Intellectual Property; Security Clause Samples
The "Intellectual Property; Security" clause defines the ownership, protection, and use of intellectual property (IP) created or used during the course of an agreement, while also addressing the rights of a party to secure interests in that IP. Typically, this clause clarifies whether IP developed by one or both parties remains with its creator or is transferred, and may grant the right to register security interests (such as liens) over the IP to protect against non-payment or default. Its core function is to ensure both parties understand their rights and obligations regarding IP assets, and to provide mechanisms for securing those rights in case of financial or contractual disputes.
Intellectual Property; Security. Except as would not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect:
(a) Section 3.17(a) of the Company Disclosure Letter lists all Intellectual Property registrations and applications owned by the Company or its subsidiaries;
(b) the Company and its subsidiaries exclusively own the items on Section 3.17(a) and their material proprietary unregistered Intellectual Property, free and clear of all Liens except Permitted Liens, and the registrations and applications for same are subsisting, unexpired, and to the knowledge of the Company, valid and enforceable;
(c) the current conduct of their businesses by the Company and its subsidiaries does not infringe the Intellectual Property of any third party and, to the knowledge of the Company, the Intellectual Property owned by the Company or its subsidiaries is not being infringed by any third party;
(d) the Company and its subsidiaries take reasonable efforts to protect the integrity, continuous operation and security of their material software, networks and systems (“IT Assets”) (and all data, including personal data, processed thereby), and there have been no breaches, outages or violations of same (except for those that were resolved without material cost, liability or the duty to notify any Person), and to the knowledge of the Company, their IT Assets are free of material defects, viruses, malware or other corruptants;
(i) the Company maintains a written information privacy and security program that maintains reasonable measures to protect the privacy, confidentiality and security of all personal data and any other material confidential information against any (1) loss or misuse, (2) unauthorized or unlawful operations performed thereon, or (3) other act or omission that compromises the security or confidentiality thereof (clauses (1) through (3), a “Security Breach”); (ii) to the knowledge of the Company, the Company has not experienced any Security Breach; and (iii) to the knowledge of the Company, there are no data security or other technological vulnerabilities with respect to its information technology systems or networks; and
(f) the Company and its subsidiaries comply in all material respects with their publicly posted privacy policies.
(g) For purposes of this Agreement, “Intellectual Property” means all intellectual property, including: (i) (1) patents, inventions, processes and methods; (2) copyrights; (3) trademarks, service marks, domain names, trade name...
Intellectual Property; Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (a) the Company and its Subsidiaries own their material proprietary Intellectual Property, free and clear of all liens, (b) the conduct of the businesses of the Company and its Subsidiaries does not infringe or violate the Intellectual Property of any Person and no Person is infringing or violating their Intellectual Property, and (c) the Company and its Subsidiaries take commercially reasonable efforts to protect the confidentiality of their trade secrets and the integrity, continuous operation and security of their Software and Systems (and the data stored or processed therein) and there have been no breaches, outages or violations of or unauthorized accesses to same (except for those that were resolved without material cost, liability or the duty to notify any Person).
Intellectual Property; Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (a) the Company and its Subsidiaries own their material proprietary Intellectual Property that they purport to own, free and clear of all liens of any Person (including current or former employees and contractors), (b) to the Knowledge of the Company, the conduct of the businesses of the Company and its Subsidiaries does not infringe or violate the Intellectual Property of any Person (and no Person has alleged the same in writing, including “cease and desist” letters or invitations to take a patent license) and no Person is infringing or violating their Intellectual Property, (c) the Company and its Subsidiaries take commercially reasonable efforts to protect the confidentiality of their trade secrets and the integrity, continuous operation and security against cyber threats of their Software and Systems (and all personal, sensitive or regulated data stored or processed therein) and there have been no breaches (or related outages) of or unauthorized accesses to same (except for those that were resolved without material cost or material liability) in the last three (3) years, (d) no software that the Company and its Subsidiaries convey, distribute, license or make available to others is subject to any open source license that requires the license or availability of the Company’s or its Subsidiaries’ material proprietary source code in such circumstances, (e) no third-party (other than the Company or its Subsidiaries, their respective personnel or other service providers working on their behalf) has current (or the contingent right to) access to any material proprietary source code of the Company or its Subsidiaries, and (f)the material Software and Systems of the Company and its Subsidiaries are reasonably sufficient to operate their businesses.
