DATA EXPLOITATION Sample Clauses

DATA EXPLOITATION. The Customer owns all the Data. The customer is solely responsible for the quality, lawfulness and relevance of the Data that it transmits to the Service Provider as well as for their use with the Application Service and the results thereof. In addition, the Customer guarantees to be the owner of all rights (including intellectual property rights and authorization of third parties) allowing him/her to use the Data. The Customer guarantees that the Data does not violate the laws and regulations in force, the rights of third parties and is free from any virus or malicious code likely to harm the Solution or the Application Service. If the Service Provider becomes aware that an element of the Data violates the above stipulations, the Service Provider is entitled to remove or render unavailable such an element. The Customer guarantees the Service Provider in the event of failure to comply with the stipulations of this article. The customer undertakes to defend the Service Provider at its own expense and indemnify the Service Provider against any costs, claims or damages incurred by the Service Provider or for which the Service Provider may be liable due to the customer's default.
AutoNDA by SimpleDocs
DATA EXPLOITATION. The Licensee owns all the Data. The Licensee is solely responsible for the quality, lawfulness and relevance of the Data that it transmits to the Processor as well as for their use with the Application Service and the results thereof. In addition, the Licensee guarantees to be the owner of all rights (including intellectual property rights and authorization of third parties) allowing him/her to use the Data. The Licensee guarantees that the Data does not violate the laws and regulations in force, the rights of third parties and is free from any virus or malicious code likely to harm the Solution or the Application Service. If the Processor becomes aware that an element of the Data violates the above stipulations, the Processor is entitled to remove or render unavailable such an element. The Licensee guarantees the Processor in the event of failure to comply with the stipulations of this article. The Licensee undertakes to defend the Processor at its own expense and indemnify the Processor against any costs, claims or damages incurred by the Processor or for which the Processor may be liable due to the Licensee's default.
DATA EXPLOITATION. The Business Model of Data CollectionData flow: The channel where data is transferred from one entity to another. A dataset is shared across several repositories. Each repository holds an 1. An example of the management flow and data flow: Let Company A be offering a service via mobile app, in which it is necessary to collect sensitive data, e.g. face and voice. This company has an service-level-agreement (SLA) with Company B, which stores and processes the datasets for Company A. At time t = t0, Company A creates an electronic consent (e-consent) for the data subject who agrees the processing of his/hers dataset. Later, at time t = t1, Company A creates new agreements with another Company C to carry out their business, selling their solutions on processing data. As new actors come into the scenario, their actions may affect the current agreement between the data subject and Company A. instance of this dataset. Each instance is a derivative of the original dataset. Formally, the formula can be described as follows: d∗ = f2(dj = f1(d, P1), P2) , where d is the original dataset, functions f1, f2 are transformation functions (e.g. pseudonymisation operations), and P1, P2 sets of policies applied to d and dj, respectively. The ideal situation is setting an equilibrium between parties. Within this exchange context, the value of a dataset to the data subject is balanced with the value of that dataset to the aggregated data processor within its domain. Therefore, the service or tool value offered is proportional to the value of the dataset exchanged along with the related costs. An important factor that aims 8 X. Xxxxxxxx-Xxxxx et al. this equilibrium are the data regulations, which are forcing companies to enforce transparency, and accountability regarding customers’ privacy. For this purpose, they relay on data subject consent and privacy policies. Hence, privacy policies and the user’s consent are static entities that determines the relationship, actions and conditions between the actors of the dynamic system.
DATA EXPLOITATION. The Customer owns all the Data.
DATA EXPLOITATION 

Related to DATA EXPLOITATION

  • Exploitation (i) Exploitation of intellectual property may take the form of patenting by the originator singly or in combination with other agencies. (ii) The parties patenting the property shall reach a mutually agreeable arrangement including ownership and revenue sharing which shall be reduced to writing. (iii) In the event that the employee reaches an agreement to use the offices of the Innovation Transfer Office, disputes shall be handled in accordance with Article

