Internet Security and Protection Sample Clauses

Internet Security and Protection. 1. Party A shall guarantee that Party A will continue to have all the qualifications and/or go through relevant formalities necessary to carry out such business when signing the Agreement and within the term of the Agreement. Party A shall provide Party B with copies of licenses approved and issued by relevant competent government authorities, including but not limited to the unified social code certificate (or business license, organization code certificate, or tax registration certificate) and relevant qualification certificates such as business licenses (for example, value-added telecommunication business operation permit) that Party A shall obtain for its business operation, and Party A shall guarantee the authenticity, legality, validity and completeness of such qualification certificates provided. In addition, Party A shall sign the Letter of Responsibility for User Access to Internet Data Center (Annex 3) and the Letter of Commitment on Network Information Security (Annex 4) as required by Party B, and strictly abide by the commitments in such documents.
AutoNDA by SimpleDocs

Related to Internet Security and Protection

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • OWNERSHIP AND PROTECTION OF INFORMATION; COPYRIGHTS 6.1 All information, ideas, concepts, improvements, discoveries, and inventions, whether patentable or not, which are conceived, made, developed or acquired by Employee, individually or in conjunction with others, during Employee's employment by Employer (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to Employer's business, products or services (including, without limitation, all such information relating to corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks) shall be disclosed to Employer and are and shall be the sole and exclusive property of Employer. Moreover, all drawings, memoranda, notes, records, files, correspondence, drawings, manuals, models, specifications, computer programs, maps and all other writings or materials of any type embodying any of such information, ideas, concepts, improvements, discoveries, and inventions are and shall be the sole and exclusive property of Employer.

  • PROTECTION OF GOODWILL You acknowledge that the Company is providing you with this Restricted Stock Award in connection with and in consideration for your promises and covenants contained herein. Specifically, in consideration for the Restricted Stock Award, which you acknowledge provides a material incentive for you to grow, develop and protect the goodwill and confidential and proprietary information of the Company, you agree that the Restricted Stock Award (itself and in combination with any other awards made to you) constitutes independent and sufficient consideration for all non-competition, non-solicitation and confidentiality covenants between you and the Company, and agree and acknowledge that you will fully abide by each of such covenants. You further acknowledge that your promise to fully abide by each of the protective covenants referenced above is a material inducement for the Company to provide you with the Restricted Stock Award.

  • OWNERSHIP AND PROTECTION OF INTELLECTUAL PROPERTY AND CONFIDENTIAL INFORMATION 4.1 All information, ideas, concepts, improvements, discoveries, works of authorship, and inventions, whether patentable or copyrightable or not, which are conceived, reduced to practice, authored, made, developed or acquired by Employee, individually or in conjunction with others, in the scope of Employee's employment by Employer or any of its affiliates, and/or during the term of Employee’s employment (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to the business, products or services of Employer or its affiliates (including, without limitation, all such information relating to any corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks), and all documents, things, writings and items of any type or in any media embodying any of the foregoing (collectively, “Developments”), and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks, shall be the sole and exclusive property of Employer or its affiliates, as the case may be. Employee hereby assigns to Employer any and all rights Employee might otherwise have in and to any such Developments, and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks.

  • PATENT PROTECTION 10.1. LICENSEE shall be responsible for all past, present and future costs of filing, prosecution and maintenance of all United States patent applications contained in the LICENSED PATENTS. Any and all such United States patent applications, and resulting issued patents, shall remain the property of YALE.

  • Defend Trade Secrets Act You are hereby notified that under the Defend Trade Secrets Act: (1) no person will be held criminally or civilly liable under federal or state trade secret law for disclosure of a trade secret (as defined in the Economic Espionage Act) that is: (A) made in confidence to a federal, state, or local government official, either directly or indirectly, or to an attorney, and made solely for the purpose of reporting or investigating a suspected violation of law; or, (B) made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal so that it is not made public; and (2) a person who pursues a lawsuit for retaliation by an employer for reporting a suspected violation of the law may disclose the trade secret to the attorney of the person and use the trade secret information in the court proceeding, if the person files any document containing the trade secret under seal, and does not disclose the trade secret, except as permitted by court order.

Time is Money Join Law Insider Premium to draft better contracts faster.