Protection of Formulae Sample Clauses

Protection of Formulae. Vendor shall at all times until payment of the Transaction Based Compensation use its reasonable commercial efforts to protect and preserve the security, confidentiality and value of the Formulae, and other confidential information related thereto. Without limiting the foregoing, the Vendor shall not disclose the contents of the Formulae except to those with a need to know basis for the purposes of fulfilling its obligations under this Agreement or the Supply Agreement, and provided that recipients of such disclosure have agreed in writing to perpetually maintain the confidentiality of such information.
AutoNDA by SimpleDocs

Related to Protection of Formulae

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of Trade Secrets The Executive agrees to maintain in strict confidence and, except as necessary to perform his duties for the Employer, the Executive agrees not to use or disclose any Trade Secrets of the Employer during or after his employment. “Trade Secret” means information, including a formula, pattern, compilation, program, device, method, technique, process, drawing, cost data or customer list, that: (i) derives economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

  • Protection of PFPC Trust PFPC Trust shall be indemnified by the Fund and without liability for any action PFPC Trust takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC Trust receives from or on behalf of the Fund or from counsel and which PFPC Trust believes, in good faith, to be consistent with those directions or advice or Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC Trust (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of Proprietary Rights 4.1 Right to Use Licensed Products Licensee acknowledges that no right, title, or interest, other than the right to use the Licensed Products, is transferred or granted by this Agreement. Licensee is prohibited from selling, renting, leasing, making available to third parties, and sublicensing the Licensed Products.

  • Application of Funding Techniques to Programs 6.3.1 The State shall apply the following funding techniques when requesting Federal funds for the component cash flows of the programs listed in sections 4.2 and 4.3 of this Agreement. 6.3.2 Programs Below are programs listed in Section 4.2 and Section 4.3.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.

  • PROTECTION OF WORK 12.1 Subcontractor shall effectually secure and protect the work done hereunder and assume full responsibility for the condition thereof until final acceptance by the OWNER and Contractor. Subcontractor further agrees to provide such protection as is necessary to protect the work and the workmen of Contractor, the OWNER, and other subcontractors from its operations. 12.2 Subcontractor shall be liable for any loss or damage to any work in place or to any equipment and materials on the job site caused by Subcontractor or its agents, employees or guests.

  • Protection of Proprietary Information The Seller has taken all reasonable steps to maintain the confidentiality of and otherwise protect and enforce their rights in all proprietary information pertaining to the Seller or any Seller Product. Without limiting the generality of the foregoing, no portion of the source code for any software ever owned or developed by the Seller has been disclosed or licensed to any escrow agent or other Person.

  • Other Methods of Procurement of Consultants’ Services The following table specifies the methods of procurement, other than Quality and Cost-based Selection, which may be used for consultants’ services. The Procurement Plan shall specify the circumstances under which such methods may be used. (a) Quality-based Selection (b) Selection under a Fixed Budget

  • Description of Funding Techniques 6.2.1 The following are terms under which standard funding techniques shall be implemented for all transfers of funds to which the funding technique is applied in section 6.3.2 of this Agreement. Funding Technique Name Description Actual Clearance, ZBA - Same Day Payment The State shall request funds the same day it pays out funds, in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. A Federal agency will deposit funds in a State account the same day as requested. The amount of the request shall be for the amount of funds that clear the State's account that day. This funding technique is interest neutral. Composite Clearance The State shall request funds such that they are deposited on the dollar-weighted average number of days required for funds to be paid out for a series of disbursements, in accordance with the clearance pattern specified in Exhibit II. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be the sum of the payments issued in the series of disbursements. This funding technique is interest neutral. Pre-Issuance The State shall request funds such that they are deposited in a State account not more than three business days prior to the day the State makes a disbursement. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be the amount the State expects to disburse. This funding technique is not interest neutral. 6.2.2 The following are terms under which funding techniques for administrative costs shall be implemented for all transfers of funds to which the funding technique is applied in section 6.3.2 of this Agreement. Funding Technique Name Description Actual Costs - Estimated Allocation - Monthly The State shall request funds once a month, such that they are deposited on the median day of the month, to fund the activity of the prior month. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be an estimate based on the actual costs of the month distributed to the program according to the allocation of costs for the preceding six months. This funding technique is interest neutral. 6.2.3 The following are terms under which miscellaneous funding techniques shall be implemented for all transfers of funds to which the funding technique is applied in section 6.3.2 of this Agreement. There are currently no funding techniques listed in Section 6.2.3. 6.2.4 The following are terms under which State unique funding techniques shall be implemented for all transfers of funds to which the funding technique is applied in section 6.3.2 of this Agreement. There are currently no programs listed for Section 6.2.4.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!