Protection of RD Mx Sample Clauses

Protection of RD Mx. Licensee shall not do or attempt to do directly or indirectly any of the following: tamper, access without authorization, reverse engineer, decompile, disassemble, analyze, sabotage, manipulate, modify, interfere, misuse, misappropriate, copy, or disclose the RD Mx formulation or use the RD Mx to make anything but the Product. Licensee agrees and acknowledges that RDT has no obligation to provide Confidential Information to Licensee under this Agreement, except necessary to give effect to the License Grant, and that notwithstanding any other provision in this Agreement RDT shall never provide Licensee with a list of the ingredients for RD Mx, but may disclose such list of ingredients directly to a Regulatory Authority in order to assist the Licensee in obtaining the necessary Regulatory Authorizations and Licensee agrees and acknowledges that it has no right, title, or interest in such ingredients whether at law or pursuant to the terms of this Agreement.
AutoNDA by SimpleDocs

Related to Protection of RD Mx

  • Protection of Rights Licensee is not entitled to copy, translate, disassemble, decompile nor reverse engineer the Software or other SAP Materials. Licensee must not create or attempt to create the source code from the object code of the Software or other SAP Materials. Licensee is permitted to back up data in accordance with good information technology practice and for this purpose to create the necessary backup copies of the Software. Backup copies on transportable discs or other data media must be marked as backup copies and bear the same copyright and authorship notice as the original discs or other data media, unless technically infeasible. Licensee must not change or remove SAP’s copyright and authorship notices.

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of PFPC Trust PFPC Trust shall be indemnified by the Fund and without liability for any action PFPC Trust takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC Trust receives from or on behalf of the Fund or from counsel and which PFPC Trust believes, in good faith, to be consistent with those directions or advice or Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC Trust (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • PROTECTION OF TEACHERS A. The Board recognizes its responsibility to continue to give administrative backing and support to its teachers, although each teacher bears the primary responsibility for maintaining proper control and discipline in his/her classroom. The teachers recognize that all disciplinary actions and methods invoked by them shall be reasonable and just. The Board further recognizes that teachers cannot maintain the proper classroom atmosphere when, and if, they are charged with the responsibility of serving as custodians for persistently and/or excessively disruptive students. It shall be the responsibility of the teacher to report immediately to his principal the name of any student who, in the opinion of the teacher, needs particular assistance from skilled personnel. The teacher shall, upon request, be advised by the principal of the disposition of the teacher's report that a particular student needs such assistance. B. If criminal or civil proceedings are brought against a teacher arising out of disciplinary action taken by a teacher against a student, the Board, upon request, will provide initial legal counsel to advise the teacher of his/her rights. The Association, after review of the facts of the case, may request the Board to furnish legal counsel to defend the teacher in such proceedings. If the request is denied, a three member committee consisting of a member of the LEA, a member of the Administration, and a member of the Board will review for a final decision on providing counsel. C. Time lost by a teacher in connection with any incident involving assault by a student shall not be charged against the teacher. D. The Board will reimburse employees for any loss, damage or destruction of clothing or glasses of the employee while fulfilling professional duties and assignments. Vehicle reimbursement will be provided subject to these conditions: 1) the vehicle must have been parked in a designated teacher parking area; 2) the damage must have occurred during regular school hours; 3) a police report must be filed; 4) the damage must be judged by the police to have been vandalism rather than the result of an accident; 5) if the guilty parties are tentatively identified the teacher must assist in the prosecution or discipline of the parties; 6) the maximum reimbursement shall be one hundred dollars ($100). The Board and Association agree that there shall be no duplication of benefits and such reimbursement will be determined after the employees personal insurance coverage benefits, if any, are deducted from the amount of the claim. This will not include theft. The Board reserves the right to fully investigate with the cooperation of the teacher, the circumstances surrounding such a claim for the purpose of determining whether students or other individuals may be held liable for any such damage. E. Except in life threatening or emergency situations no teacher shall be expected to perform medical or hygiene procedures for students such as, but not limited to, suctioning, catherization, toileting, diapering, or attending to any personal hygiene or medical needs of students. The Board will endeavor to provide ongoing medical and hygiene procedures for students utilizing staff other than classroom teachers. If extenuating circumstances arise in specific situations, the administration may meet with the teacher and an LEA representative to discuss problems and how they will be solved. Any solutions must be mutually agreeable before enacted. The section is not intended to limit or alter the responsibility of teachers specialized areas such as physical education and athletics. A. Definitions

  • PROTECTION OF WORK 12.1 Subcontractor shall effectually secure and protect the work done hereunder and assume full responsibility for the condition thereof until final acceptance by the OWNER and Contractor. Subcontractor further agrees to provide such protection as is necessary to protect the work and the workmen of Contractor, the OWNER, and other subcontractors from its operations. 12.2 Subcontractor shall be liable for any loss or damage to any work in place or to any equipment and materials on the job site caused by Subcontractor or its agents, employees or guests.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • Protection of Improvements So far as practicable, Purchaser shall protect Specified Roads and other improvements (such as roads, trails, telephone lines, ditches, and fences): (a) Existing in the operating area, (b) Determined to have a continuing need or use, and

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!