Intellectual Property; Security. (a) (i) The Company and its Subsidiaries own or have the right to use all inventions, patents, trademarks, service marks, trade names, domain names, works of authorship, copyrights, software, technology, know-how, trade secrets and all other intellectual property, industrial property and proprietary rights, and proprietary or confidential information, systems or procedures (including all rights in, and all registrations and applications for registration of, any of the foregoing) (collectively, “Intellectual Property”) necessary or material to the conduct of their respective businesses as currently conducted by them, provided that the foregoing shall not be deemed to be a representation as to non-infringement of third-party Intellectual Property; (ii) to the Company’s Knowledge, the conduct of the respective businesses of the Company and its Subsidiaries does not infringe, misappropriate or otherwise violate any Intellectual Property of a third party; (iii) there is no pending or, to the Company’s Knowledge, threatened action, suit, proceeding, notice, or claim against the Company or its Subsidiaries (A) challenging the Company’s or any Subsidiary of the Company’s ownership of or rights in or to Intellectual Property owned by or exclusively licensed to the Company or any Subsidiary, or alleging a violation by the Company or any Subsidiary of any of the terms of any license or other agreement pursuant to which the Company or any of its Subsidiaries holds or uses any Intellectual Property of a third party; (B) alleging that the Company or any of its Subsidiaries has infringed, misappropriated or otherwise violated or conflicted with any Intellectual Property of any third party; or (C) challenging the validity, scope or enforceability of any Intellectual Property owned by or exclusively licensed to the Company or any of its subsidiaries; (iv) all material Intellectual Property owned by the Company or its subsidiaries is owned solely by the Company or its Subsidiaries, and is owned free and clear of all options, licenses, liens, encumbrances, and defects (except for non-exclusive licenses granted to the Company’s end customers in the Company’s standard website terms of services); and (v) to the Knowledge of the Company, no third party has infringed, misappropriated or otherwise violated any Intellectual Property owned by or exclusively licensed to the Company or any of its Subsidiaries in any material respect.
(b) Except as would not, individually or in the agg...
Intellectual Property; Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (a) the conduct of the businesses of the Company and each of its Subsidiaries do not infringe, misappropriate or otherwise violate (“Infringe”), and since the Lookback Date have not Infringed, the intellectual property rights of any Person, (b) to the Knowledge of the Company, no Person is Infringing or challenging or threatening to challenge the ownership, use, validity or enforceability of any intellectual property owned by the Company or any of its Subsidiaries and (c) the Company and each of its Subsidiaries take, and since the Lookback Date have taken, commercially reasonable efforts to protect the confidentiality of their trade secrets and the integrity, continuous operation and security of their software and systems (and the data stored thereon), and since the Lookback Date, there have been no breaches, outages or violations of or unauthorized accesses to same (except for those that were resolved without material cost, liability or the duty to notify any Person).
Intellectual Property; Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, (a) the Company and its Subsidiaries own the Intellectual Property they purport to own, or have a valid and enforceable license or right to use or otherwise exploit, all Intellectual Property that is used in or necessary for the operation of the business of the Company and its Subsidiaries, free and clear of all Liens other than Permitted Liens (“Company Intellectual Property”), (b) the conduct of the businesses of the Company and its Subsidiaries does not infringe, misappropriate or violate, and has not since January 1, 2025 infringed, misappropriated or violated, the Intellectual Property of any Person and, to the Knowledge of the Company, no Person is (or has been since January 1, 2025) infringing, misappropriating or violating the Company Intellectual Property and (c) the Company and its Subsidiaries take commercially reasonable efforts to protect the confidentiality of their trade secrets and the integrity, continuous operation and security of their Software and Systems (and the data stored or Processed therein or thereby). Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect, since January 1, 2025, there have not been any (x) security incidents, including any unauthorized intrusions, breaches (including phishing incidents, ransomware, or malware attacks) affecting the Software and Systems, (y) no incident in which personal information Processed by or for the Company was, or was reasonably likely to have been Processed in an unauthorized or unlawful manner, or (z) failures, breakdowns, continued substandard performance or other adverse events affecting the Software and Systems.
