If and to the extent any Pre-Existing Materials of Vendor are embedded or incorporated in the Work Product, Vendor hereby grants to Citizens the irrevocable, perpetual, non-exclusive, worldwide, royalty-free right and license to: (a) use, execute, reproduce, display, perform, distribute copies of and prepare derivative works based upon such Pre-existing Materials and any derivative works thereof for Citizens’ internal business purposes only; and, (b) authorize others to do any or all of the foregoing for Citizens’ internal business purposes only. 5.3.3. If and to the extent any Pre-Existing Materials of third parties are embedded or incorporated in the Work Product, Vendor shall secure for Citizens an irrevocable, perpetual, non-exclusive, worldwide, royalty-free and fully paid-up right to use, execute, display, and perform such Pre-Existing Materials. Vendor shall secure such right at its expense and prior to incorporating any such Pre-Existing Materials into any Work Product, and such right must include, if practicable, a right to: (a) copy, modify, and create derivative works based upon such Pre-Existing Materials; and, (b) sublicense all or any portion of the foregoing rights to an affiliate or a third party service provider of Citizens. This Section does not apply to standard office software (e.g., Microsoft Office).
Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.
Use of Customer Statements The Contractor shall not use any statement attributable to the Customer or its employees for the Contractor’s promotions, press releases, publicity releases, marketing, corporate communications, or other similar communications, without first notifying the Customer’s Contract Manager and securing the Customer’s prior written consent.
Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.
COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).
License for Txdot Logo Use DocuSign Envelope ID: 08011FCF-93C2-4F54-8A05-20A33047A1D8