Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.
Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.
Audit of Existing Content and Functionality By September 1, 2017, the Recipient will propose for OCR’s review and approval the identity and bona fides of an Auditor (corporation or individual) to audit all content and functionality on its website, including, but not limited to, the home page, all subordinate pages, and intranet pages and sites, to identify any online content or functionality that is inaccessible to persons with disabilities, including online content and functionality developed by, maintained by, or offered through a third party vendor or an open source. The Auditor will have sufficient knowledge and experience in website accessibility for people with disabilities to carry out all related tasks, including developing a Proposed Corrective Action Plan. The Audit will use the Benchmarks for Measuring Accessibility set out above, unless the Recipient receives prior permission from OCR to use a different standard as a benchmark. During the Audit, the Recipient will also seek input from members of the public with disabilities, including parents, students, employees, and others associated with the Recipient, and other persons knowledgeable about website accessibility, regarding the accessibility of its online content and functionality.
Ownership and Intellectual Property Rights 1. This Agreement gives you limited rights to use the Software. Syncro retains any and all rights, title and interest in and to the Software and all copies thereof, including copyrights, patents, trade secret rights, trademarks and other intellectual property rights. All rights not specifically granted in this Agreement, including International Copyrights, are reserved by Syncro. The structure, organization and code of the Software are valuable trade secrets and confidential information of Syncro.
Ownership and Intellectual Property (a) The GLO shall own, and Developer hereby irrevocably assigns to the GLO, all ownership rights, titles, and interests in and to all Intellectual Property acquired or developed by Developer pursuant to this Contract (including, without limitation, all Intellectual Property in and to reports, drafts of reports, data, drawings, computer programs and codes, and/or any other information or materials acquired or developed by Developer under this Contract). The GLO shall have the right to obtain and hold in its name any and all patents, copyrights, trademarks, service marks, registrations, or such other protections, including extensions and renewals thereof, as may be appropriate to the subject matter. (b) Developer must give the GLO, the State of Texas, and any person designated by the GLO or the State of Texas all assistance and execute such documents as required to perfect the rights granted to the GLO herein, without any charge or expense beyond the stated amount payable to Developer for the services authorized under this Contract.
County of Orange Child Support Enforcement Subrecipient certifies it is in full compliance with all applicable federal and state reporting requirements regarding its employees and with all lawfully served Wage and Earnings Assignment Orders and Notices of Assignments and will continue to be in compliance throughout the term of the Contract with the County of Orange. Failure to comply shall constitute a material breach of the Contract and failure to cure such breach within 60 calendar days of notice from the County shall constitute grounds for termination of the Contract.
Intellectual Property Rights and Ownership 5.1. You acknowledge that all Intellectual Property Rights (including any new Intellectual Property Rights) arising out of or in connection with the Access Products and associated Documentation, belong at all times to Us or Our licensors. 5.2. Nothing in this Agreement shall transfer any Intellectual Property Rights in or arising from Access Products or Documentation to You but that these shall remain vested in Us or Our licensors. No rights to use any such Intellectual Property are granted, except as expressly stated in these Terms and Conditions or the relevant Statement of Work. If, notwithstanding this, any Intellectual Property Rights in or arising from the Access Product and/or Documentation are acquired by You (including any new Intellectual Property Rights), You hereby assign (and to the extent that any such Intellectual Property Rights are not capable of such assignment, agree to hold on trust) and agree to do all such things and sign all such documents as We may reasonably require in respect of the assignment of all such Intellectual Property Rights to Us or Our licensors as may be appropriate. 5.3. Subject to clauses 5.6 and 5.7, We will indemnify You against all direct costs, claims, demands, expenses (including reasonable legal costs) and liabilities of whatever nature incurred by or awarded against You arising out of or in connection with any claim that Your use of the Access Product(s) any Documentation, information, data, computer facilities or material that We supply, infringes a third party’s Intellectual Property (Infringement Claim). 5.4. We warrant that We are not aware that the Access Product(s) any Documentation, information, data, computer facilities or material that We supply, or Your use of the same in accordance with the terms of this Agreement, will infringe any third party’s Intellectual Property Rights but We have not carried out any investigation into the same. We shall indemnify You against all direct costs, claims, demands, expenses (including reasonable legal costs) and liabilities of whatever nature incurred by or awarded against You arising out of or in connection with any breach of the warranty contained in this clause. 