No Unauthorized Use of Technology Services Sample Clauses

No Unauthorized Use of Technology Services. Correspondent will not copy, modify, distribute or transfer (by any means), display, sublicense, rent, reverse engineer, decompile or disassemble any software or other technology that is included in the Technology Services.
AutoNDA by SimpleDocs

Related to No Unauthorized Use of Technology Services

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Unauthorized Use If either Party becomes aware or has knowledge of any unauthorized use or disclosure of the other Party’s Confidential Information, it shall promptly notify the disclosing Party of such unauthorized use or disclosure.

  • Technical Information Methods, processes, formulae, compositions, systems, techniques, inventions, machines, computer programs and research projects, unpatented inventions, designs, know-how, trade secrets, technical information and data, specifications, blueprints, transparencies, test data, and additions, modifications, and improvements thereon which are revealed to Employee.

  • Technology For purposes of this Agreement, “Technology” means all Software, information, designs, formulae, algorithms, procedures, methods, techniques, ideas, know-how, research and development, technical data, programs, subroutines, tools, materials, specifications, processes, inventions (whether or not patentable and whether or not reduced to practice), apparatus, creations, improvements and other similar materials, and all recordings, graphs, drawings, reports, analyses, and other writings, and other embodiments of any of the foregoing, in any form or media whether or not specifically listed herein. Further, for purposes of this Agreement, “Software” means any and all computer programs, whether in source code or object code; databases and compilations, whether machine readable or otherwise; descriptions, flow-charts and other work product used to design, plan, organize and develop any of the foregoing; and all documentation, including user manuals and other training documentation, related to any of the foregoing.

  • Authorized Use of Trademarks Any required consent and authorization has been obtained for the use of any trademark or service xxxx in any advertising and supplemental sales literature or other materials delivered by the Company to the Dealer Manager or approved by the Company for use by the Dealer Manager and, to the Company’s knowledge, its use does not constitute the unlicensed use of intellectual property.

  • Licensed Software Section 3.17(f).......................................27

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Proprietary Materials Money Manager shall provide to RIMCo the following Proprietary Materials as requested: • Photographs of Portfolio Manager(s)—please provide a professionally taken color (business) headshot in portrait format. This can be provided as a 5x7 print or 300ppi resolution (or higher) Mac or PC electronic file. • Background/Biographical—please include an approved three to four sentence description of your firm, as well as a 100 word or less biography of each portfolio manager that works on a Xxxxxxx portfolio. Please make sure to identify the lead portfolio manager for each portfolio. • Logos (Trademarks)—please provide us with a 300ppi resolution (or higher) electronic Mac or PC file, preferably an .eps or in its original format—Adobe Photoshop, Freehand, or Illustrator. Include any footnote information and identity guidelines you would like included when we make use of your trademark. Please send these materials along with the appropriate marketing contact information such as their name, email address and phone number to: Xx. Xxxxxxx Xxxxxxx c/x Xxxxxxx Design Group Xxxxxxx Investment Group P.O. Box 1616 Tacoma, WA 98401-1616 U.S.A. Email Address: xxxxxxxx@xxxxxxx.xxx

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

Time is Money Join Law Insider Premium to draft better contracts faster.