Exploitation Considering National and European Technological Platforms Sample Clauses

Exploitation Considering National and European Technological Platforms. In the area of Privacy challenges like implementation of privacy at design level, user centricity and user friendliness for transparency and privacy-enhancing technologies, pseudonymisation and anonymisation, mobile-based and web-based privacy-enhanced services, control of private data exchange between services, private data traceability, accountability, privacy risk management and finally awareness building and training of different users are all areas where mutual benefit can be expected (also for exploitation) between PICOS and initiatives and partners of technological platforms where Atos Origin plays a prominent role. The leadership of Atos Research & Innovation of the NESSI European Technological Platform8 in the Software & Services and Trust, Security & Dependability (where Atos Research & Innovation has already co-authored a whitepaper on Privacy geared at defining NESSI’s new SRA, taking into account knowledge derived from PICOS) represents also an excellent opportunity for early exploitation of results as they become available within the project’s planning. In particular, NESSI is an excellent platform for an industrial platform like Atos, to contact the key players in the industry to formalise agreements for exploitation in a context where potential partners are familiar with the idiosyncrasy of research and development projects results. Atos Origin also plays a prominent role in the Spanish technological platform eSec9. Moreover, Atos Origin also participates in the Spanish eMov technological platform10 and its European Counterpart eMobility11 both of which focus in their Strategic Research Agendas on aspects such as security, trust, privacy, threats on mobility and business models all of which are relevant for PICOS and where collaboration with platform partners could lead to identify future exploitation opportunities. Atos Research & Innovation is also working simultaneously in strong authentication solutions in the mobile environment, including biometric authentication, in the context of the Spanish national 7 xxxx://xxx.xxxx-xxxxx.xx/ 8 xxxx://xxx.xxxxx-xxxxxx.xxx 9 xxxx://xxx.xxx.xxxxx.xx/esec/ 10 xxxx://xxx.xxx.xxxxx.xx/emov/ 11 xxxx://xxx.xxxxxxxxx.xx.xxx/about_us.html research and development project Xxxxx@12, using the same mobile handset model chosen for PICOS and the same rich mobile application platform which effectively means that results from both projects can easily achieve complementarities at the implementation level and theref...
AutoNDA by SimpleDocs

Related to Exploitation Considering National and European Technological Platforms

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

  • Přetrvající platnost This Section 3 “

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy

  • EMERGING TECHNOLOGIES The State reserves the right to modify the terms of this Contract or any future Periodic Recruitments, to allow for emerging technologies. OGS reserves the right to include such technology(ies) hereunder or to issue a formal modification or amendment to this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!