Ownership and Reuse of Documents All documents, data, reports, research, graphic presentation materials, etc., developed by Contractor as a part of its work under this Agreement, shall become the property of County upon completion of this Agreement, or in the event of termination or cancellation thereof, at the time of payment under Section 3 for work performed. Contractor shall promptly furnish all such data and material to County on request.
Ownership and Control All components of the Placer County Technology Platform, including voicemail, email messages sent and received, files and records created or placed on any County file server, and all data placed onto or accessed by the County’s computer network including internet access, are and remain either the property of or under the control of Placer County and not the User.
Ownership and Use (A) Unless CITY states otherwise in writing, each document— including, but not limited to, each report, draft, record, drawing, or specification (collectively, “work product”)— that CONSULTANT prepares, reproduces, or causes its preparation or reproduction for this Agreement is CITY’s exclusive property. (B) CONSULTANT acknowledges that its use of the work product is limited to the purposes contemplated by the Scope of Work. CONSULTANT makes no representation of the work product’s application to, or suitability for use in, circumstances not contemplated by the Scope of Work.
OWNERSHIP AND USE OF DOCUMENTS 1.3.1 All drawings, specifications, estimates, and all other documents, including shop drawings and calculations, prepared at any time in connection with the Project, shall, upon payment for services in connection therewith, become the sole property of the State.
OWNERSHIP AND RISK 8.1 Miele remains the owner of the product/s until the price is paid in full to Miele and the product/s have been delivered to the customer. 8.2 The customer must not sell or otherwise deal with the product/s until the price is paid in full to Miele. If the customer purports to do so, the customer will be deemed to hold the proceeds of sale or other realisation (or the amount equal to the outstanding) on trust for Miele. 8.3 Notwithstanding clauses 8.1 and 8 .2, the risk of loss of or damage to the product/s passes to the customer upon delivery. After delivery, the customer is responsible for storing the product/s prior to any installation and is liable for any loss or damage which occurs during such storage.
Ownership and Rights a. Electronic Access, including any database, any software (including for the avoidance of doubt, Proprietary Software) and any proprietary data, processes, scripts, information, training materials, manuals or documentation made available as part of the Electronic Access (collectively, the “Information”), are the exclusive and confidential property of XXX Xxxxxx xxx/xx XXX Xxxxxx’s suppliers. You may not use or disclose the Information except as expressly authorized by these Terms and Conditions. You will, and will cause Users and Your third parties and their users, to keep the Information confidential by using the same care and discretion that You use with respect to Your own confidential information, but in no event less than reasonable care. b. The provisions of this paragraph will not affect the copyright status of any of the Information which may be copyrighted and will apply to all Information whether or not copyrighted. c. Nothing in these Terms and Conditions will be construed as giving You or Users any license or right to use the trade marks, logos and/or service marks of BNY Mellon, its affiliates, its Information Providers or BNY Mellon’s Suppliers. d. Any Intellectual Property Rights and any other rights or title not expressly granted to You or Users under these Terms and Conditions are reserved to BNY Mellon, its Information Providers and BNY Mellon’s Suppliers. “Intellectual Property Rights” includes all copyright, patents, trademarks and service marks, rights in designs, moral rights, rights in computer software, rights in databases and other protectable lists of information, rights in confidential information, trade secrets, inventions and know-how, trade and business names, domain names (including all extensions, revivals and renewals, where relevant) in each case whether registered or unregistered and applications for any of them and the goodwill attaching to any of them and any rights or forms of protection of a similar nature and having equivalent or similar effect to any of them which may subsist anywhere in the world.
Ownership and Restrictions 4.1 You retain all ownership and intellectual property rights in and to Your Content and Your Applications. Oracle or its licensors retain all ownership and intellectual property rights to the Services, including Oracle Programs and Ancillary Programs, and derivative works thereof, and to anything developed or delivered by or on behalf of Oracle under this Agreement. 4.2 You may not, and may not cause or permit others to: a) remove or modify any program markings or any notice of Oracle’s or its licensors’ proprietary rights; b) make the programs or materials resulting from the Services (excluding Your Content and Your Applications) available in any manner to any third party for use in the third party’s business operations (unless such access is expressly permitted for the specific Services You have acquired); c) modify, make derivative works of, disassemble, decompile, reverse engineer, reproduce, distribute, republish or download any part of the Services (the foregoing prohibitions include but are not limited to review of data structures or similar materials produced by programs), or access or use the Services in order to build or support, and/or assist a third party in building or supporting, products or Services competitive to Oracle; d) perform or disclose any benchmark or performance tests of the Services, including the Oracle Programs; e) perform or disclose any of the following security testing of the Services Environment or associated infrastructure: network discovery, port and service identification, vulnerability scanning, password cracking, remote access testing, or penetration testing; and f) license, sell, rent, lease, transfer, assign, distribute, host, outsource, permit timesharing or service bureau use, or otherwise commercially exploit or make available the Services, Oracle Programs, Ancillary Programs, Services Environments or Oracle materials to any third party, other than as expressly permitted under the terms of the applicable order.
Ownership and Liens The Borrower has title to, or valid leasehold interests in, all of its properties and assets, real and personal, including the properties and assets and leasehold interests reflected in the financial statements referred to in Section 4.04 (other than any properties or assets disposed of in the ordinary course of business), and none of the properties and assets owned by the Borrower and none of its leasehold interests is subject to any Lien, except such as may be permitted pursuant to Section 6.01 of this Agreement.
Ownership and Risk of Loss You will own the Device and bear all risk of loss of, theft of, casualty to or damage to the Device, from the time it is shipped to you until the time (if any) when it is returned to us in accordance with this Agreement.
Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.