Security and Protection of Products Sample Clauses

Security and Protection of Products. Client acknowledges that the Products and Processing Services are the property of JXX and that Client’s use thereof does not create in Client any right, title, or interest therein, except as provided for hereunder. Client will implement reasonable security precautions and take appropriate action so as to enable Client to satisfy its obligations under this Agreement and to prevent the loss, alteration or unauthorized access of Products or Processing Services.
AutoNDA by SimpleDocs
Security and Protection of Products. The Customer acknowledges that all Products and Processing Services are the property of eFunds and that the Customer’s use of them does not create in the Customer any right, title, or interest in them, except as expressly provided in this Agreement The Customer will implement reasonable security precautions to prevent the loss or alteration of, or unauthorized access to, the Products and Processing Services.

Related to Security and Protection of Products

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Preservation and Protection of Collateral (a) The Administrative Agent shall be under no duty or liability with respect to the collection, protection or preservation of the Collateral, or otherwise, beyond the use of reasonable care in the custody and preservation thereof while in its possession.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • PROTECTION OF GOODWILL You acknowledge that the Company is providing you with this Restricted Stock Award in connection with and in consideration for your promises and covenants contained herein. Specifically, in consideration for the Restricted Stock Award, which you acknowledge provides a material incentive for you to grow, develop and protect the goodwill and confidential and proprietary information of the Company, you agree that the Restricted Stock Award (itself and in combination with any other awards made to you) constitutes independent and sufficient consideration for all non-competition, non-solicitation and confidentiality covenants between you and the Company, and agree and acknowledge that you will fully abide by each of such covenants. You further acknowledge that your promise to fully abide by each of the protective covenants referenced above is a material inducement for the Company to provide you with the Restricted Stock Award.

  • OWNERSHIP AND PROTECTION OF INFORMATION; COPYRIGHTS 6.1 All information, ideas, concepts, improvements, discoveries, and inventions, whether patentable or not, which are conceived, made, developed or acquired by Employee, individually or in conjunction with others, during Employee's employment by Employer (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to Employer's business, products or services (including, without limitation, all such information relating to corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks) shall be disclosed to Employer and are and shall be the sole and exclusive property of Employer. Moreover, all drawings, memoranda, notes, records, files, correspondence, drawings, manuals, models, specifications, computer programs, maps and all other writings or materials of any type embodying any of such information, ideas, concepts, improvements, discoveries, and inventions are and shall be the sole and exclusive property of Employer.

  • Authorizations and Protections As agent for Company hereunder, Agent:

  • Protection of Proprietary Rights 8.1 Acknowledgment of Proprietary Materials. Distributor hereby --------------------------------------- acknowledges that all Software, Documentation and technical support and training materials provided to Distributor by Xxxxxx.xxx (collectively, the "Materials") are protected by the copyright laws of the United States and other countries and that the Materials embody valuable confidential and trade secret information of Xxxxxx.xxx, the development of which required the expenditure of considerable time and money by Xxxxxx.xxx.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Protection of Property All records, files, manuals, documents, specifications, lists of customers, forms, materials, supplies, computer programs and other materials furnished to the Executive by the UTi Group, used on its behalf or generated or obtained during the course of the performance of the Executive’s services hereunder, shall at all times remain the property of the Company. Upon termination of Executive’s employment with the UTi Group, or at any other time upon request by the Company or any other member of the UTi Group, Executive shall immediately deliver to the UTi Group, or its authorized representative, all such property, including all copies, remaining in Executive’s possession or control.

  • OWNERSHIP AND PROTECTION OF INTELLECTUAL PROPERTY AND CONFIDENTIAL INFORMATION 4.1 All information, ideas, concepts, improvements, discoveries, works of authorship, and inventions, whether patentable or copyrightable or not, which are conceived, reduced to practice, authored, made, developed or acquired by Employee, individually or in conjunction with others, in the scope of Employee's employment by Employer or any of its affiliates, and/or during the term of Employee’s employment (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to the business, products or services of Employer or its affiliates (including, without limitation, all such information relating to any corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks), and all documents, things, writings and items of any type or in any media embodying any of the foregoing (collectively, “Developments”), and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks, shall be the sole and exclusive property of Employer or its affiliates, as the case may be. Employee hereby assigns to Employer any and all rights Employee might otherwise have in and to any such Developments, and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks.

Time is Money Join Law Insider Premium to draft better contracts faster.