Degree of IP Protection Sample Clauses

Degree of IP Protection. The boards must have a minimum protection degree of IP40, according to the regulations in force, so that it is not possible to come into contact with any part under tension by inserting objects on the board.
AutoNDA by SimpleDocs

Related to Degree of IP Protection

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Waiver of Anti-dilution Protection The Sponsor and each Class B Holder hereby irrevocably (a) waives, subject to, and conditioned upon, the occurrence of the Closing, to the fullest extent permitted by law, and (b) agrees not to assert or perfect, any rights to adjustment or other anti-dilution protections in connection with the transactions contemplated by the Merger Agreement.

  • PATENT PROTECTION 10.1. LICENSEE shall be responsible for all past, present and future costs of filing, prosecution and maintenance of all United States patent applications contained in the LICENSED PATENTS. Any and all such United States patent applications, and resulting issued patents, shall remain the property of YALE.

  • Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.

  • Application of Takeover Protections The Company and the Board of Directors have taken all necessary action, if any, in order to render inapplicable any control share acquisition, business combination, poison pill (including any distribution under a rights agreement) or other similar anti-takeover provision under the Company’s certificate of incorporation (or similar charter documents) or the laws of its state of incorporation that is or could become applicable to the Purchasers as a result of the Purchasers and the Company fulfilling their obligations or exercising their rights under the Transaction Documents, including without limitation as a result of the Company’s issuance of the Securities and the Purchasers’ ownership of the Securities.

  • Data Protection The Administrator shall implement and maintain a comprehensive written information security program that contains appropriate security measures to safeguard the personal information of the Trust’s shareholders, employees, directors and/or officers that the Administrator receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Preservation and Protection of Collateral (a) The Administrative Agent shall be under no duty or liability with respect to the collection, protection or preservation of the Collateral, or otherwise, beyond the use of reasonable care in the custody and preservation thereof while in its possession.

  • Protections Against Violations of Agreement No purported sale, assignment, mortgage, hypothecation, transfer, pledge, encumbrance, gift, transfer in trust (voting or other) or other disposition of, or creation of a security interest in or lien on, any of the Restricted Stock Units by any holder thereof in violation of the provisions of this Agreement or the Certificate of Incorporation or the Bylaws of the Company, will be valid, and the Company will not transfer any shares resulting from the settlement of Restricted Stock Units on its books nor will any of such shares be entitled to vote, nor will any dividends be paid thereon, unless and until there has been full compliance with such provisions to the satisfaction of the Company. The foregoing restrictions are in addition to and not in lieu of any other remedies, legal or equitable, available to enforce such provisions.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!