Intellectual Property and Ownership 11.1 AGI and its third party contributors respectively retain ownership of all rights, title and interest in and to all intellectual property rights associated with the Software and Documentation. This Agreement shall not be construed in any manner as transferring any rights of ownership or license to the Software, and/or to the features or information therein except as may be explicitly stated in writing in this Agreement. All rights not expressly granted by AGI are reserved. The Software and Documentation are protected by copyright and other intellectual property laws and treaties.
Personal Property Securities Act 2009 (“PPSA”)
Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.
LOCATION OF QUALIFIED PROPERTY AND INVESTMENT The Land on which the Qualified Property shall be located and on which the Qualified Investment shall be made is described in EXHIBIT 2, which is attached hereto and incorporated herein by reference for all purposes. The Parties expressly agree that the boundaries of the Land may not be materially changed from its configuration described in EXHIBIT 2 unless amended pursuant to the provisions of Section 10.2 of this Agreement.
Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.
Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.
Ownership and Copyright All work product, information data, or documents produced hereunder by the Consultant and his subconsultants shall be delivered to Regents, and title thereto shall vest in Regents regardless of the stage to which the development of the study may have progressed. In addition, the Consultant hereby expressly assigns, transfers and otherwise quitclaims to the Regents, its heirs and assigns forever, all right, title and interest, including all copyrights and all termination/renewal rights is such copyrights and all causes of action accruing under such copyrights, in all studies, study calculations, drawings, specifications, other data, embodiments of such studies, documents or other works of authorship produced hereunder by the Consultant, his employees, and his subconsultants. The Consultant further warrants that this transfer of copyrights and other rights is valid against the world. Finally, reproducible copies of all work products and other technical data shall be furnished to the Regents without cost whether the work for which they are made be executed or not. The Consultant may make and retain for its use such additional copies as it may desire. Notwithstanding the rights, ownership, grants, assignments, transfers, and quitclaims set forth herein, the Regents expressly grants, assigns, and transfers a permanent and exclusive license to the Design Professional, its successors, and assigns, for the Design Professional’s Instruments of Service, and to each consultant (including the consultant’s successors and assigns) of the Design Professional for such consultant’s Instruments of Service, to use, reproduce, sell, transfer, and accomplish derivative works therefrom, for any and all purposes.
SAFETY AND PROTECTION OF PROPERTY The Contractor shall at all times:
Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.
DESCRIPTION OF QUALIFIED PROPERTY The Qualified Property that is subject to the Tax Limitation Amount is described in EXHIBIT 4, which is attached hereto and incorporated herein by reference for all purposes. Property which is not specifically described in EXHIBIT 4 shall not be considered by the District or the Appraisal District to be part of the Applicant’s Qualified Property for purposes of this Agreement, unless by official action the Board of Trustees provides that such other property is a part of the Applicant’s Qualified Property for purposes of this Agreement in compliance with Section 313.027(e) of the TEXAS TAX CODE, the Comptroller’s Rules, and Section 10.2 of this Agreement.