5.5. If an Infringement Claim is alleged or threatened against either You or Us, or if We believe that the Access Product or the Documentation or any part thereof may infringe any third party’s copyright or registered patent (effective at the date of this Agreement), We may, at Our sole option, (i) procure such licence, authorisation or consent as is necessary to enable Your continued use of the Access Product and/or the Documentation; (ii) modify or replace the same as necessary to avoid infringement without any material adverse effect to the functionality of the Access Product; or (iii) terminate this Agreement and/or the affected Statement of Work and refund an amount equal to the unused portion of any Annual Licence Fees pre-paid in respect of such Software (as the case may be) to You. 5.6. You shall permit Us to have access upon reasonable Notice during the Licence Term to inspect during Business Hours the premises and the Customer System at or on which the Software is being kept or used, and any records kept pursuant to the Licence, for the purposes of ensuring that You are complying with the terms of this Agreement. In carrying out such an inspection We will comply with any reasonable restrictions You require, and We will only request such an inspection where We believe We have reasonable cause to do so. In the event that You have unauthorised copies of the Software, without prejudice to any other rights or remedies that We may have, You shall pay an additional fee to Us in respect of any such unauthorised copies calculated by reference to the standard list price prevailing at the date of invoice in respect of such Software. 5.7. Without prejudice to clause 5.8, We shall only be liable under the terms of this Agreement for an Infringement Claim or alleged Infringement Claim if (i) You promptly notify Us of any infringement or alleged infringement of which You are aware, or ought reasonably to have been made aware of; (ii) You make no admission as to liability or agree any settlement of such claim without Our prior written consent; (iii) You allow Us (or a relevant third party supplier), at Our expense, to conduct and/or settle all negotiations and litigation arising from any claim or action relating to the alleged infringement; and (iv) You, at Our expense, give Us (or a relevant third party supplier) such reasonable assistance as may berequested in such settlement or negotiation. 5.8. We shall have no liability for any Infringement Claim or alleged Infringement Claim to the extent such claim arises from (i) possession, use, development, modification, or operation of the Access Product or part thereof by You other than in accordance with the terms of this Agreement, the relevant Statement of Work or the Documentation; (ii) failure by You to take any reasonable corrective action directed by Us (including using an alternative, non-infringing version of the Access Products); or (iii) is based upon any item provided by You and incorporated into the Access Product(s) or used in combination with the Access Product(s) at Your request.
Protection and Registration of Intellectual Property Rights (a) Each Co-Borrower shall (i) protect, defend and maintain the validity and enforceability of its Intellectual Property material to Borrower’s business; (ii) promptly advise Bank in writing of material infringements or any other event that could reasonably be expected to materially and adversely affect the value of its Intellectual Property material to Borrower’s business; and (iii) not allow any Intellectual Property material to a Co-Borrower’s business to be abandoned, forfeited or dedicated to the public without Bank’s written consent. (b) If a Co-Borrower (i) obtains any Patent, registered Trademark, registered Copyright, registered mask work, or any pending application for any of the foregoing, whether as owner, licensee or otherwise, or (ii) applies for any Patent or the registration of any Trademark, then such Co-Borrower shall, within the later of (A) fifteen (15) days from the date of such application or (B) on the next Compliance Certificate delivered in accordance with the terms of Section 6.2 hereof, provide written notice thereof to Bank and shall execute such intellectual property security agreements and other documents and take such other actions as Bank may request in its good faith business judgment to perfect and maintain a first priority perfected security interest in favor of Bank in such property. If a Co-Borrower decides to register any Copyrights or mask works in the United States Copyright Office, such Co-Borrower shall: (x) provide Bank with at least fifteen (15) days prior written notice of such Co-Borrower’s intent to register such Copyrights or mask works together with a copy of the application it intends to file with the United States Copyright Office (excluding exhibits thereto); (y) execute an intellectual property security agreement and such other documents and take such other actions as Bank may request in its good faith business judgment to perfect and maintain a first priority perfected security interest in favor of Bank in the Copyrights or mask works intended to be registered with the United States Copyright Office; and (z) record such intellectual property security agreement with the United States Copyright Office contemporaneously with filing the Copyright or mask work application(s) with the United States Copyright Office. Each Co-Borrower shall promptly provide to Bank copies of all applications that it files for Patents or for the registration of Trademarks, Copyrights or mask works, together with evidence of the recording of the intellectual property security agreement required for Bank to perfect and maintain a first priority perfected security interest in such property.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Installation and Use Rights You may install and use any number of copies of the software on your devices.