Exempted Scholarly Works Sample Clauses

Exempted Scholarly Works. The College specifically waives ownership rights to scholarly works to which academic institutions have traditionally waived such rights. Such works include, but are not limited to: 1. Textbooks, 2. Class notes, 3. Research proposals, 4. Course syllabi, classroom presentations, and instructional material. A “course syllabus” is the version of the official outline developed for use by the faculty member in the classroom. 5. Innovative products or procedures (which may appear in a variety of forms, such as printed matter, slides, web-based productions or multimedia presentations) resulting from or enhancing the teaching/learning process. For example, such material includes research articles and monographs; student theses and dissertations; paintings, drawings and sculptures; musical compositions and performances; dramatic works and performances; poetry, fiction, or nonfiction; lab-based or technological innovations or instructional procedures; or computer programs, languages or software.
AutoNDA by SimpleDocs
Exempted Scholarly Works. The University specifically waives ownership rights to scholarly works to which academic institutions have traditionally waived such rights, except as restricted elsewhere in the article. Such works include, but are not limited to: (a) Textbooks, (b) Class notes, (c) Research proposals, (d) Course outlines, (e) classroom presentations, and (f) instructional materials.

Related to Exempted Scholarly Works

  • Exempted Transfers Notwithstanding the foregoing or anything to the contrary herein, the provisions of Sections 2.1 and 2.2 shall not apply: (a) in the case of a Key Holder that is an entity, upon a transfer by such Key Holder to its stockholders, members, partners or other equity holders, (b) to a repurchase of Transfer Stock from a Key Holder by the Company at a price no greater than that originally paid by such Key Holder for such Transfer Stock and pursuant to an agreement containing vesting and/or repurchase provisions approved by a majority of the Board, or (c) in the case of a Key Holder that is a natural person, upon a transfer of Transfer Stock by such Key Holder made for bona fide estate planning purposes, either during his or her lifetime or on death by will or intestacy to his or her spouse, child (natural or adopted), or any other direct lineal descendant of such Key Holder (or his or her spouse) (all of the foregoing collectively referred to as “family members”), or to any other person approved by the Board, or to any custodian or trustee of any trust, partnership or limited liability company that is solely for the benefit of, or the ownership interests of which are owned solely by, such Key Holder or by any such family members; provided that in the case of clause(s) (a) or (c), the Key Holder shall deliver prior written notice to the Company and the Investors of such pledge, gift or transfer and such shares of Transfer Stock shall at all times remain subject to the terms and restrictions set forth in this Agreement and such transferee shall, as a condition to such issuance, deliver a counterpart signature page to this Agreement as confirmation that such transferee shall be bound by all the terms and conditions of this Agreement as a Key Holder (but only with respect to the securities so transferred to the transferee), including the obligations of a Key Holder with respect to Proposed Key Holder Transfers of such Transfer Stock pursuant to Section 2.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Acquisition of Shares by Third Party Other than an affiliate of EVe Mobility Acquisition Sponsor I LLC, any Person (as defined below) is or becomes the Beneficial Owner, directly or indirectly, of securities of the Company representing fifteen percent (15%) or more of the combined voting power of the Company’s then outstanding securities entitled to vote generally in the election of directors, unless (1) the change in the relative Beneficial Ownership of the Company’s securities by any Person results solely from a reduction in the aggregate number of outstanding shares entitled to vote generally in the election of directors, or (2) such acquisition was approved in advance by the Continuing Directors (as defined below) and such acquisition would not constitute a Change in Control under part (c) of this definition;

  • Contractor Designation of Trade Secrets or Otherwise Confidential Information If the Contractor considers any portion of materials to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to Contract-related materials it has designated trade secret or otherwise confidential.

  • Acquisition of Stock by Third Party Any Person (as defined below) is or becomes the Beneficial Owner (as defined below), directly or indirectly, of securities of the Company representing fifteen percent (15%) or more of the combined voting power of the Company’s then outstanding securities;

  • Your Liability for Unauthorized Transfers Immediately following your discovery of an unauthorized Payment Instruction, you shall communicate with customer care for the Service in the manner set forth in Section 6 of the General Terms above. You acknowledge and agree that time is of the essence in such situations. If you tell us within two (2) Business Days after you discover your password or other means to access your account through which you access the Service has been lost or stolen, your liability is no more than $50.00 should someone access your account without your permission. If you do not tell us within two (2) Business Days after you learn of such loss or theft, and we can prove that we could have prevented the unauthorized use of your password or other means to access your account if you had told us, you could be liable for as much as $500.00. If your monthly financial institution statement contains payments that you did not authorize, you must tell us at once. If you do not tell us within sixty (60) days after the statement was sent to you, you may lose any amount transferred without your authorization after the sixty (60) days if we can prove that we could have stopped someone from taking the money had you told us in time. If a good reason (such as a long trip or a hospital stay) prevented you from telling us, we will extend the time periods specified above to a reasonable period.

  • Exercise of Nonqualified Stock Option If the Option does not qualify as an ISO, there may be a regular federal and California income tax liability upon the exercise of the Option. Participant will be treated as having received compensation income (taxable at ordinary income tax rates) equal to the excess, if any, of the Fair Market Value of the Shares on the date of exercise over the Exercise Price. If Participant is a current or former employee of the Company, the Company may be required to withhold from Participant’s compensation or collect from Participant and pay to the applicable taxing authorities an amount equal to a percentage of this compensation income at the time of exercise.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • Disposition of Confidential Information Upon termination of Agreement or request of City, Contractor shall within forty-eight (48) hours return all Confidential Information which includes all original media. Once Contractor has received written confirmation from City that Confidential Information has been successfully transferred to City, Contractor shall within ten (10) business days purge all Confidential Information from its servers, any hosted environment Contractor has used in performance of this Agreement, work stations that were used to process the data or for production of the data, and any other work files stored by Contractor in whatever medium. Contractor shall provide City with written certification that such purge occurred within five (5) business days of the purge.

  • TERMINATION FOR IMPROPER CONSIDERATION 8.44.1 The County may, by written notice to the Contractor, immediately terminate the right of the Contractor to proceed under this Contract if it is found that consideration, in any form, was offered or given by the Contractor, either directly or through an intermediary, to any County officer, employee, or agent with the intent of securing this Contract or securing favorable treatment with respect to the award, amendment, or extension of this Contract or the making of any determinations with respect to the Contractor’s performance pursuant to this Contract. In the event of such termination, the County shall be entitled to pursue the same remedies against the Contractor as it could pursue in the event of default by the Contractor. 8.44.2 The Contractor shall immediately report any attempt by a County officer or employee to solicit such improper consideration. The report shall be made either to the County manager charged with the supervision of the employee or to the County Auditor-Controller's Employee Fraud Hotline at (000) 000-0000. 8.44.3 Among other items, such improper consideration may take the form of cash, discounts, services, the provision of travel or entertainment, or tangible gifts.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!