RIGHT TO REPUBLISH CERTAIN ACQUIRED VULNERABILITY INFORMATION Sample Clauses

RIGHT TO REPUBLISH CERTAIN ACQUIRED VULNERABILITY INFORMATION. Following the public disclosure of the Acquired Vulnerability Information by Trend Micro and/or the affected vendor, the Researcher who submitted such Acquired Vulnerability Information may reproduce and republish the public disclosure on his/her/its own web site or a third party’s web site; provided that, such Researcher may only reproduce such disclosure but may not add to, delete from or otherwise modify the public disclosure in any manner whatsoever, unless otherwise agreed by Trend Micro in writing. Nothing herein shall limit Trend Micro’s ownership rights in the Acquired Vulnerability Information.
AutoNDA by SimpleDocs

Related to RIGHT TO REPUBLISH CERTAIN ACQUIRED VULNERABILITY INFORMATION

  • Restricting on disclosure and use of the Confidential Information 5.1 The Receiving Party undertakes not to use the Confidential Information for any purpose other than:

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • PRESERVATION OF CONTRACTING INFORMATION 2.27.1 The requirements of Subchapter J, Chapter 552, Texas Government Code, may apply to this Agreement and the Contractor agrees that this Agreement can be terminated if the Contractor knowingly or intentionally fails to comply with a requirement of that subchapter. If the requirements of Subchapter J, Chapter 552, Texas Government Code, apply to this Agreement, then for the duration of this Agreement (including the initial term, any renewal terms, and any extensions), Contractor shall preserve all Contracting Information, as defined by Section 552.003 of the Texas Government Code, related to this Agreement as provided by the records retention requirements applicable to the City pursuant to federal or state law or regulation, city ordinance or city policy, which record retention requirements include but are not limited to those set forth in Chapters 201 and 205 of the Texas Local Government Code and Texas Administrative Code Title 13, Chapter 7. Within five business days after receiving a request from the Director, Contractor shall provide any Contracting Information related to this Agreement that is in the custody or possession of Contractor. Upon the expiration or termination of this Agreement, Contractor shall, at the Director’s election, either (a) provide, at no cost to the City, all Contracting Information related to this Agreement that is in the custody or possession of Contractor, or (b) preserve the Contracting Information related to this Agreement as provided by the records retention requirements applicable to the City pursuant to federal or state law or regulation, city ordinance or City policy.

  • Access to Information; Confidentiality (a) Upon reasonable advance written notice, subject to applicable logistical restrictions or limitations as a result of COVID-19 or any COVID-19 Measures and solely for purposes of furthering the Merger Transactions, the Company shall, and shall cause each of its Subsidiaries to, afford to Parent, Merger Sub and their respective representatives reasonable access during normal business hours during the period from the date of this Agreement until the earlier of the Effective Time or the valid termination of this Agreement pursuant to Article VII, to all their respective properties, assets, books, contracts, commitments, personnel and records and, during such period, the Company shall, and shall cause each of its Subsidiaries to, furnish promptly to Parent: (i) a copy of each report, schedule, registration statement and other document filed or received by it during such period pursuant to the requirements of federal or state securities Laws and (ii) all other information concerning its business, properties and personnel as Parent or Merger Sub may reasonably request (including Tax Returns filed and those in preparation and the workpapers of its auditors). Nothing herein (including, for the avoidance of doubt, this Section 5.2(a) and Section 5.2(b)) shall require the Company or any of its Subsidiaries to provide such access or information to the extent that such action (A) would reasonably be expected to result in a waiver of attorney-client privilege, work product doctrine or similar privilege, (B) specifically relates to the evaluation, deliberation or minutes of the Company Board (or any committee or subcommittee thereof) related to the Merger Transactions, the strategic and financial alternatives process leading thereto, or any information or materials provided to the Company Board (or any committee or subcommittee thereof) in connection therewith or (C) would reasonably be expected to violate any applicable Law or any confidentiality obligation owing to a third party so long as the Company shall promptly notify Parent of any such confidentiality obligations or access restrictions and use commercially reasonable efforts to obtain the consent of such third party to provide such information and otherwise provide such access to Parent, if requested and (b) generally describe the type of information that cannot be disclosed to Parent (to the extent not prohibited by law or the underlying document). No investigation pursuant to this Section 5.2 shall affect any representation or warranty in this Agreement of any party hereto or any condition to the obligations of the parties hereto. All requests for access pursuant to this Section 5.2 must be directed to the Chief Financial Officer of the Company or another person designated in writing by the Company. Notwithstanding anything herein to the contrary, Parent and Merger Sub shall not, and shall cause their respective representatives not to, contact any partner, licensor, licensee, customer or supplier of the Company in connection with the Offer, the Merger or any of the other Merger Transactions without the Company’s prior written consent (such consent not to be unreasonably withheld, conditioned or delayed), and Parent and Merger Sub acknowledge and agree that any such contact shall be arranged by and with a representative of the Company participating.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!