Protection of Limited Rights Data Sample Clauses

Protection of Limited Rights Data. When data other than that listed in paragraphs (b)(1)(i), (ii), and (iii) of this clause are specified to be delivered under this agreement and such data qualify as either limited rights data or restricted computer software, the Recipient, if the Recipient desires to continue protection of such data, shall withhold such data and not furnish them to the Government under this agreement. As a condition to this withholding the Recipient shall identify the data being withheld and furnish form, fit, and function data in lieu thereof.
AutoNDA by SimpleDocs
Protection of Limited Rights Data. (1) When data other than that listed in subparagraphs (b)(1)(i), (ii), and (iii) of this clause are specified to be delivered under this agreement and such data qualify as either limited rights data or restricted computer software, the Recipient, if the Recipient desires to continue protection of such data, shall withhold such data and not furnish them to the Government under this agreement. As a condition to this withholding the Recipient shall identify the data being withheld and furnish form, fit, and function data in lieu thereof. (2) Notwithstanding subparagraph (h) (1) of this clause, the agreement may identify and specify the delivery of limited rights data, or the Contracting Officer may require by written request the delivery of limited rights data that has been withheld or would otherwise be withholdable. If delivery of such data is so required, the Recipient may affix the following "Limited Rights Notice" to the data and the Government will thereafter treat the data, in accordance with such Notice: LIMITED RIGHTS NOTICE (a) These data are submitted with limited rights under Government agreement No. DE-FE0001882 (and subaward/contract No. , if appropriate). These data may be reproduced and used by the Government with the express limitation that they will not, without written permission of the Recipient, be used for purposes of manufacture nor disclosed outside the Government; except that the Government may disclose these data outside the Government for the following purposes, if any, provided that the Government makes such disclosure subject to prohibition against further use and disclosure: (1) Use (except for manufacture) by Federal support services contractors within the scope of their contracts; (2) This "limited rights data" may be disclosed for evaluation purposes under the restriction that the "limited rights data" be retained in confidence and not be further disclosed; (3) This "limited rights data" may be disclosed to other contractors participating in the Government's program of which this Recipient is a part for information or use (except for manufacture) in connection with the work performed under their awards and under the restriction that the "limited rights data" be retained in confidence and not be further disclosed; (4) This "limited rights data" may be used by the Government or others on its behalf for emergency repair or overhaul work under the restriction that the "limited rights data" be retained in confidence and not be furt...

Related to Protection of Limited Rights Data

  • Protection of Rights Licensee shall not copy, translate, disassemble, decompile, nor reverse engineer the Software or other SAP Materials. Licensee shall not create or attempt to create the source code from the object code of the Software or other SAP Materials. Licensee is permitted to back up data in accordance with good information technology practice and for this purpose to create the necessary backup copies of the Software. Backup copies on transportable discs or other data media must be marked as backup copies and bear the same copyright and authorship notice as the original discs or other data media, unless technically infeasible. Licensee must not change or remove SAP’s copyright and authorship notices.

  • Protection of Proprietary Rights 4.1 Right to Use Licensed Products Licensee acknowledges that no right, title, or interest, other than the right to use the Licensed Products, is transferred or granted by this Agreement. Licensee is prohibited from selling, renting, leasing, making available to third parties, and sublicensing the Licensed Products.

  • Confidentiality and Data Protection We are a data controller for the information you provide to us including individual, identification and financial details, policy history and special category data (such as medical or criminal history). Details of our legal basis for processing your information, along with details of any third party recipient whom it may be necessary to share your personal data with in order to fulfil the contract, retention period for data held, security of your data, your rights under the UK General Data Protection Regulations (UK GDPR) including the right to complain can be found in our full ‘Privacy Notice’ attached to these terms of business and/or on our website at xxx.xxxxxxxxxxxxxxxx.xx.xx.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Benefits of Agreement; No Third-Party Rights The provisions of this Agreement are intended solely to benefit the Member and, to the fullest extent permitted by applicable law, shall not be construed as conferring any benefit upon any creditor of the Company (and no such creditor shall be a third-party beneficiary of this Agreement), and the Member shall have no duty or obligation to any creditor of the Company to make any contributions or payments to the Company.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto. 8.2 The Receiving Party warrants that it and its Agents have the appropriate technical and organisational measures in place against unauthorised or unlawful processing of data relating to the Bid and against accidental loss or destruction of, or damage to such data held or processed by them.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Disclaimer of Warranties; Limitation of Liability LESSEE UNDERSTANDS AND ACKNOWLEDGES THAT ROCRENTS IS NEITHER THE MANUFACTURER OF THE EQUIPMENT NOR THE AGENT OF THE MANUFACTURER. ROCRENTS MAKES NO WARRANTIES, EXPRIESSED OR IMPLIED, INCLUDING AS TO THE MERCHANTABILTY, FITNESS FOR A PARTICULAR PURPOSE, SUITBILITY FOR INTENDED USE, DESIGN, OR WORKMANSHIP OF THE EQUIPMTENT. LESSEE ACKNOWLEDGES THAT, EXCEPT FOR ANY WARRANTY PROVIDED BY THE MANUFACTURER OF THE EQUIPMENT, THE EQUIPMENT IS BEING RENTED TO LESSEE ON AN “AS IS” AND “WITH ALL FAULTS” BASIS, WITHOUT ANY WARRANTIES, EXPRESS OR IMPLIED, AS TO CONDITION AND WITHOUT ANY RECOURSE WHATSOEVER TO ROCRENTS. LESSEE FURTHER ACKOWLEDGES THAT IT IS RELYING SOLELY ON ITS OWN EXAMINATION OF THE EQUIPMENT AND IS NOT RELYING ON ANY REPRESENTATION OR WARRANTY, EXPRESS OR IMPLIED, FROM ROCRENTS. CUTOMER HEREBY EXPRESSLY ASSUMES THE RISK OF, AND RELEASES AND WIAVERS ANY AND ALL RIGHTS THAT IT MAY HAVE AGAINST ROCRENTS FOR, ANY AND ALL LIABILITIES AND DAMAGES, INCLUDING INCIDENTIAL AND CONSEQUENTIAL DAMAGES, CAUSED BY, RESULTING FROM OR IN ANY WAY CONNECTED WITH THE EQUIPMENT, THE OPERATION OR USE OF THE EQUIPMENT, ANY DEFECT IN OR FAILURE OF THE EQUIPMENT, AND/OR ROCRENTS'S FAILURE TO PRESENT OR DELIVER THE EQUIPMENT.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!