Registered User Laws Sample Clauses

Registered User Laws. As to those countries which require applications to register the Licensee as a registered user of a Trademark or Trademarks used on or in connection with the Licensed Products or which require the recordation of this Agreement, the Licensee agrees to execute and deliver to VDI such documents as may be necessary and as are furnished by VDI for such purposes.
AutoNDA by SimpleDocs
Registered User Laws. As to those countries which require applications to register the Licensee as a registered user of a Trademark or Trademarks used on or in connection with the Licensed Products or which require the recordation of this Agreement, the Licensee agrees to execute and deliver to UM such documents as may be necessary and as are furnished by UM for such purposes.
Registered User Laws. As to those countries which require applications to register the Licensee as a registered user of a Trademark or Trademarks or other element of the Intellectual Property used on or in connection with the Licensed Products or which require the recordation of this Agreement, the Licensee agrees to execute and deliver to Titan such documents as may be necessary and as are furnished by Titan for such purposes.
Registered User Laws. As to those countries requiring applications to register Avmark as a registered user of the Mark used on or in connection with the Licensed Products, or xxxxiring the recordation of this Agreement, Avmark agrees to execute and deliver to the proper authorities all necessary documents for those purposes and to furnish uniView with a copy of all such documents so filed.
Registered User Laws. As to those countries which require applications to register the Sublicensee as a registered user of a Trademark or Trademarks used on or in connection with the Licensed Products or which require the recordation of this Agreement, the Sublicensee agrees to execute and deliver to UFS such documents as may be necessary and as are furnished by UFS for such purposes.
Registered User Laws. As to those countries requiring applications to register Avmark as a registered user of the Maxx xsed on or in connection with the Licensed Products, or requiring the recordation of this Agreement, Avmark agrees to execute and deliver to the proper authorities all necessary documents for those purposes and to furnish uniView with a copy of all such documents so filed.

Related to Registered User Laws

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Privacy Laws The Dealer Manager and Dealer (each referred to individually in this section as “party”) agree as follows:

  • EXPORT OF THE SOFTWARE IS PROHIBITED BY UNITED STATES LAW THE FUND MAY NOT UNDER ANY CIRCUMSTANCES RESELL, DIVERT, TRANSFER, TRANSSHIP OR OTHERWISE DISPOSE OF THE SOFTWARE (IN ANY FORM) IN OR TO ANY OTHER COUNTRY. IF CUSTODIAN DELIVERED THE SOFTWARE TO THE FUND OUTSIDE OF THE UNITED STATES, THE SOFTWARE WAS EXPORTED FROM THE UNITED STATES IN ACCORDANCE WITH THE EXPORTER ADMINISTRATION REGULATIONS. DIVERSION CONTRARY TO U.S. LAW IS PROHIBITED. The Fund hereby authorizes Custodian to report its name and address to government agencies to which Custodian is required to provide such information by law.

  • Compliance with International Trade & Anti-Corruption Laws (a) Neither the Group Companies nor, to the Company’s knowledge, any of their Representatives, or any other Persons acting for or on behalf of any of the foregoing, is or has been, since the incorporation of the Company, (i) a Person named on any Sanctions and Export Control Laws-related list of designated Persons maintained by a Governmental Entity; (ii) located, organized or resident in a country or territory which is itself the subject of or target of any Sanctions and Export Control Laws; (iii) an entity owned, directly or indirectly, by one or more Persons described in clause (i) or (ii); or (iv) otherwise engaging in dealings with or for the benefit of any Person described in clauses (i) - (iii) or any country or territory which is or has, since the incorporation of the Company, been the subject of or target of any Sanctions and Export Control Laws (at the time of this Agreement, the Crimea region of Ukraine, Cuba, Iran, North Korea, Venezuela, Sudan and Syria).

  • Compliance with Data Privacy Laws The Company and its Subsidiaries are, and at all prior times were, in compliance with all applicable state and federal data privacy and security laws and regulations, including without limitation HIPAA, and the Company and its Subsidiaries have taken commercially reasonable actions to prepare to comply with, and since May 25, 2018, have been and currently are in compliance with, the GDPR (EU 2016/679) (collectively, the “Privacy Laws”) except in each case, where such would not, either individually or in the aggregate, reasonably be expected to result in a Material Adverse Effect. To ensure compliance with the Privacy Laws, the Company and its Subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its Subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any Subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Privacy Laws, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Privacy Law; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability under any Privacy Law.

  • Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.

  • OFAC; Sanctions; Anti-Corruption Laws; Anti-Money Laundering Laws No Loan Party or any of its Subsidiaries is in violation of any Sanctions. No Loan Party nor any of its Subsidiaries nor, to the knowledge of such Loan Party, any director, officer, employee, agent or Affiliate of such Loan Party or such Subsidiary (a) is a Sanctioned Person or a Sanctioned Entity, (b) has any assets located in Sanctioned Entities, or (c) derives revenues from investments in, or transactions with Sanctioned Persons or Sanctioned Entities. Each of the Loan Parties and its Subsidiaries has implemented and maintains in effect policies and procedures designed to ensure compliance with all Sanctions, Anti-Corruption Laws and Anti-Money Laundering Laws. Each of the Loan Parties and its Subsidiaries, and to the knowledge of each such Loan Party, each director, officer, employee, agent and Affiliate of each such Loan Party and each such Subsidiary, is in compliance with all Sanctions, Anti-Corruption Laws and Anti-Money Laundering Laws. No proceeds of any Loan made or Letter of Credit issued hereunder will be used to fund any operations in, finance any investments or activities in, or make any payments to, a Sanctioned Person or a Sanctioned Entity, or otherwise used in any manner that would result in a violation of any Sanction, Anti-Corruption Law or Anti-Money Laundering Law by any Person (including any Lender, Bank Product Provider, or other individual or entity participating in any transaction).

  • Other Laws The Company retains the right to refuse to issue or transfer any Stock if it determines that the issuance or transfer of such shares might violate any applicable law or regulation or entitle the Company to recover under Section 16(b) of the Securities Exchange Act of 1934.

  • Export Laws Licensee shall adhere to all US Export Administration Law and shall not export or re-export any technical data or products received by or on behalf of NCIT, or the direct products of such technical data, to any proscribed country listed in the then-current US Export Administration Law unless properly authorized by both NCIT and the US Government.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Time is Money Join Law Insider Premium to draft better contracts faster.