LIL Owned IP and LTA Owned IP Held in Trust Sample Clauses

LIL Owned IP and LTA Owned IP Held in Trust. Each of Emera, Nalcor and the General Partner shall, and Nalcor shall cause any permitted assignee to, subject to the Encumbrances and rights of the Financing Parties, hold the LIL Owned IP and the LTA Owned IP owned by such Party or other Person, at any given time, in trust for the mutual benefit of Emera and Nalcor, and such Party or other Person shall have no right to license the LIL Owned IP or the LTA Owned IP to any third party except in accordance with Section 9.3(c).
AutoNDA by SimpleDocs

Related to LIL Owned IP and LTA Owned IP Held in Trust

  • Ownership and Licenses 54 Article 16. Liability.......................................................................................................................................55 Section 16.01 Property damage.....................................................................................................................55 Section 16.02 Risk of Loss.............................................................................................................................55 Section 16.03 Limitation of HHSC’s Liability..................................................................................................55 Article 17. Insurance & Bonding.................................................................................................................55 Section 17.01 Insurance Coverage................................................................................................................55 Section 17.02 Performance Bond..................................................................................................................57 Section 17.03 TDI Fidelity Bond.....................................................................................................................57

  • Ownership and Reuse of Documents All documents, data, reports, research, graphic presentation materials, etc., developed by Contractor as a part of its work under this Agreement, shall become the property of County upon completion of this Agreement, or in the event of termination or cancellation thereof, at the time of payment under Section 3 for work performed. Contractor shall promptly furnish all such data and material to County on request.

  • Ownership and Intellectual Property 15.1 Any and all information, property or materials disclosed to Supplier remains the property of Customer. Supplier is not entitled to make use of or refer to any trademark, trade name, domain name, patent, design, copyright, or other intellectual property right of Customer or any of its Affiliates, unless prior obtained written consent of Customer. Any authorized use shall be strictly in accordance with the instructions and for the purposes specified.

  • Proprietary Interests All information owned, possessed or used by Owner which is communicated to, learned, developed or otherwise acquired by Architect/Engineer in the performance of services for Owner, which is not generally known to the public, shall be confidential, subject, however, to the Owner’s obligations under the Texas Public Information Act. Architect/Engineer shall not, beginning on the date of first association or communication between Owner and Architect/Engineer and continuing through the term of this Agreement and any time thereafter, disclose, communicate or divulge, or permit disclosure, communication or divulgence, to another or use for Architect/Engineer’s own benefit or the benefit of another, any such confidential information, unless required by law. Except when defined as part of the Work, Architect/Engineer shall not make any press releases, public statements, or advertisement referring to the Project or the engagement of Architect/Engineer as an independent contractor of Owner in connection with the Project, or release any information relative to the Project for publication, advertisement or any other purpose without the prior written approval of Owner. Architect/Engineer shall obtain agreements similar to those contained in this Paragraph from persons, vendors and consultants retained by Architect/Engineer. Architect/Engineer acknowledges and agrees that a breach by Architect/Engineer of the provisions hereof will cause Owner irreparable injury and damage. Architect/Engineer, therefore, expressly agrees that Owner shall be entitled to injunctive and/or other equitable relief in any court of competent jurisdiction to prevent or otherwise restrain a breach of this agreement. This section shall not apply to information in whatever form that comes into the public domain, nor shall it restrict the Architect/Engineer from giving notices required by law or complying with an order to provide information or data when such order is issued by a court, administrative agency or other authority with proper jurisdiction, or if it is reasonably necessary for the Architect/Engineer to defend itself from any suit or claim.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • RECORDS USAGE, DUPLICATION AND REDISCLOSURE RESTRICTIONS USAC and the Department agree to these restrictions on use, duplication, and disclosure of information furnished by the other Party:

  • Ownership and Intellectual Property Rights 1. This Agreement gives you limited rights to use the Software. Syncro retains any and all rights, title and interest in and to the Software and all copies thereof, including copyrights, patents, trade secret rights, trademarks and other intellectual property rights. All rights not specifically granted in this Agreement, including International Copyrights, are reserved by Syncro. The structure, organization and code of the Software are valuable trade secrets and confidential information of Syncro.

  • Your Liability for Unauthorized Transfers Immediately following your discovery of an unauthorized Payment Instruction, you shall communicate with customer care for the Service in the manner set forth in Section 6 of the General Terms above. You acknowledge and agree that time is of the essence in such situations. If you tell us within two (2) Business Days after you discover your password or other means to access your account through which you access the Service has been lost or stolen, your liability is no more than $50.00 should someone access your account without your permission. If you do not tell us within two (2) Business Days after you learn of such loss or theft, and we can prove that we could have prevented the unauthorized use of your password or other means to access your account if you had told us, you could be liable for as much as $500.00. If your monthly financial institution statement contains payments that you did not authorize, you must tell us at once. If you do not tell us within sixty (60) days after the statement was sent to you, you may lose any amount transferred without your authorization after the sixty (60) days if we can prove that we could have stopped someone from taking the money had you told us in time. If a good reason (such as a long trip or a hospital stay) prevented you from telling us, we will extend the time periods specified above to a reasonable period.

  • Ownership and License 5.1 Unless otherwise specified in a SOW and except as provided in Section 5.2, Cisco is the sole and exclusive owner of all Deliverables and Supplier hereby irrevocably assigns and transfers to Cisco all of its worldwide right and title to, and interest in, the Deliverables, including all associated Intellectual Property Rights.

  • CENTURYLINK OSS INFORMATION 57.1 Subject to the provisions of this Agreement and Applicable Law, CLEC shall have a limited, revocable, non-transferable, non-exclusive right to use CenturyLink OSS Information during the term of this Agreement, for CLEC’s internal use for the provision of Telecommunications Services to CLEC End Users in the State.

Time is Money Join Law Insider Premium to draft better contracts faster.