We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Development Security Technical Sample Clauses

Development Security TechnicalImplementation Guide (STIG), Version 3 Release 4. 2.3.9 OPNAVINST 5100.27.‌

Related to Development Security Technical

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Joint Technology The Parties agree that, in order to effectuate the provisions of Section 4.4.2, subject to any exclusive licenses granted hereunder, (a) the non-use provisions of this Article 9 shall not apply to each Party’s use of Joint Technology, and (b) each Party may disclose the Joint Technology to Third Parties who are under terms of confidentiality no less strict than those contained in this Agreement.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Covenants Regarding Patent, Trademark and Copyright Collateral (a) Each Grantor agrees that it will not, and will not permit any of its licensees to, do any act, or omit to do any act, whereby any Patent that is material to the conduct of such Grantor’s business may become abandoned, invalidated or dedicated to the public, and agrees that it shall use commercially reasonable efforts to continue to xxxx any products covered by a material Patent with the relevant patent number as necessary and sufficient to establish and preserve its maximum rights under applicable patent laws. (b) Except as could not reasonably be expected to result in a Material Adverse Effect, each Grantor (either itself or through its licensees or its sublicensees) will, for each Trademark material to the conduct of such Grantor’s business, (i) maintain such Trademark in full force free from any claim of abandonment or invalidity for non-use, (ii) use commercially reasonable efforts to maintain the quality of products and services offered under such Trademark, (iii) display such Trademark with notice of Federal or foreign registration to the extent necessary and sufficient to establish and preserve its maximum rights under applicable law and (iv) not knowingly use or knowingly permit the use of such Trademark in violation of any third party rights. (c) Each Grantor (either itself or through its licensees or sublicensees) will, for each work covered by a Copyright material to the conduct of such Grantor’s business, continue to publish, reproduce, display, adopt and distribute the work with appropriate copyright notice as necessary and sufficient to establish and preserve its maximum rights under applicable copyright laws. (d) Each Grantor shall notify the Collateral Agent promptly if it knows or has reason to know that any Patent, Trademark or Copyright material to the conduct of its business may become abandoned, lost or dedicated to the public, or of any adverse determination or development (including the institution of, or any such determination or development in, any proceeding in the United States Patent and Trademark Office, United States Copyright Office or any court or similar office of any country) regarding such Grantor’s ownership of any Patent, Trademark or Copyright, its right to register the same, or its right to keep and maintain the same. (e) Except as could not reasonably be expected to result in a Material Adverse Effect, no Grantor shall, either itself or through any agent, employee, licensee or designee, file an application for any Patent, Trademark or Copyright (or for the registration of any Trademark or Copyright) with the United States Patent and Xxxxxxxxx Xxxxxx, Xxxxxx Xxxxxx Copyright Office or any office or agency in any political subdivision of the United States or in any other country or any political subdivision thereof, unless it promptly notifies the Collateral Agent, and, upon request of the Collateral Agent, executes and delivers any and all agreements, instruments, documents and papers as the Collateral Agent may request to evidence the Security Interest in such Patent, Trademark or Copyright, and each Grantor hereby appoints the Collateral Agent as its attorney-in-fact to execute and file such writings for the foregoing purposes, all acts of such attorney being hereby ratified and confirmed; such power, being coupled with an interest, is irrevocable. (f) Except as could not reasonably be expected to result in a Material Adverse Effect, each Grantor will take all necessary steps that are consistent with the practice in any proceeding before the United States Patent and Trademark Office, United States Copyright Office or any office or agency in any political subdivision of the United States or in any other country or any political subdivision thereof, to maintain and pursue each material application relating to the Patents, Trademarks and/or Copyrights (and to obtain the relevant grant or registration) and to maintain each issued Patent and each registration of the Trademarks and Copyrights that is material to the conduct of any Grantor’s business, including timely filings of applications for renewal, affidavits of use, affidavits of incontestability and payment of maintenance fees, and, if consistent with good business judgment, to initiate opposition, interference and cancellation proceedings against third parties. (g) In the event that any Grantor knows or has reason to believe that any Article 9 Collateral consisting of a Patent, Trademark or Copyright material to the conduct of any Grantor’s business has been or is about to be infringed, misappropriated or diluted by a third person, such Grantor promptly shall notify the Collateral Agent and shall, if consistent with good business judgment, promptly xxx for infringement, misappropriation or dilution and to recover any and all damages for such infringement, misappropriation or dilution, and take such other actions as are appropriate under the circumstances to protect such Article 9

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • Patent Rights The State and the U. S. Department of Transportation shall have the royalty free, nonexclusive and irrevocable right to use and to authorize others to use any patents developed by the Engineer under this contract.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.