DATA AND TECHNOLOGY Sample Clauses

DATA AND TECHNOLOGY. 21.1 To facilitate provision of the Services set out herein, Renaissance or any of its Associates may provide you with certain Data and Technology. Portions of such Data and Technology may be owned by, provided by or otherwise subject to rights, conditions or limitations imposed by third parties (each of them the “Third Party Provider”). You agree to comply with and not breach any such Third Party Provider rights, conditions or limitations. 21.2 All Data and Technology are provided to the Customer “AS IS,” “AS AVAILABLE” and “AS ACCESSIBLE.” Renaissance makes no representations or warranties, express or implied, regarding any Data and Technology or any information or data transmitted over systems and networks provided as part of the Data and Technology, including but not limited to any warranties of performance, quality, accuracy, accessibility, completeness, timeliness, adequacy, security, safety, merchantability, trade-usage, non-infringement, fitness for a particular purpose or compliance with any regulatory or legal obligations. 21.3 Renaissance and the Third Party Providers shall not be responsible for and shall have no liability to the Customer, its Associates, its clients or any third party with respect to any of the Data and Technology or for any inaccuracies, errors, omissions, losses of data or information, interruptions or delays, regardless of cause, in such Data and Technology or arising in connection with the use thereof. 21.4 The Customer agrees that it is using any such Data and Technology entirely at its own risk. The Customer understands and agrees that Renaissance may revoke or limit the Customer’s access to or use of any Data and Technology at any time for any reason at Renaissance’s sole discretion, with or without prior notice to the Customer. 21.5 The Customer assumes the entire risk of using the Data and Technology and agrees to hold Renaissance harmless from and against any and all claims, proceedings, causes of action, liabilities, losses, damages and expenses arising from or relating to the Customer’s use of the Data and Technology. The Customer agrees that its use of any Data and Technology is subject to a requirement of strict confidentiality. 21.6 You may be supplied with Passwords. You may not share the Passwords with any third party or unauthorised user. You shall maintain adequate internal procedures and controls over the Passwords. Renaissance may request, and you shall provide Renaissance with, a list of the persons autho...
AutoNDA by SimpleDocs
DATA AND TECHNOLOGY. 1. FSMC shall, on a daily basis, record all breakfast, lunch (to include salad bars), a la carte, supper and snack counts and cash intake into POS/BOH software, including data from rosters or other approved meal count forms. 2. FSMC shall ensure each applicable service line employs an operational point of sale at all times, including standalone salad bars serving reimbursable meals. 3. FSMC shall not request nor disclose student personal data as specified by the Children’s Online Privacy Protection Act (COPPA) or the Family Educational Rights and Privacy Act (FERPA). 4. If the POS is inoperable or if meals are served outside of the cafeteria, the FSMC shall use a roster generated from POS/BOH software to document which students are served lunch at SOP schools and a tally sheet at CEP schools. 5. The FSMC shall maintain meal rosters in such fashion as to comply with federal regulations on overt identification. 6. All data files, including those generated by DCPS-owned technology systems including POS and student files, are owned solely by DCPS and must reside exclusively within District-owned data systems. 7. FSMC shall utilize and help maintain all DCPS POS’ equipment including client monitors, manager computers, Cashless serving units, pin pads, and scanners, including but not limited to promptly reporting any issues with this equipment within 48 hours via DCPS’s Quickbase reporting system. 8. FSMC shall implement and utilize all software applications as adopted by DCPS. All software licenses and databases are the exclusive property of DCPS. 9. FSMC shall ensure the manager computer is turned on at all times to facilitate point of sale data replication; and 10. Failure to provide accurate POS data, or deliberate alteration of this data in any way, shall constitute a material breach of the contract.
DATA AND TECHNOLOGY 

Related to DATA AND TECHNOLOGY

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Foreground IP The following subparagraphs of this paragraph e shall not apply to any Services to the extent their development was funded by the U.S. Government. i. All IP conceived, developed, or first reduced to practice by, for, or with Seller, either alone or with others, in performance of this Contract (collectively, “Foreground IP”) shall be the exclusive property of Buyer. To the extent Foreground IP consists of works of authorship, such works shall be works made for hire with the copyrights vesting in Buyer. Seller hereby transfers, conveys, and assigns all right, title and interest in such Foreground IP free of charge to Buyer. Seller hereby irrevocably transfers, conveys, and assigns all right, title and interest in any other Foreground IP not considered a work made for hire free of charge to Buyer. Seller shall protect Foreground IP that is Proprietary Information and Materials as required by this Contract and shall mark documents or portions of documents containing Foreground IP as “Boeing Proprietary” information or as otherwise directed by Xxxxx in writing. ii. Seller will, within two (2) months after conception or first actual reduction to practice of any invention and prior to Contract completion, disclose in writing to Buyer all inventions, whether or not patentable, in sufficient technical detail to clearly convey the invention to one skilled in the art to which the invention pertains. Seller shall promptly execute all written instruments, and assist as Buyer reasonably directs in order to file, acquire, prosecute, maintain, enforce and assign Buyer’s Foreground IP rights. Seller hereby irrevocably appoints Xxxxx and any of Buyer’s officers and agents as Xxxxxx’s attorney in fact to act on Xxxxxx’s behalf and instead of Seller, with the same legal force and effect as if executed by Xxxxxx, with respect to executing any such written instruments. iii. Buyer grants to Seller a non-exclusive, royalty-free right during the term of this Contract to use, reproduce, modify, practice and prepare derivative works of any Foreground IP solely as necessary for Seller to perform its obligations under this Contract, except that, notwithstanding the foregoing, Seller may use and disclose Proprietary Information and Materials as permitted under this Contract. Seller shall not, without Buyer’s prior written consent, use Foreground IP or such derivative works in any manner not authorized under this Contract, including, but not limited to, developing, manufacturing, obtaining a certification to manufacture, offering for sale or selling any product, equipment, or service which utilizes or is enabled by Foreground IP.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Background IP As between the Parties, each Party will retain all right, title and interest in and to all of its Background IP.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!