DEFINITION OF DOMAIN NAMES Sample Clauses

DEFINITION OF DOMAIN NAMES. As used in this Assignment, "
AutoNDA by SimpleDocs

Related to DEFINITION OF DOMAIN NAMES

  • Definition of Customer Information Any Customer Information will remain the sole and exclusive property of the Trust. “Customer Information” shall mean all non-public, personally identifiable information as defined by Xxxxx-Xxxxx-Xxxxxx Act of 1999, as amended, and its implementing regulations (e.g., SEC Regulation S-P and Federal Reserve Board Regulation P) (collectively, the “GLB Act”).

  • Definition of Proprietary Information The Executive acknowledges that he may be furnished or may otherwise receive or have access to confidential information which relates to the Company’s past, present or future business activities, strategies, services or products, research and development; financial analysis and data; improvements, inventions, processes, techniques, designs or other technical data; profit margins and other financial information; fee arrangements; compilations for marketing or development; confidential personnel and payroll information; or other information regarding administrative, management, or financial activities of the Company, or of a third party which provided proprietary information to the Company on a confidential basis. All such information, including in any electronic form, and including any materials or documents containing such information, shall be considered by the Company and the Executive as proprietary and confidential (the “Proprietary Information”).

  • Definition of Confidential Information The term “Confidential Information” shall mean all information that either party discloses (a “Disclosing Party”) to the other party (a “Receiving Party”), whether in writing, electronically, or orally and in any form (tangible or intangible), that is confidential, proprietary, or relates to clients or shareholders (each either existing or potential). Confidential Information includes, but is not limited to:

  • Confidential Information Definition Grantee acknowledges it and its employees or agents may, in the course of performing its responsibilities, be exposed to or acquire information that is: (i) confidential to Agency or Project participants or (ii) the disclosure of which is restricted under federal or state law, including without limitation: (a) personal information, as that term is used in ORS 646A.602(12), (b) social security numbers, and (c) information protected by the federal Family Educational Rights and Privacy Act under 20 USC § 1232g (items (i) and (ii) separately and collectively “Confidential Information”).

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Confidential Information and Invention Assignment Agreement Executive acknowledges that he has previously executed and delivered to an officer of the Company the Company’s Confidential Information and Invention Assignment Agreement (the “Confidentiality Agreement”) and that the Confidentiality Agreement remains in full force and effect.

  • Assignment of Work Product (i) If at any time during the Term or thereafter, Employee has made or shall make (either alone or with others, and whether before or after the date of this Agreement), conceive, create, discover, invent or reduce to practice any invention, design, development, improvement, process, software program, work of authorship, or technique, in whole or in part, or which results from any work which Employee may do for or at the request of the Company, whether or not conceived by Employee while on holiday, on vacation, or off the premises of the Company, whether or not patentable or registrable under copyright or similar laws (herein called “Developments”) that (a) relate to the business of the Company or any of the products or services being developed, manufactured or sold by the Company, or (b) result directly or indirectly from tasks assigned to Employee by the Company or (c) result from the use of premises or property (whether tangible or intangible) owned, leased or contracted for by the Company, such Developments and all rights and interests therein and all records relating to such Developments shall be the sole and absolute property of the Company. Employee shall promptly disclose to the Company each such Development and Employee shall deliver to the Company all records relating to each such Development. Employee hereby assigns any rights (including, but not limited to, any rights under patent law and copyright law or other similar laws) that Employee may have or acquire in the Developments to the Company, without further compensation. Where applicable, all Developments which are copyrightable works shall be works made for hire. To the extent any such work of authorship may not be deemed to be a work made for hire, Employee agrees to, and does hereby, irrevocably, perpetually and unconditionally transfer and assign to the Company all right, title, and interest including copyright in and to such work without further compensation. (ii) Employee will, during the Term and at all times thereafter, at the request and cost of the Company, promptly sign all such assignments, applications and other documents, and take such other actions, as the Company and its duly authorized agents may reasonably require: (A) to evidence the Company’s ownership of any Development and to apply for, obtain, register and vest in the name of the Company, or renew, patents, copyrights, trademarks or other similar rights for any Development in any country throughout the world and (B) to initiate or defend any judicial, administrative or other proceedings in respect of such patents, copyrights, trademarks or other similar rights. (iii) In the event the Company is unable, after reasonable effort, to secure Employee’s signature for such purposes for any reason whatsoever, Employee hereby irrevocably designates and appoints the Company and its duly authorized officers and agents as Employee’s agents and attorneys-in-fact, to act for and in Employee’s name, behalf and stead, to execute and file any such assignments, applications or other documents and to do all other lawfully permitted acts to further the obtaining and protection of such patents, copyright or trademark registrations or other rights with the same legal force and effect as if executed by Employee. (iv) Employee represents and warrants that (A) Employee does not have any pre-existing inventions that relate to the business of the Company and all inventions that Employee has made and owns the intellectual property rights to as of the Effective Date that relate to the business of the Company shall be considered Developments and are subject to the terms of Section 8(b) and (B) all Developments that Employee has developed or with respect to which Employee has been associated while employed by the Company are the sole property of the Company and that there are no other claims or ownership rights in such property with respect to any other party.

  • Confidential Information and Invention Assignment Agreements Executive’s receipt of any payments or benefits under Section 3 (other than the accrued benefits set forth in Section 3(a)(i) or Section 3(b)(i)) will be subject to Executive continuing to comply with the terms of the At-Will Employment, Confidential Information, Invention Assignment and Arbitration Agreement between the Company and Executive, as such agreement may be amended from time to time.

  • Domain Names Licensee represents that it does not own any Internet domain names containing Citi Marks.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!