Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.
License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.
Xxxxx of License Georgia Institute of Technology shall grant the Student a limited, nonexclusive, nontransferable and revocable license to use and occupy an assigned space in a Georgia Institute of Technology facility in accordance with the terms and conditions of this Contract (the “License”). The parties to this Contract do not intend that an estate, a tenancy or any other interest in property should pass from Georgia Institute of Technology to Student. Instead, it is the intention of the parties that the relationship between Georgia Institute of Technology and Student be that of licensor and licensee and the sole right of Student to use the assigned space as a living unit shall be based upon the License granted in this Contract.
Parent Right to Access and Challenge Student Data The LEA shall establish reasonable procedures pursuant to which a parent, as that term is defined in 105 ILCS 10/2(g), may inspect and/or copy Student Data and/or challenge the accuracy, relevance or propriety of Student Data, pursuant to Sections 5 and 7 of ISSRA (105 ILCS 10/5; 105 ILCS 10/7) and Section 33 of SOPPA (105 ILCS 85/33). The Provider shall respond to any request by the LEA for Student Data in the possession of the Provider when Provider cooperation is required to afford a parent an opportunity to inspect and/or copy the Student Data, no later than 5 business days from the date of the request. In the event that a parent contacts the Provider directly to inspect and/or copy Student Data, the Provider shall refer the parent to the LEA, which shall follow the necessary and proper procedures regarding the requested Student Data.
Grant of License to Use Intellectual Property Without limiting the provisions of Section 3.01 hereof or any other rights of the Collateral Agent as the holder of a Security Interest in any IP Collateral, for the purpose of enabling the Collateral Agent to exercise rights and remedies under this Agreement at such time as the Collateral Agent shall be lawfully entitled to exercise such rights and remedies, each Grantor hereby grants to the Collateral Agent, for the benefit of the Secured Parties, an irrevocable, nonexclusive license (exercisable without payment of royalty or other compensation to the Grantors) to use, license or sublicense any of the IP Collateral now owned or hereafter acquired by such Grantor, and wherever the same may be located (whether or not any license agreement by and between any Grantor and any other Person relating to the use of such IP Collateral may be terminated hereafter), and including in such license reasonable access to all media in which any of the licensed items may be recorded or stored and to all computer software and programs used for the compilation or printout thereof, provided, however, that any such license granted by the Collateral Agent to a third party shall include reasonable and customary terms necessary to preserve the existence, validity and value of the affected IP Collateral, including without limitation, provisions requiring the continuing confidential handling of trade secrets, requiring the use of appropriate notices and prohibiting the use of false notices, protecting and maintaining the quality standards of the Trademarks in the manner set forth below (it being understood and agreed that, without limiting any other rights and remedies of the Collateral Agent under this Agreement, any other Loan Document or applicable Law, nothing in the foregoing license grant shall be construed as granting the Collateral Agent rights in and to such IP Collateral above and beyond (x) the rights to such IP Collateral that each Grantor has reserved for itself and (y) in the case of IP Collateral that is licensed to any such Grantor by a third party, the extent to which such Grantor has the right to grant a sublicense to such IP Collateral hereunder). The use of such license by the Collateral Agent may only be exercised, at the option of the Collateral Agent, during the continuation of an Event of Default; provided that any license, sublicense or other transaction entered into by the Collateral Agent in accordance herewith shall immediately terminate at such time as the Collateral Agent is no longer lawfully entitled to exercise its rights and remedies under this Agreement. Nothing in this Section 4.01 shall require a Grantor to grant any license that is prohibited by any rule of law, statute or regulation, or is prohibited by, or constitutes a breach or default under or results in the termination of any contract, license, agreement, instrument or other document evidencing, giving rise to or theretofore granted, with respect to such property or otherwise unreasonably prejudices the value thereof to the relevant Grantor. In the event the license set forth in this Section 4.01 is exercised with regard to any Trademarks, then the following shall apply: (i) all goodwill arising from any licensed or sublicensed use of any Trademark shall inure to the benefit of the Grantor; (ii) the licensed or sublicensed Trademarks shall only be used in association with goods or services of a quality and nature consistent with the quality and reputation with which such Trademarks were associated when used by Grantor prior to the exercise of the license rights set forth herein; and (iii) at the Grantor’s request and expense, licensees and sublicensees shall provide reasonable cooperation in any effort by the Grantor to maintain the registration or otherwise secure the ongoing validity and effectiveness of such licensed Trademarks, including, without limitation the actions and conduct described in Section 4.02 below.
Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.
Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.
Intellectual Property Rights and Confidentiality Clauses 3.1 Party A shall have exclusive and proprietary ownership, rights and interests in any and all intellectual properties arising out of or created during the performance of this Agreement, including but not limited to copyrights, patents, patent applications, software, technical secrets, trade secrets and others. Party B shall execute all appropriate documents, take all appropriate actions, submit all filings and/or applications, render all appropriate assistance and otherwise conduct whatever is necessary as deemed by Party A at its sole discretion for the purposes of vesting any ownership, right or interest of any such intellectual property rights in Party A, and/or perfecting the protections for any such intellectual property rights in Party A. 3.2 The Parties acknowledge that the existence and the terms of this Agreement and any oral or written information exchanged between the Parties in connection with the preparation and performance of this Agreement are regarded as confidential information. Each Party shall maintain confidentiality of all such confidential information, and without obtaining the written consent of the other Party, it shall not disclose any relevant confidential information to any third party, except for the information that: (a) is or will be in the public domain (other than through the receiving Party’s unauthorized disclosure); (b) is under the obligation to be disclosed pursuant to the applicable laws or regulations, rules of any stock exchange, or orders of the court or other government authorities; or (c) is required to be disclosed by any Party to its shareholders, directors, employees, legal counsels or financial advisors regarding the transaction contemplated hereunder, provided that such shareholders, directors, employees, legal counsels or financial advisors shall be bound by the confidentiality obligations similar to those set forth in this Section. Disclosure of any confidential information by the shareholders, director, employees of or agencies engaged by any Party shall be deemed disclosure of such confidential information by such Party and such Party shall be held liable for breach of this Agreement.
ACKNOWLEDGEMENT AND PROTECTION OF INTELLECTUAL PROPERTY RIGHTS 1. Licensee acknowledges that all Intellectual Property Rights in the Licensed Material are the property of the Publisher or duly licensed to the Publisher and that this Licence Agreement does not assign or transfer to the Licensee any right, title or interest therein except for the right to access and use the Licensed Material in accordance with the terms and conditions of this Licence Agreement. 2. For the avoidance of doubt, the Publisher hereby acknowledges that any database rights created by the Licensee or the Institutions as a result of Local Hosting, text mining or data mining of the Licensed Material shall be the property of the Licensee, or the Institution.
License to Customer Vendor grants to Customer, a perpetual, irrevocable, royalty free license, solely for the Customer’s internal business purposes, to use, copy, modify, display, perform (by any means), transmit and prepare derivative works of any Vendor IP embodied in or delivered to Customer in conjunction with the Work Product. The foregoing license includes the right to sublicense third parties, solely for the purpose of engaging such third parties to assist or carryout Customer’s internal business use of the Work Product. Except for the preceding license, all rights in Vendor IP remain in Vendor.