Intellectual Property; Security. Except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect or prevent or materially delay the consummation of any of the Transactions, (a) the conduct of the businesses of the Company and each of its Subsidiaries do not infringe, misappropriate or otherwise violate (“Infringe”), and since the Lookback Date have not Infringed, the intellectual property rights of any Person, (b) to the Knowledge of the Company, no Person is Infringing or challenging or threatening to challenge the ownership, use, validity or enforceability of any intellectual property owned by the Company or any of its Subsidiaries and (c)since the Lookback Date, there have been no breaches, outages or violations of or unauthorized accesses to the software and systems of the Company and its Subsidiaries (except for those that were resolved without material cost, liability or the duty to notify any Governmental Authority).
Intellectual Property; Security. Agreements between the Borrower and the Collateral Agent.
Intellectual Property; Security. (1) With respect to its Intellectual Property, each Grantor agrees to execute or otherwise authenticate an agreement, in form and substance reasonably satisfactory to the Collateral Agent (an “Intellectual Property Security Agreement”), for recording the security interest granted hereunder to the Collateral Agent in such Intellectual Property with, the Canadian Intellectual Property Office, the U.S. Patent and Trademark Office, the U.S. Copyright Office, and any other U.S. or Canadian governmental authorities necessary to perfect the security interest hereunder in such Intellectual Property.
(2) Each Grantor agrees that should it obtain an ownership interest in any Intellectual Property that is not on the date hereof a part of Collateral (“After-Acquired Intellectual Property”)
(i) the provisions of this Agreement shall automatically apply thereto, and (ii) any such After-Acquired Intellectual Property and, in the case of Trademarks, the goodwill symbolized thereby, shall automatically become part of the Intellectual Property subject to the terms and conditions of this Agreement with respect thereto. Each Grantor shall, if such Grantor has obtained After-Acquired Intellectual Property not subject to an existing Intellectual Property Security Agreement (as defined above), concurrently with the delivery of financial statements under Sections 9.01(a) and (b) of the Credit Agreement:
(a) execute and deliver to the Collateral Agent, or otherwise authenticate, a Intellectual Property Security Agreement covering such After-Acquired Intellectual Property subject to registration and application, which Intellectual Property Security Agreement shall be recorded with the Canadian Intellectual Property Office, the U.S. Patent and Trademark Office, the U.S. Copyright Office and any other U.S. or Canadian governmental authorities necessary to perfect the security interest hereunder in such After-Acquired Intellectual Property; and
(b) deliver to the Collateral Agent a copy of the certificate of registration of, or application for, such After-Acquired Intellectual Property.
(3) Immediately upon the request of the Collateral Agent, each Grantor will furnish the Collateral Agent in writing the description of all Registrable Intellectual Property or applications for Registrable Intellectual Property of such Grantor.
Intellectual Property; Security. (a) (i) The Company and its Subsidiaries own, possess or have the right to use, or, with respect to the conduct of their respective businesses as currently proposed to be conducted only, can acquire on commercially reasonable terms, adequate rights to use all inventions, patents, trademarks, service marks, trade names, domain names, copyrights, licenses, technology, know-how, trade secrets and all other intellectual property, industrial property and proprietary rights, and proprietary or confidential information, systems or procedures (including all registrations and applications by the Company and its Subsidiaries for registration of any of the foregoing) (collectively, “Intellectual Property”) necessary or material to the conduct of their respective businesses as currently conducted by them except where the failure to own, possess or acquire any of the foregoing would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect; (ii) to the Company’s Knowledge, the conduct of the respective businesses of the Company and its Subsidiaries does not infringe, misappropriate or otherwise violate any Intellectual Property of others in any material respect; (iii) except as would not, individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect, there is no pending or, to the Company’s Knowledge, threatened in writing action, suit, proceeding, notice, or claim (A) challenging the Company’s or any Subsidiary of the Company’s rights in or to, or alleging the violation by the Company or any Subsidiary of any of the terms of, any of their Intellectual Property; (B) alleging that the Company or any of its Subsidiaries has infringed, misappropriated or otherwise violated or conflicted with any Intellectual Property of any third party; or (C) challenging the validity, scope or enforceability of any Intellectual Property owned by or exclusively licensed to the Company or any of its subsidiaries; (iv) all material Intellectual Property owned by the Company or its subsidiaries is owned solely by the Company or its Subsidiaries, and is owned free and clear of all options, licenses, liens, encumbrances, and defects (except for non-exclusive licenses granted to the Company’s end customers in the Company’s standard website terms of services); and (v) to the Knowledge of the Company, no third party has infringed, misappropriated or otherwise violated any Intellectual Property owned by or exclusively lic...
