Protection of Framework Code Sample Clauses

Protection of Framework Code s+c agrees to ensure that any s+c products that include any components of the Framework Code (which, pursuant to Section 3.2, must be for use outside the Exclusive Field) shall be licensed to s+c’s customers pursuant to Object Code licenses; shall be protected from unauthorized, unlicensed use; and shall include provisions prohibiting reverse engineering, decompiling, disassembling the Object Code or otherwise discovering the Source Code to the full extent permitted by law. s+c agrees that, should s+c sell or license any components of the Framework Code to other sub-licensees, any products of said sub-licensees which contain any components of the Framework Code shall be subject to the same provisions preventing unauthorized discovery of Source Code and prohibiting use in the Exclusive Field. s+c represents, warrants and covenants that the Framework Code has been and will continue to be maintained as s+c’s Confidential Information (as that term is defined in Section 11.1 below); that s+c will not publicly disclose the Framework Code; and that s+c has not licensed and will not license any portion of the Framework Code to any person or entity subject to an “open source” license or any other form of license that requires public disclosure of Source Code.
AutoNDA by SimpleDocs

Related to Protection of Framework Code

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of PFPC Trust PFPC Trust shall be indemnified by the Fund and without liability for any action PFPC Trust takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC Trust receives from or on behalf of the Fund or from counsel and which PFPC Trust believes, in good faith, to be consistent with those directions or advice or Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC Trust (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Data Protection The Administrator shall implement and maintain a comprehensive written information security program that contains appropriate security measures to safeguard the personal information of the Trust’s shareholders, employees, directors and/or officers that the Administrator receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • PROTECTION OF GOODWILL You acknowledge that the Company is providing you with this Restricted Stock Award in connection with and in consideration for your promises and covenants contained herein. Specifically, in consideration for the Restricted Stock Award, which you acknowledge provides a material incentive for you to grow, develop and protect the goodwill and confidential and proprietary information of the Company, you agree that the Restricted Stock Award (itself and in combination with any other awards made to you) constitutes independent and sufficient consideration for all non-competition, non-solicitation and confidentiality covenants between you and the Company, and agree and acknowledge that you will fully abide by each of such covenants. You further acknowledge that your promise to fully abide by each of the protective covenants referenced above is a material inducement for the Company to provide you with the Restricted Stock Award.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Protection of Rights The Servicer shall take no action which, nor omit to take any action the omission of which, would impair the rights of the Trustee in any Receivable, if any, nor shall it reschedule, revise or defer payments due on any Receivable except in accordance with the applicable Credit Guidelines, nor shall it sell any assets in the Trust except as provided in this Agreement or a related Supplement.

  • Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.

  • Protection of Proprietary Rights 8.1 Acknowledgment of Proprietary Materials. Distributor hereby --------------------------------------- acknowledges that all Software, Documentation and technical support and training materials provided to Distributor by Xxxxxx.xxx (collectively, the "Materials") are protected by the copyright laws of the United States and other countries and that the Materials embody valuable confidential and trade secret information of Xxxxxx.xxx, the development of which required the expenditure of considerable time and money by Xxxxxx.xxx.

  • Tenant’s Remedies/Limitation of Liability Landlord shall not be in default hereunder unless Landlord fails to perform any of its obligations hereunder within 30 days after written notice from Tenant specifying such failure (unless such performance will, due to the nature of the obligation, require a period of time in excess of 30 days, then after such period of time as is reasonably necessary). Upon any default by Landlord, Tenant shall give notice by registered or certified mail to any Holder of a Mortgage covering the Premises and to any landlord of any lease of property in or on which the Premises are located and Tenant shall offer such Holder and/or landlord a reasonable opportunity to cure the default, including time to obtain possession of the Project by power of sale or a judicial action if such should prove necessary to effect a cure; provided Landlord shall have furnished to Tenant in writing the names and addresses of all such persons who are to receive such notices. All obligations of Landlord hereunder shall be construed as covenants, not conditions; and, except as may be otherwise expressly provided in this Lease, Tenant may not terminate this Lease for breach of Landlord’s obligations hereunder. All obligations of Landlord under this Lease will be binding upon Landlord only during the period of its ownership of the Premises and not thereafter. The term “Landlord” in this Lease shall mean only the owner for the time being of the Premises. Upon the transfer by such owner of its interest in the Premises, such owner shall thereupon be released and discharged from all obligations of Landlord thereafter accruing, but such obligations shall be binding during the Term upon each new owner for the duration of such owner’s ownership.

Time is Money Join Law Insider Premium to draft better contracts faster.