CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.
Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.
TRADEMARK INFORMATION You herein acknowledge, understand and agree that all of the LMS50 Corporation trademarks, copyright, trade name, service marks, and other LMS50 Corporation logos and any brand features, and/or product and service names are trademarks and as such, are and shall remain the property of LMS50 Corporation. You herein agree not to display and/or use in any manner the LMS50 Corporation logo or marks without obtaining LMS50 Corporation's prior written consent. COPYRIGHT OR INTELLECTUAL PROPERTY INFRINGEMENT CLAIMS NOTICE & PROCEDURES LMS50 Corporation will always respect the intellectual property of others, and we ask that all of our users do the same. With regards to appropriate circumstances and at its sole discretion, LMS50 Corporation may disable and/or terminate the accounts of any user who violates our TOS and/or infringes the rights of others. If you feel that your work has been duplicated in such a way that would constitute copyright infringement, or if you believe your intellectual property rights have been otherwise violated, you should provide to us the following information:
Nondisclosure of Private Proprietary or Confidential Information 13.1.1 If this Agreement requires City to disclose "Private Information" to Contractor within the meaning of San Francisco Administrative Code Chapter 12M, Contractor and subcontractor shall use such information only in accordance with the restrictions stated in Chapter 12M and in this Agreement and only as necessary in performing the Services. Contractor is subject to the enforcement and penalty provisions in Chapter 12M.
Required Confidential Information Status Form CONFIDENTIAL INFORMATION SUBMITTED IN RESPONSE TO COMPETITIVE PROCUREMENT REQUESTS OF EDUCATION SERVICE CENTER REGION 8 AND TIPS (ESC8) IS GOVERNED BY TEXAS GOVERNMENT CODE, CHAPTER 552 If you consider any portion of your proposal to be confidential information and not subject to public disclosure pursuant to Chapter 552 Texas Gov’t Code or other law(s), you must attach a copy of all claimed confidential materials within your proposal and put this COMPLETED form as a cover sheet to said materials then scan, name “CONFIDENTIAL” and upload with your proposal submission. (You must include all the confidential information in the submitted proposal. The copy uploaded is to indicate which material in your proposal, if any, you deem confidential in the event the receives a Public Information Request.) ESC8 and TIPS will follow procedures of controlling statute(s) regarding any claim of confidentiality and shall not be liable for any release of information required by law. Upon your claim and your defense to the Office of Texas Attorney General is required to make the final determination whether the information submitted by you and held by ESC8 and TIPS is confidential and exempt from public disclosure. Tobii Dynavox LLC Name of company Xxxx Xxxxxxxx, President, North American Market Printed Name and Title of authorized company officer declaring below the confidential status of material 0000 Xxxxxxx Xx., Suite 400 Pittsburgh PA 15203 800-344-1778 Address City State ZIP Phone ALL VENDORS MUST COMPLETE THE ABOVE SECTION. I DO CLAIM parts of my proposal to be confidential and DO NOT desire to expressly waive a claim of confidentiality of all information contained within our response to the solicitation. The attached contains material from our proposal that I classify and deem confidential under Texas Gov't Code Sec. 552 or other law(s) and I invoke my statutory rights to confidential treatment of the enclosed materials. ATTACHED ARE COPIES OF PAGES OF CLAIMED CONFIDENTIAL MATERIAL FROM OUR PROPOSAL THAT WE DEEM TO BE NOT PUBLIC INFORMATION AND WILL DEFEND THAT CLAIM TO THE TEXAS ATTORNEY GENERAL IF REQUESTED WHEN A PUBLIC INFORMATION REQUEST IS MADE FOR OUR PROPOSAL. Signature Date 2/3/2020 OR I DO NOT CLAIM any of my proposal to be confidential, complete the section below.
Confidential Information State Records Grantee shall comply with the provisions of this §10 if it becomes privy to confidential information in connection with its performance hereunder. Confidential information, includes, but is not necessarily limited to, state records, personnel records, and information concerning individuals.
Proprietary Data NASDAQ OMX grants to Subscriber a nonexclusive, non-transferable license during the term of the Agreement to receive and use the Information transmitted to it by Distributor and thereafter, to use such Information as permitted under the terms of this Agreement and/or the NASDAQ OMX Requirements. Subscriber acknowledges and agrees that NASDAQ OMX has proprietary rights to the Information that originates on or derives from markets regulated or operated by NASDAQ OMX, and compilation or other rights to Information gathered from other sources. Subscriber further acknowledges and agrees that NASDAQ OMX 's third-party information providers have exclusive proprietary rights to their respective Information. In the event of any misappropriation or misuse by Subscriber or anyone who accesses the Information through Subscriber, NASDAQ OMX or its third-party information providers shall have the right to obtain injunctive relief for its respective materials. Subscriber will attribute source as appropriate under all the circumstances.
Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.
Demographic, Classification and Wage Information XXXXXX agrees to coordinate the accumulation and distribution of demographic, classification and wage data, as specified in the Letter of Understanding dated December 14, 2011, to CUPE on behalf of Boards of Education. The data currently housed in the Employment Data and Analysis Systems (EDAS) will be the source of the requested information.
Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.