Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
PROTECTION OF WORK AND PROPERTY Contractor shall erect and properly maintain at all times, as required by conditions and progress of the Work, all necessary safeguards, signs, barriers, lights, and security persons for protection of workers and the public, and shall post danger signs warning against hazards created by the Work. In an emergency affecting life and safety of life or of Work or of adjoining property, Contractor, without special instruction or authorization from District, is permitted to act at his discretion to prevent such threatened loss or injury.
Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back-Up Policy available at XxxxxXXX.xxx or such other website address as may be notified to the Customer as such document may be amended by the Supplier in its sole discretion from time to time the current version of which is set out at Schedule 3 of this Agreement. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (b) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (c) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (d) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage. 5.5 The Supplier and the Customer shall comply with their respective obligations as set out in Schedule 4 of this Agreement
Custom Products Effective upon creation of Custom Products, Contractor hereby conveys, assigns and transfers to Authorized User the sole and exclusive rights, title and interest in Custom Product(s), whether preliminary, final or otherwise, including all trademark and copyrights. Contractor hereby agrees to take all necessary and appropriate steps to ensure that the Custom Products are protected against unauthorized copying, reproduction and marketing by or through Contractor, its agents, employees, or Subcontractors. Nothing herein shall preclude the Contractor from otherwise using the related or underlying general knowledge, skills, ideas, concepts, techniques and experience developed under a Purchase Order, project definition or work order in the course of Contractor’s business. Authorized User may, by providing written notice thereof to the Contractor, elect in the alternative to take a non-exclusive perpetual license to Custom Products in lieu of Authorized User taking exclusive ownership and title to such Products. In such case, Licensee on behalf of all Authorized Users shall be granted a non-exclusive perpetual license to use, execute, reproduce, display, perform, adapt and distribute Custom Product as necessary to fully effect the general business purpose(s) as stated in paragraph (b)(i)(2), above.
Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.
Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.
Assignment of Work Product (i) If at any time during the Term or thereafter, Employee has made or shall make (either alone or with others, and whether before or after the date of this Agreement), conceive, create, discover, invent or reduce to practice any invention, design, development, improvement, process, software program, work of authorship, or technique, in whole or in part, or which results from any work which Employee may do for or at the request of the Company, whether or not conceived by Employee while on holiday, on vacation, or off the premises of the Company, whether or not patentable or registrable under copyright or similar laws (herein called “Developments”) that (a) relate to the business of the Company or any of the products or services being developed, manufactured or sold by the Company, or (b) result directly or indirectly from tasks assigned to Employee by the Company or (c) result from the use of premises or property (whether tangible or intangible) owned, leased or contracted for by the Company, such Developments and all rights and interests therein and all records relating to such Developments shall be the sole and absolute property of the Company. Employee shall promptly disclose to the Company each such Development and Employee shall deliver to the Company all records relating to each such Development. Employee hereby assigns any rights (including, but not limited to, any rights under patent law and copyright law or other similar laws) that Employee may have or acquire in the Developments to the Company, without further compensation. Where applicable, all Developments which are copyrightable works shall be works made for hire. To the extent any such work of authorship may not be deemed to be a work made for hire, Employee agrees to, and does hereby, irrevocably, perpetually and unconditionally transfer and assign to the Company all right, title, and interest including copyright in and to such work without further compensation. (ii) Employee will, during the Term and at all times thereafter, at the request and cost of the Company, promptly sign all such assignments, applications and other documents, and take such other actions, as the Company and its duly authorized agents may reasonably require: (A) to evidence the Company’s ownership of any Development and to apply for, obtain, register and vest in the name of the Company, or renew, patents, copyrights, trademarks or other similar rights for any Development in any country throughout the world and (B) to initiate or defend any judicial, administrative or other proceedings in respect of such patents, copyrights, trademarks or other similar rights. (iii) In the event the Company is unable, after reasonable effort, to secure Employee’s signature for such purposes for any reason whatsoever, Employee hereby irrevocably designates and appoints the Company and its duly authorized officers and agents as Employee’s agents and attorneys-in-fact, to act for and in Employee’s name, behalf and stead, to execute and file any such assignments, applications or other documents and to do all other lawfully permitted acts to further the obtaining and protection of such patents, copyright or trademark registrations or other rights with the same legal force and effect as if executed by Employee. (iv) Employee represents and warrants that (A) Employee does not have any pre-existing inventions that relate to the business of the Company and all inventions that Employee has made and owns the intellectual property rights to as of the Effective Date that relate to the business of the Company shall be considered Developments and are subject to the terms of Section 8(b) and (B) all Developments that Employee has developed or with respect to which Employee has been associated while employed by the Company are the sole property of the Company and that there are no other claims or ownership rights in such property with respect to any other party.
Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.
Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.
Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.