Khoros Intellectual Property Rights Sample Clauses

Khoros Intellectual Property Rights. Khoros owns and retains right, title, and interest to the Services, and any modifications, improvements, or enhancements to the Services. Khoros also owns and retains right, title and interest to Usage Data. Customer has no intellectual property license or rights to the Services or Usage Data. Customer recognizes that the Services and Usage Data are protected as or by trade secrets, copyrights, patents, and/or other laws. “Usage Data” is data from the Khoros backend system concerning the use and performance of the Services.
AutoNDA by SimpleDocs

Related to Khoros Intellectual Property Rights

  • Intellectual Property The Company and the Subsidiaries have, or have rights to use, all patents, patent applications, trademarks, trademark applications, service marks, trade names, trade secrets, inventions, copyrights, licenses and other intellectual property rights and similar rights necessary or required for use in connection with their respective businesses as described in the SEC Reports and which the failure to so have could have a Material Adverse Effect (collectively, the “Intellectual Property Rights”). None of, and neither the Company nor any Subsidiary has received a notice (written or otherwise) that any of, the Intellectual Property Rights has expired, terminated or been abandoned, or is expected to expire or terminate or be abandoned, within two (2) years from the date of this Agreement. Neither the Company nor any Subsidiary has received, since the date of the latest audited financial statements included within the SEC Reports, a written notice of a claim or otherwise has any knowledge that the Intellectual Property Rights violate or infringe upon the rights of any Person, except as could not have or reasonably be expected to not have a Material Adverse Effect. To the knowledge of the Company, all such Intellectual Property Rights are enforceable and there is no existing infringement by another Person of any of the Intellectual Property Rights. The Company and its Subsidiaries have taken reasonable security measures to protect the secrecy, confidentiality and value of all of their intellectual properties, except where failure to do so could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Confidential Information “Confidential Information” shall mean (i) Highly Confidential Information (as defined below), (ii) any other technology, software development tools, methodologies, processes, algorithms, test data sets and test data cases and related documentation that CI Plus LLP provides to Licensee hereunder in order to facilitate Licensee’s exercise of its rights and performance of its obligations hereunder, and (iii) any other information of CI Plus LLP and information of Licensee, each of which is clearly marked as “Confidential” or a similar expression when disclosed in written or electronic form, or indicated as “Confidential” when disclosed orally and confirmed in writing within thirty (30) calendar days after such disclosure. “Confidential Information” shall not include information which: (a) was in the possession of, or was known by, the receiving party ("Recipient") prior to its receipt from the disclosing party (“Discloser), without an obligation owed to Discloser, or its licensors, to maintain its confidentiality; (b) is or becomes generally known to the public without violation of this Agreement by the “Recipient”; (c) is obtained by Recipient from a third party, without an obligation owed to such third party to keep such information confidential; or (d) is independently developed by Recipient without use of any Confidential Information of the other party. Recipient agrees that it shall use reasonable care to keep the Confidential Information of the other party strictly confidential and not disclose it to any other person except to its Affiliates and its and their respective employees, contractors, consultants, agents, customers and representatives (other than Members) who have a “need to know” for the purposes of this Agreement and are obligated by Licensee to be bound by the same confidentiality obligation which Recipient is bound by under this Exhibit H, provided however that Recipient may disclose Highly Confidential Information only in accordance with Section 2 of this Exhibit H. Recipient shall be responsible for any breach of such confidentiality obligation by such parties, including former employees, Affiliates, contractors, consultants, agents, customers (other than Members) and representatives. Recipient shall protect the Confidential Information of the other party with the same degree of care as it normally uses in the protection of its own similar confidential and proprietary information, but in no case with any less than reasonable care. Notwithstanding anything in this Exhibit H to the contrary, Confidential Information may be disclosed by Recipient pursuant to the order or requirements of a court or governmental administrative agency or other governmental body of competent jurisdiction, provided that (x) Discloser has been notified of such a disclosure request immediately after Recipient knows such order or requirements in order to afford Discloser reasonable opportunity to obtain a protective order or otherwise prevent or limit the scope of such disclosure to the extent permitted by law and (y) Recipient cooperates in good faith with such efforts by Discloser. The obligations under this Exhibit H shall terminate three years after the date of the last shipment of product using the Licensed Technology by Licensee or any other licensee of the Licensed Technology; provided that Sections 2.0(b), 2.0(c), and 3.0 in this Exhibit H shall cease to apply when the Recipient has returned all tangible embodiments of Licensed Technology in its possession to the Discloser.

  • Background Purchaser wishes to purchase a Revenue Sharing Note issued by the Company through xxx.Xxxxxxxx.xxx (the “Site”).

  • Confidentiality (a) Subject to Section 7.15(c), during the Term and for a period of three

  • Remedies The Holder, in addition to being entitled to exercise all rights granted by law, including recovery of damages, will be entitled to specific performance of its rights under this Warrant. The Company agrees that monetary damages would not be adequate compensation for any loss incurred by reason of a breach by it of the provisions of this Warrant and hereby agrees to waive and not to assert the defense in any action for specific performance that a remedy at law would be adequate.

  • Compliance with Laws Comply in all material respects with the requirements of all Laws and all orders, writs, injunctions and decrees applicable to it or to its business or property, except in such instances in which (a) such requirement of Law or order, writ, injunction or decree is being contested in good faith by appropriate proceedings diligently conducted; or (b) the failure to comply therewith could not reasonably be expected to have a Material Adverse Effect.

  • Disputes In the case of a dispute as to the determination of the Exercise Price or the arithmetic calculation of the number of Warrant Shares issuable in connection with any exercise, the Company shall promptly deliver to the Holder the number of Warrant Shares that are not disputed.

  • No Third Party Beneficiaries This Agreement is intended for the benefit of the parties hereto and their respective permitted successors and assigns, and is not for the benefit of, nor may any provision hereof be enforced by, any other person.

  • Services FASC agrees to provide to the Adviser the services indicated in Exhibit A to this Agreement (the “Services”).

  • Audits No more than once a year, or following unauthorized access, upon receipt of a written request from the LEA with at least ten (10) business days’ notice and upon the execution of an appropriate confidentiality agreement, the Provider will allow the LEA to audit the security and privacy measures that are in place to ensure protection of Student Data or any portion thereof as it pertains to the delivery of services to the LEA . The Provider will cooperate reasonably with the LEA and any local, state, or federal agency with oversight authority or jurisdiction in connection with any audit or investigation of the Provider and/or delivery of Services to students and/or LEA, and shall provide reasonable access to the Provider’s facilities, staff, agents and XXX’s Student Data and all records pertaining to the Provider, LEA and delivery of Services to the LEA. Failure to reasonably cooperate shall be deemed a material breach of the DPA.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!