Intellectual Property The Company and the Subsidiaries have, or have rights to use, all patents, patent applications, trademarks, trademark applications, service marks, trade names, trade secrets, inventions, copyrights, licenses and other intellectual property rights and similar rights necessary or required for use in connection with their respective businesses as described in the SEC Reports and which the failure to so have could have a Material Adverse Effect (collectively, the “Intellectual Property Rights”). None of, and neither the Company nor any Subsidiary has received a notice (written or otherwise) that any of, the Intellectual Property Rights has expired, terminated or been abandoned, or is expected to expire or terminate or be abandoned, within two (2) years from the date of this Agreement. Neither the Company nor any Subsidiary has received, since the date of the latest audited financial statements included within the SEC Reports, a written notice of a claim or otherwise has any knowledge that the Intellectual Property Rights violate or infringe upon the rights of any Person, except as could not have or reasonably be expected to not have a Material Adverse Effect. To the knowledge of the Company, all such Intellectual Property Rights are enforceable and there is no existing infringement by another Person of any of the Intellectual Property Rights. The Company and its Subsidiaries have taken reasonable security measures to protect the secrecy, confidentiality and value of all of their intellectual properties, except where failure to do so could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.
Deliverables Upon satisfactory completion of the work authorization, the Engineer shall submit the deliverables as specified in the executed work authorization to the State for review and acceptance.
Subcontractors The Contractor will not subcontract any work under the Contract without prior written consent of the Department. The Contractor is fully responsible for satisfactory completion of all its subcontracted work. The Department supports diversity in its procurements and contracts, and requests that the Contractor offer subcontracting opportunities to certified woman-, veteran-, and minority-owned small businesses. The Contractor may contact the OSD at xxxxxxx@xxx.xxxxxxxxx.xxx for information on certified small business enterprises available for subcontracting opportunities.
Statement of Work The Contractor shall provide the services and staff, and otherwise do all things necessary for or incidental to the performance of work, as set forth below:
Additional Services Registry Operator shall be entitled to provide the Registry Services described in clauses (a) and (b) of the first paragraph of Section 2.1 in the Specification 6 attached hereto (“Specification 6”) and such other Registry Services set forth on Exhibit A (collectively, the “Approved Services”). If Registry Operator desires to provide any Registry Service that is not an Approved Service or is a material modification to an Approved Service (each, an “Additional Service”), Registry Operator shall submit a request for approval of such Additional Service pursuant to the Registry Services Evaluation Policy at xxxx://xxx.xxxxx.xxx/en/registries/rsep/rsep.html, as such policy may be amended from time to time in accordance with the bylaws of ICANN (as amended from time to time, the “ICANN Bylaws”) applicable to Consensus Policies (the “RSEP”). Registry Operator may offer Additional Services only with the written approval of ICANN, and, upon any such approval, such Additional Services shall be deemed Registry Services under this Agreement. In its reasonable discretion, ICANN may require an amendment to this Agreement reflecting the provision of any Additional Service which is approved pursuant to the RSEP, which amendment shall be in a form reasonably acceptable to the parties.
Services FASC agrees to provide to the Adviser the services indicated in Exhibit A to this Agreement (the “Services”).
Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.
Subprocessors Provider shall enter into written agreements with all Subprocessors performing functions for the Provider in order for the Provider to provide the Services pursuant to the Service Agreement, whereby the Subprocessors agree to protect Student Data in a manner no less stringent than the terms of this DPA.
Confidential Information “Confidential Information” shall mean (i) Highly Confidential Information (as defined below), (ii) any other technology, software development tools, methodologies, processes, algorithms, test data sets and test data cases and related documentation that CI Plus LLP provides to Licensee hereunder in order to facilitate Licensee’s exercise of its rights and performance of its obligations hereunder, and (iii) any other information of CI Plus LLP and information of Licensee, each of which is clearly marked as “Confidential” or a similar expression when disclosed in written or electronic form, or indicated as “Confidential” when disclosed orally and confirmed in writing within thirty (30) calendar days after such disclosure. “Confidential Information” shall not include information which: (a) was in the possession of, or was known by, the receiving party ("Recipient") prior to its receipt from the disclosing party (“Discloser), without an obligation owed to Discloser, or its licensors, to maintain its confidentiality; (b) is or becomes generally known to the public without violation of this Agreement by the “Recipient”; (c) is obtained by Recipient from a third party, without an obligation owed to such third party to keep such information confidential; or (d) is independently developed by Recipient without use of any Confidential Information of the other party. Recipient agrees that it shall use reasonable care to keep the Confidential Information of the other party strictly confidential and not disclose it to any other person except to its Affiliates and its and their respective employees, contractors, consultants, agents, customers and representatives (other than Members) who have a “need to know” for the purposes of this Agreement and are obligated by Licensee to be bound by the same confidentiality obligation which Recipient is bound by under this Exhibit H, provided however that Recipient may disclose Highly Confidential Information only in accordance with Section 2 of this Exhibit H. Recipient shall be responsible for any breach of such confidentiality obligation by such parties, including former employees, Affiliates, contractors, consultants, agents, customers (other than Members) and representatives. Recipient shall protect the Confidential Information of the other party with the same degree of care as it normally uses in the protection of its own similar confidential and proprietary information, but in no case with any less than reasonable care. Notwithstanding anything in this Exhibit H to the contrary, Confidential Information may be disclosed by Recipient pursuant to the order or requirements of a court or governmental administrative agency or other governmental body of competent jurisdiction, provided that (x) Discloser has been notified of such a disclosure request immediately after Recipient knows such order or requirements in order to afford Discloser reasonable opportunity to obtain a protective order or otherwise prevent or limit the scope of such disclosure to the extent permitted by law and (y) Recipient cooperates in good faith with such efforts by Discloser. The obligations under this Exhibit H shall terminate three years after the date of the last shipment of product using the Licensed Technology by Licensee or any other licensee of the Licensed Technology; provided that Sections 2.0(b), 2.0(c), and 3.0 in this Exhibit H shall cease to apply when the Recipient has returned all tangible embodiments of Licensed Technology in its possession to the Discloser.
Subprocessor For the purposes of this DPA, the term “Subprocessor” (sometimes referred to as the “Subcontractor”) means a party other than LEA or Provider, who Provider uses for data collection, analytics, storage, or other service to operate and/or improve its service, and who has access to Student Data.