INTELLECTUAL PROPERTY RIGHTS - DATA RIGHTS A. Data produced under this Annex which is subject to paragraph C. of the Intellectual Property Rights - Data Rights Article of the Umbrella Agreement will be protected for the period of one year. B. Under paragraph H. of the Intellectual Property Rights - Data Rights Article of the Umbrella Agreement, Disclosing Party provides the following Data to Receiving Party. The lists below may not be comprehensive, are subject to change, and do not supersede any restrictive notice on the Data provided.
Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto. 8.2 The Receiving Party warrants that it and its Agents have the appropriate technical and organisational measures in place against unauthorised or unlawful processing of data relating to the Bid and against accidental loss or destruction of, or damage to such data held or processed by them.
Privacy Rights In accordance with the Federal Family Education Rights and Privacy Act of 1974 (20 U.S.C. § 1232g), regulations adopted hereunder (34 C.F.R. 99) and California Education Code Section 67100 et seq., University policy allows the release of personally identifiable information to others (except to verify student status) only with the student’s prior consent or in the case of an extreme emergency or where there is clear imminent danger to the student, to others, or to society (San Francisco State University Bulletin,2023-2024).
Proprietary Rights The term “Proprietary Rights” shall mean all trade secret, patent, copyright, mask work and other intellectual property rights throughout the world.
Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.
Proprietary Rights Notices Licensee shall not remove any copyright notices, trademark notices or other proprietary legends of Oracle or its suppliers contained on or in the TCK, and shall incorporate such notices in all copies of any TCK. Licensee shall comply with all reasonable requests by Oracle to include additional copyright or other proprietary rights notices of Oracle or third parties from time to time.
Intellectual Property Rights and Confidentiality Clauses 3.1 Party A shall have exclusive and proprietary ownership, rights and interests in any and all intellectual properties arising out of or created during the performance of this Agreement, including but not limited to copyrights, patents, patent applications, software, technical secrets, trade secrets and others. Party B shall execute all appropriate documents, take all appropriate actions, submit all filings and/or applications, render all appropriate assistance and otherwise conduct whatever is necessary as deemed by Party A at its sole discretion for the purposes of vesting any ownership, right or interest of any such intellectual property rights in Party A, and/or perfecting the protections for any such intellectual property rights in Party A. 3.2 The Parties acknowledge that the existence and the terms of this Agreement and any oral or written information exchanged between the Parties in connection with the preparation and performance of this Agreement are regarded as confidential information. Each Party shall maintain confidentiality of all such confidential information, and without obtaining the written consent of the other Party, it shall not disclose any relevant confidential information to any third party, except for the information that: (a) is or will be in the public domain (other than through the receiving Party’s unauthorized disclosure); (b) is under the obligation to be disclosed pursuant to the applicable laws or regulations, rules of any stock exchange, or orders of the court or other government authorities; or (c) is required to be disclosed by any Party to its shareholders, directors, employees, legal counsels or financial advisors regarding the transaction contemplated hereunder, provided that such shareholders, directors, employees, legal counsels or financial advisors shall be bound by the confidentiality obligations similar to those set forth in this Section. Disclosure of any confidential information by the shareholders, director, employees of or agencies engaged by any Party shall be deemed disclosure of such confidential information by such Party and such Party shall be held liable for breach of this Agreement.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Confidentiality and Intellectual Property Rights (a) The parties acknowledge that the information which the disclosing party submits to the receiving party in connection with this Agreement includes disclosing party's confidential and proprietary information, both of a technical and commercial nature. Receiving party agrees not to disclose such information to third parties without disclosing party's prior written consent. (b) The intellectual property rights, copyrights and other rights connected therewith, in respect of drawings, specifications, documents, data and software made available by the Seller to the Buyer shall be owned solely by the Seller and shall remain its property. Buyer is not allowed to permit any third party to fabricate the Products or any parts thereof. (c) The Buyer is obliged to inform the Seller of any intellectual property rights that may exist with respect to the Equipment if Services are rendered for Equipment not supplied by the Seller. In case of third-party claims that may be asserted on the grounds of the existence of intellectual property rights on the Equipment or Products not delivered by the Seller, the Buyer shall indemnify and hold harmless the Seller against any such claims. (d) With regard to software the Seller grants to the Buyer a non-exclusive and non-transmissible right to use the intellectual property right, in machine-readable, object code form, on one system limited to the operation of the agreed Equipment. The software license shall be unlimited in time and free of charge, if not otherwise agreed. Neither the Buyer nor any third party shall modify, reproduce, translate, reverse engineer, transfer from object code to the source code or decompile the Seller´s software. The license does not entitle the Buyer to use the software for any equipment other than the agreed Equipment, to grant sub-licenses or to copy the software documents without the Seller ´s prior written consent. The Buyer is only entitled to make a single copy for backup purposes to be able to reload the system limited to the one agreed Equipment. If the Buyer exchanges the agreed Equipment, new software has to be purchased and installed. In case of termination of the Agreement the license terminates and all copies of the software and the documentation shall be returned to the Seller promptly after termination.
Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format: