Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.
Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.
Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND
Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.
Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.
CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.
Patent/Copyright Materials/Proprietary Infringement Unless otherwise expressly provided in this Contract, Contractor shall be solely responsible for clearing the right to use any patented or copyrighted materials in the performance of this Contract. Contractor warrants that any software as modified through services provided hereunder will not infringe upon or violate any patent, proprietary right or trade secret right of any third party. Contractor agrees that, in accordance with the more specific requirement contained in paragraph 18 below, it shall indemnify, defend and hold County and County Indemnitees harmless from any and all such claims and be responsible for payment of all costs, damages, penalties and expenses related to or arising from such claim(s), including, but not limited to, attorney’s fees, costs and expenses.
Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.
Know-How The term “