Copyright Protection for Computer Programs Sample Clauses

Copyright Protection for Computer Programs. Copyright protection for computer programs shall extend to all types of computer programs including application programs and operating systems which may be expressed in any language, whether in source or object code and regardless of their medium of fixation. The duration and level of protection for computer programs shall be consistent with that provided to other literary works. Limitations on rights expressly permitted to apply to literary works under the Berne Convention for the Protection of Literary and Artistic Works (Paris 1971) shall also be made applicable to computer programs. In addition, owners of a copy of a computer program shall be provided the right to make or authorize the making of a single copy or adaptation of that computer program provided: (a) that such new copy or adaptation is created as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner; or (b) that such a new copy or adaptation is for archival purposes only and that all archival copies are destroyed in the event that continued possession of the computer program should cease to be rightful.
AutoNDA by SimpleDocs

Related to Copyright Protection for Computer Programs

  • PayPal's Seller Protection Program What’s eligible

  • Family Educational Rights and Privacy Act The Charter School is subject to all provisions of the Federal Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g. In the event the Charter School closes, it shall transmit all official student records in the manner prescribed by the State Board.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

  • PayPal’s Buyer Protection Program When you buy something from a seller who accepts PayPal, you may be eligible for a refund under PayPal’s Buyer Protection program. When applicable, PayPal’s Buyer Protection program entitles you to reimbursement for the full purchase price of the item plus the original shipping costs you paid, if any. PayPal determines, in its sole discretion, whether your claim is eligible for PayPal’s Buyer Protection program. PayPal’s original determination is considered final, but you may be able to file an appeal of the decision with PayPal if you have new or compelling information not available at the time of the original determination or you believe there was an error in the decision-making process. The program terms and conditions are set out in PayPal’s Buyer Protection program page and form part of this user agreement.

  • Xxxxx Disaster Protection In accordance with the requirements of the Flood Disaster Protection Act of 1973 (42 U.S.C. 4001), the Subrecipient shall assure that for activities located in an area identified by the Federal Emergency Management Agency (FEMA) as having special flood hazards, flood insurance under the National Flood Insurance Program is obtained and maintained as a condition of financial assistance for acquisition or construction purposes (including rehabilitation).

  • TEACHER PROTECTION A. The teachers shall have the right to review those things in his/her personnel file to which he/she is entitled by Law. At the option of the teacher, a representative of the Association may be present for such review. Each file shall contain a record indicating reviewer and date of review, excluding school personnel official access for record maintenance. B. The teacher may submit a written notation regarding any material and the same will be attached to the file copy of the material in question. If the teacher is asked to sign material placed in his/her file, such signature will be understood to indicate his/her awareness of the material but in no instance shall said signature be interpreted to mean agreement with the content of the material. X. Any serious complaint made against a teacher by any parent, student, and other person will be promptly called to the attention of the teacher. D. If a teacher is to be disciplined or reprimanded by the Board or its designee, he/she shall be entitled to have a representative of the Association present. That representative shall be the teacher's choice between the building representative or another Association officer. E. Each teacher has the responsibility for maintaining proper student control and discipline throughout the school day as well as at school-sponsored activities where he/she is serving as a sponsor or chaperone. The teacher, however, has the primary responsibility for maintaining control and discipline in his/her classroom. The Board will give reasonable support and assistance to teachers with respect to maintenance of control and discipline. Whenever is appears that a particular pupil requires special attention, reasonable steps shall be taken to provide such attention. The teachers recognize that all disciplinary actions and methods invoked by them shall be in accordance with established Board policy. F. Any case of assault upon a teacher which is related to a school-centered problem shall be promptly reported to the Board or its designated representative. If the assault was by a pupil or pupils, the Administration shall promptly investigate the matter and determine suitable discipline for the assaulting pupil. This decision shall be communicated to the teacher concerned. If the assault is by an adult, who is not a pupil, the Board its designee representative shall promptly report the incident to the proper law enforcement authorities. G. A teacher may suspend a pupil from one (1) period, when the grossness of the offense, the persistence of the misbehavior, or the disruptive effect of the violation makes the continued presence of the student in that classroom intolerable. In such cases, the teacher will promptly (by the end of the school day) furnish the administrator or counselor full particulars of the incident. The teacher and the administration will cooperatively endeavor to achieve correction of student behavior through whatever avenues are reasonably available. H. School administrators and teachers will endeavor to achieve correction of the students' misbehavior through counseling and interviews with the child and his/her parents when warranted.

  • Defend Trade Secrets Act Notice If this agreement is governed by United States law: (a) An individual shall not be held criminally or civilly liable under any Federal or State trade secret law for the disclosure of a trade secret that: (i) is made: (A) in confidence to a Federal, State, or local government official, either directly or indirectly, or to an attorney; and (B) solely for the purpose of reporting or investigating a suspected violation of law; or (ii) is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal. (b) An individual who files a lawsuit for retaliation by an employer for reporting a suspected violation of law may disclose the trade secret to the attorney of the individual and use the trade secret information in the court proceeding, if the individual: (i) files any document containing the trade secret under seal; and (ii) does not disclose the trade secret, except pursuant to court order.

  • Anti-Money Laundering/International Trade Law Compliance No Covered Entity is a Sanctioned Person. No Covered Entity, either in its own right or through any third party, (i) has any of its assets in a Sanctioned Country or in the possession, custody or control of a Sanctioned Person in violation of any Anti-Terrorism Law; (ii) does business in or with, or derives any of its income from investments in or transactions with, any Sanctioned Country or Sanctioned Person in violation of any Anti-Terrorism Law; or (iii) engages in any dealings or transactions prohibited by any Anti-Terrorism Law.

  • Convicted, Discriminatory, Antitrust Violator, and Suspended Vendor Lists In accordance with sections 287.133, 287.134, and 287.137, F.S., the Contractor is hereby informed of the provisions of sections 287.133(2)(a), 287.134(2)(a), and 287.137(2)(a), F.S. For purposes of this Contract, a person or affiliate who is on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List may not perform work as a contractor, supplier, subcontractor, or consultant under the Contract. The Contractor must notify the Department if it or any of its suppliers, subcontractors, or consultants have been placed on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List during the term of the Contract. In accordance with section 287.1351, F.S., a vendor placed on the Suspended Vendor List may not enter into or renew a contract to provide any goods or services to an agency after its placement on the Suspended Vendor List. A firm or individual placed on the Suspended Vendor List pursuant to section 287.1351, F.S., the Convicted Vendor List pursuant to section 287.133, F.S., the Antitrust Violator Vendor List pursuant to section 287.137, F.S., or the Discriminatory Vendor List pursuant to section 287.134, F.S., is immediately disqualified from Contract eligibility.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!