  • SEXUAL EXPLOITATION 18.1 The Contractor shall take all appropriate measures to prevent sexual exploitation or abuse of anyone by it or by any of its employees or any other persons who may be engaged by the Contractor to perform any services under the Contract. For these purposes, sexual activity with any person less than eighteen years of age, regardless of any laws relating to consent, shall constitute the sexual exploitation and abuse of such person. In addition, the Contractor shall refrain from, and shall take all appropriate measures to prohibit its employees or other persons engaged by it from, exchanging any money, goods, services, offers of employment or other things of value, for sexual favors or activities, or from engaging in any sexual activities that are exploitive or degrading to any person. The Contractor acknowledges and agrees that the provisions hereof constitute an essential term of the Contract and that any breach of this representation and warranty shall entitle UNDP to terminate the Contract immediately upon notice to the Contractor, without any liability for termination charges or any other liability of any kind. 18.2 UNDP shall not apply the foregoing standard relating to age in any case in which the Contractor’s personnel or any other person who may be engaged by the Contractor to perform any services under the Contract is married to the person less than the age of eighteen years with whom sexual activity has occurred and in which such marriage is recognized as valid under the laws of the country of citizenship of such Contractor’s personnel or such other person who may be engaged by the Contractor to perform any services under the Contract.

  • Licensed Products Lessee will obtain no title to Licensed Products which will at all times remain the property of the owner of the Licensed Products. A license from the owner may be required and it is Lessee's responsibility to obtain any required license before the use of the Licensed Products. Lessee agrees to treat the Licensed Products as confidential information of the owner, to observe all copyright restrictions, and not to reproduce or sell the Licensed Products.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Commercialization Intrexon shall have the right to develop and Commercialize the Reverted Products itself or with one or more Third Parties, and shall have the right, without obligation to Fibrocell, to take any such actions in connection with such activities as Intrexon (or its designee), at its discretion, deems appropriate.

  • Licensed Product The term “Licensed Product” shall mean any product (a) the manufacture, use, importation, sale or offer for sale of which would, in the absence of the license granted by this Agreement, infringe a Valid Claim of any of the Licensed Patent Rights, or (b) that is comprised of, utilizes or incorporates Licensed Biological Materials, or (c) that is discovered, developed or made using a Licensed Process.

  • Third Party Products and Services Any third-party hardware, software and/or services that is delivered by ResMed for use either standalone or in conjunction with ResMed products and/or services, shall be subject to the third-party terms and conditions and/or license agreements between Customer and the third party. Such third-party hardware, software and/or services is provided by ResMed "AS IS," without any warranty of any kind. Any representations or warranties as to such hardware, software and/or services shall only be as granted by the applicable third parties, if any, that accompany such products and/or software and/or services. Any representations, warranties, or other similar obligations with respect to such third-party hardware, software and/or services flow directly from the third party to Customer and ResMed shall have no responsibility at all for any such representations, warranties, obligations or lack thereof.

  • Collaboration 31.1 If the Buyer has specified in the Order Form that it requires the Supplier to enter into a Collaboration Agreement, the Supplier must give the Buyer an executed Collaboration Agreement before the Start date. 31.2 In addition to any obligations under the Collaboration Agreement, the Supplier must: 31.2.1 work proactively and in good faith with each of the Buyer’s contractors 31.2.2 co-operate and share information with the Buyer’s contractors to enable the efficient operation of the Buyer’s ICT services and G-Cloud Services

  • Links to Third Party Sites/Third Party Services xxx.xxxxxxxxxxxxxxxxxx.xxx may contain links to other websites ("Linked Sites"). The Linked Sites are not under the control of Company and Company is not responsible for the contents of any Linked Site, including without limitation any link contained in a Linked Site, or any changes or updates to a Linked Site. Company is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by Company of the site or any association with its operators. Certain services made available via xxx.xxxxxxxxxxxxxxxxxx.xxx are delivered by third party sites and organizations. By using any product, service or functionality originating from the xxx.xxxxxxxxxxxxxxxxxx.xxx domain, you hereby acknowledge and consent that Company may share such information and data with any third party with whom Company has a contractual relationship to provide the requested product, service or functionality on behalf of xxx.xxxxxxxxxxxxxxxxxx.xxx users and customers.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!