Key TechnoLabs Pvt Sample Clauses

Key TechnoLabs Pvt. Ltd. Warranties" The representations, warranties and undertakings under Article 7;
AutoNDA by SimpleDocs
Key TechnoLabs Pvt. Ltd. shall use its reasonable best efforts to assist Mercor Portfolio, Inc. in all its negotiations and exchanges of correspondence in relation to the transactions referred to herein with the Pink Sheets other relevant authorities;
Key TechnoLabs Pvt. Ltd. shall use its reasonable best efforts to provide Mercor Portfolio, Inc. with such information as the Pink Sheets may require for the purpose of obtaining their clearance of any announcement or information required in connection with this Agreement;
Key TechnoLabs Pvt. Ltd. Information. Key TechnoLabs Pvt. Ltd. has furnished or made available to Mercor Portfolio, Inc., prior to the date hereof, copies of its Key TechnoLabs Pvt. Ltd. Business Plan (the Key TechnoLabs Pvt. Ltd. Disclosure Documents”). These Key TechnoLabs Pvt. Ltd. Disclosure Documents are given in Exhibit 7.1(g) attached hereto and incorporated by reference. Each of these documents, as of its respective date (or if amended or superseded by a filing prior to the date of this Agreement, then on the date of such filing), did not, and each of the documents filed by Key TechnoLabs Pvt. Ltd. with the Mercor Portfolio, Inc. after the date hereof and prior to the Closing will not, as of the date thereof (or if amended or superseded by a filing prior to the date of the Closing, then on the date of such filing), contain any untrue statement of a material fact or omit to state a material fact necessary in order to make the statements made therein, in light of the circumstances under which they were made, not misleading. Key TechnoLabs Pvt. Ltd. is not a party to any material contract, agreement or other arrangement which has not been given to Mercor Portfolio, Inc.
Key TechnoLabs Pvt. Ltd. has all necessary corporate power and authority to own or lease its respective properties and assets, as applicable, and to carry on its businesses as now conducted and are duly qualified or licensed to do business as foreign corporations in good standing in all jurisdictions, except where the failure to be so qualified or licensed is not material to the Business.
Key TechnoLabs Pvt. Ltd. has no liabilities of any nature, whether accrued, absolute, contingent or otherwise, and whether due or to become due, probable of assertion or not, except liabilities that (i) are reflected or disclosed in the Financial Statements described in Sections (a) and (g) above, (ii) are reflected in the notes to the balance sheet included in the most recent of the Financial Statements, (iii) are obligations set forth in any Contracts listed in the Exhibits to this Agreement or in Contracts not required to be listed in such Exhibits, (iv) are disclosed in any of the Exhibits to this Agreement, (v) were incurred in the ordinary course of business, and (vi) except as set forth in Exhibit 8.4(i), do not exceed $25,000 individually or $50,000 in the aggregate. As of the date of Closing, all the Key TechnoLabs Pvt. Ltd’s liabilities in the aggregate, including contingent liabilities, existing or inchoate, shall not exceed $25,000.

Related to Key TechnoLabs Pvt

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Know-How The term “

  • Joint Technology The Parties agree that, in order to effectuate the provisions of Section 4.4.2, subject to any exclusive licenses granted hereunder, (a) the non-use provisions of this Article 9 shall not apply to each Party’s use of Joint Technology, and (b) each Party may disclose the Joint Technology to Third Parties who are under terms of confidentiality no less strict than those contained in this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!