PATENTING AND PROTECTION OF DELIVERABLES Sample Clauses

PATENTING AND PROTECTION OF DELIVERABLES. The Parties may in their sole discretion, elect to obtain any protection, such as patent protection, or abandon any protection for any Deliverables as set forth in Schedule C of this Agreement. Where applicable, the Parties shall consult each other in good faith on the scope and content of any such patent application, reasonable expenses incurred by the Parties in conjunction with the preparation, filing and maintenance of any such patent application and determine the agreed period to file for a patent application.
AutoNDA by SimpleDocs

Related to PATENTING AND PROTECTION OF DELIVERABLES

  • UPDATING AND DISCLOSING FINANCIAL INFORMATION You will provide facts to update information contained in Your original Account application or other financial information related to You, at Our request. You also agree that We may, from time to time, as We deem necessary, make inquiries pertaining to Your employment, credit standing and financial responsibility in accordance with applicable laws and regulations. You further agree that We may give information about the status and payment history of Your Account to consumer credit reporting agencies, a prospective employer or insurer, or a state or federal licensing agency having any apparent legitimate business need for such information.

  • ACKNOWLEDGEMENT AND PROTECTION OF INTELLECTUAL PROPERTY RIGHTS 9.1 The Institution acknowledges that all copyrights, patent rights, trade marks, database rights, trade secrets and other intellectual property rights relating to the Licensed Material are the sole and exclusive property of Publisher or are duly licensed to the Publisher and that this Licence does not assign or transfer to the Institution any right, title or interest therein except for the right to use the Licensed Material in accordance with the terms and conditions of this Licence.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Freedom to Use Ideas Subject to Section 9 and Client’s rights in Client Information and notwithstanding anything to the contrary contained in this Agreement or an Order Form, the ideas, methods, concepts, know-how, structures, techniques, inventions, developments, processes, discoveries, improvements and other information and materials developed in and during the course of any Order Form may be used by Red Hat, without an obligation to account, in any way Red Hat deems appropriate, including by or for itself or its clients or customers.

  • Reporting and Documenting Breaches 6.1 Business Associate shall Report to Covered Entity any Breach of Unsecured PHI as soon as it, or any Person to whom PHI is disclosed under this Agreement, becomes aware of any such Breach, and in no event later than five (5) business days after such awareness, except when a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security. Such Report shall be timely made notwithstanding the fact that little information may be known at the time of the Report and need only include such information then available.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • CONFIDENTIAL INFORMATION AND PUBLICITY 11.1 If Cisco and Supplier have entered into a Non-Disclosure Agreement (“NDA”) which covers disclosure of confidential information under the Purchase Order, and if the term of the NDA expires before the expiration or termination of the Purchase Order, then the term of the NDA shall be automatically extended to match the term of the Purchase Order.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Clarification of Documents 2.5.1 A prospective tenderer requiring any clarification of the tender document may notify the Procuring entity in writing or by post at the entity’s address indicated in the Invitation to Tender. The Procuring entity will respond in writing to any request for clarification of the tender documents, which it receives not later than seven (7) days prior to the deadline for the submission of tenders, prescribed by the procuring entity. Written copies of the Procuring entities response (including an explanation of the query but without identifying the source of inquiry) will be sent to all prospective tenderers that have received the tender document.

Time is Money Join Law Insider Premium to draft better contracts faster.