Ownership and Use (A) Unless CITY states otherwise in writing, each document— including, but not limited to, each report, draft, record, drawing, or specification (collectively, “work product”)— that CONSULTANT prepares, reproduces, or causes its preparation or reproduction for this Agreement is CITY’s exclusive property. (B) CONSULTANT acknowledges that its use of the work product is limited to the purposes contemplated by the Scope of Work. CONSULTANT makes no representation of the work product’s application to, or suitability for use in, circumstances not contemplated by the Scope of Work.
OWNERSHIP AND USE OF DOCUMENTS 1.3.1 All drawings, specifications, estimates, and all other documents, including shop drawings and calculations, prepared at any time in connection with the Project, shall, upon payment for services in connection therewith, become the sole property of the State.
Ownership and Liens The Borrower has title to, or valid leasehold interests in, all of its properties and assets, real and personal, including the properties and assets and leasehold interests reflected in the financial statements referred to in Section 4.04 (other than any properties or assets disposed of in the ordinary course of business), and none of the properties and assets owned by the Borrower and none of its leasehold interests is subject to any Lien, except such as may be permitted pursuant to Section 6.01 of this Agreement.
OWNERSHIP AND USE OF WORK PRODUCT All reports, studies, information, data, statistics, forms, designs, plans, procedures, systems and any other materials or properties produced in whole or in part under this Agreement in connection with the performance of the Required Services (collectively “Work Product”) shall be the sole and exclusive property of City. No such Work Product shall be subject to private use, copyrights or patent rights by Consultant in the United States or in any other country without the express, prior written consent of City. City shall have unrestricted authority to publish, disclose, distribute, and otherwise use, copyright or patent, in whole or in part, any such Work Product, without requiring any permission of Consultant, except as may be limited by the provisions of the Public Records Act or expressly prohibited by other applicable laws. With respect to computer files containing data generated as Work Product, Consultant shall make available to City, upon reasonable written request by City, the necessary functional computer software and hardware for purposes of accessing, compiling, transferring and printing computer files.
Protection of the Environment If the Contractor encounters circumstances such as weather conditions or site factors where the Contractor knows or should reasonably know that proceeding with the Work may, directly or indirectly, cause Environmental Damage, the Contractor shall:
Ownership and Intellectual Property (a) The GLO shall own, and Developer hereby irrevocably assigns to the GLO, all ownership rights, titles, and interests in and to all Intellectual Property acquired or developed by Developer pursuant to this Contract (including, without limitation, all Intellectual Property in and to reports, drafts of reports, data, drawings, computer programs and codes, and/or any other information or materials acquired or developed by Developer under this Contract). The GLO shall have the right to obtain and hold in its name any and all patents, copyrights, trademarks, service marks, registrations, or such other protections, including extensions and renewals thereof, as may be appropriate to the subject matter. (b) Developer must give the GLO, the State of Texas, and any person designated by the GLO or the State of Texas all assistance and execute such documents as required to perfect the rights granted to the GLO herein, without any charge or expense beyond the stated amount payable to Developer for the services authorized under this Contract.
Access and Use 1. Each Party shall ensure that any service supplier of the other Party is accorded access to and use of public telecommunications transport networks and services in a timely fashion, on transparent, reasonable and nondiscriminatory terms and conditions. This obligation shall be applied, inter alia, through paragraphs 2 through 6. 2. Each Party shall ensure that service suppliers of the other Party have access to and use of any public telecommunications transport network or service offered within or across the border of that Party, including private leased circuits, and to this end shall ensure, subject to the provisions of paragraphs 5 and 6, that such suppliers are permitted: (a) to purchase or lease and attach terminal or other equipment which interfaces with the network and which is necessary to supply their services; (b) to interconnect private leased or owned circuits with public telecommunications transport networks and services or with circuits leased or owned by other service suppliers; (c) to use operating protocols of their choice in the supply of any service, other than as necessary to ensure the availability of telecommunications transport networks and services to the public generally; and (d) to perform switching, signaling and processing functions. 3. Each Party shall ensure that service suppliers of the other Party may use public telecommunications transport networks and services for the movement of information 4. Notwithstanding the provisions of paragraph 3, a Party may take such measures as are necessary: (a) to ensure the security and confidentiality of messages; or (b) to protect the personal data of users of public telecommunications transport networks or services, subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services. 5. Each Party shall ensure that no condition is imposed on access to and use of public telecommunications transport networks and services other than as necessary: (a) to safeguard the public service responsibilities of suppliers of public telecommunications transport networks and services, in particular their ability to make their networks or services available to the public generally; or (b) to protect the technical integrity of public telecommunications transport networks or services.
Ownership and License 5.1 Unless otherwise specified in a SOW and except as provided in Section 5.2, Cisco is the sole and exclusive owner of all Deliverables and Supplier hereby irrevocably assigns and transfers to Cisco all of its worldwide right and title to, and interest in, the Deliverables, including all associated Intellectual Property Rights. 5.2 Unless otherwise specified in a SOW, each party owns all right, title, and interest in and to any of its Preexisting Materials. Supplier hereby grants Cisco a perpetual, irrevocable, worldwide, transferable, royalty-free, nonexclusive license, with the right to sublicense and authorize the granting of sublicenses, to use and reproduce Supplier's Preexisting Materials in the Deliverables to the extent necessary for Cisco’s exercise and exploitation of its rights in the Deliverables. 5.3 Unless otherwise specified in an SOW, Supplier will obtain and assign to Cisco a non- exclusive, royalty-free, worldwide, perpetual, irrevocable, transferable, sub-licensable license to use all Third Party Intellectual Property Rights incorporated into, required to use, or delivered with the Work. Supplier will deliver copies of the above releases and licenses to Cisco upon Xxxxx’s request.
Ownership and Licenses 54 Section 16.01 Property damage.....................................................................................................................55 Section 16.02 Risk of Loss.............................................................................................................................55 Section 16.03 Limitation of HHSC’s Liability..................................................................................................55 Section 17.01 Insurance Coverage................................................................................................................55 Section 17.02 Performance Bond..................................................................................................................57 Section 17.03 TDI Fidelity Bond.....................................................................................................................57
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.