Documentation, Security and Ownership of Software Sample Clauses

Documentation, Security and Ownership of Software. Except as set forth on Schedule 3.16(d), Percon and its subsidiaries have user installation and operation manuals for all Software used in the development of or incorporated in Product Software that is critical to the development of products offered by Percon and its subsidiaries and for all Operations Software. Except as set forth on Schedule 3.16(d), all Product Software is documented through flow charts, designs, database models, entity relationship diagrams or business processes and user installation and procedure manuals that are sufficient to enable Percon and its subsidiaries to offer such Software to its customers and support such Software. Except as set forth on Schedule 3.16(d), neither Percon nor any of its subsidiaries has disclosed or delivered to any person, or permitted the disclosure or delivery to any escrow agent or other person, of the source code, or any portion or aspect of the source code, or any proprietary information or algorithm contained in any source code, of any Software. Except for Software that Percon and its subsidiaries license on a nonexclusive basis to its customers in the ordinary course of business and except as set forth on Schedule 3.16, Percon and its subsidiaries have not conveyed or granted any other rights to such Software, nor are Percon and its subsidiaries obligated to convey or grant any rights to license, market, incorporate in other Software, sell or otherwise use such Software to third parties, and to the knowledge of Percon, no third party has unauthorized access to such Software. Percon and its subsidiaries possess the original of all documentation, including without limitation all source codes, for all Software owned outright by it. Except as disclosed on Schedule 3.16(d), upon consummation of the transactions contemplated hereby, Percon and its subsidiaries or Surviving Corporation will continue to own all of the Software owned outright by Percon and its subsidiaries prior to the Closing, free and clear of all claims, liens, encumbrances, obligations and liabilities except for such claims, liens, encumbrances, obligations and liabilities of Percon and its subsidiaries (A) applicable to Software licensed to third parties and (B) as may be granted by Percon and its subsidiaries or Surviving Corporation after the Closing Date. Percon and its subsidiaries have provided to PSC or Newco access to or copies of Percon and its subsidiaries' customer support log and trouble shooting tools and solutions relating t...
AutoNDA by SimpleDocs

Related to Documentation, Security and Ownership of Software

  • Ownership of Software The Parties acknowledge that any software provided by the Authority is and remains the property of the Authority.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.

  • Ownership of Software and Related Material All computer programs, magnetic tapes, written procedures, and similar items purchased and/or developed and used by Price Associates in performance of this Agreement shall be the property of Price Associates and will not become the property of the Funds.

  • Ownership of Customer Data As between Oracle and Customer, all title and intellectual property rights in and to the Customer Data is owned exclusively by Customer. Customer acknowledges and agrees that in connection with the provision of the Services, Oracle may store and maintain Customer Data for a period of time consistent with Oracle’s standard business processes for the Services. Following expiration or termination of the Agreement or a Customer account, if applicable, Oracle may deactivate the applicable Customer account(s) and delete any data therein. Customer grants Oracle the right to host, use, process, display and transmit Customer Data to provide the Services pursuant to and in accordance with this Agreement and the applicable Estimate/Order Form or SOW. Customer has sole responsibility for the accuracy, quality, integrity, legality, reliability, and appropriateness of Customer Data, and for obtaining all rights related to Customer Data required by Oracle to perform the Services.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.

  • Completeness and Contents of Instructions The Authorized Person shall be responsible for assuring the adequacy and accuracy of Instructions. Particularly, upon any acquisition or disposition or other dealing in the Fund's Investments and upon any delivery and transfer of any Investment or moneys, the person initiating the Instruction shall give the Custodian an Instruction with appropriate detail, including, without limitation: 4.3.1 The transaction date and the date and location of settlement; 4.3.2 The specification of the type of transaction; 4.3.3 A description of the Investments or moneys in question, including, as appropriate, quantity, price per unit, amount of money to be received or delivered and currency information. Where an Instruction is communicated by electronic means, or otherwise where an Instruction contains an identifying number such as a CUSIP, SEDOL or ISIN number, the Custodian shall be entitled to rely on such number as controlling notwithstanding any inconsistency contained in the Instruction, particularly with respect to Investment description; and 4.3.4 The name of the broker or similar entity concerned with execution of the transaction. If the Custodian determines that an Instruction is either unclear or incomplete, the Custodian may give prompt notice of such determination to the Fund, and the Fund shall thereupon amend or otherwise reform the Instruction. In such event, the Custodian shall have no obligation to take any action in response to the Instruction initially delivered until the redelivery of an amended or reformed Instruction.

  • Intellectual Property and Confidentiality 9.1 All intellectual property rights in and relating to the goods we supply to you, their manufacture, development and creation (including improvements to them) will be or remain ours and you will, at our request, do any act and execute any documents necessary to confirm such rights. 9.2 The price of our goods, our intellectual property rights, any information deemed confidential by us, and the commercial terms of the Contract are commercially sensitive and confidential and you must keep them secret for a period of five years from the end of the Contract. You may disclose this information where required to by law, court order, regulation or act of any governmental authority provided (to the extent permissible by law) you notify us in advance and agree the scope of disclosure with it. 9.3 You shall indemnify and hold us harmless from any claims based on infringement of any intellectual property rights caused by our compliance with your specifications.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!