Security of Nintendo Game Disks Sample Clauses

Security of Nintendo Game Disks. You shall keep the licensed -------------------------------- Nintendo games and game disks in a secure location and shall not copy or permit copying thereof.
AutoNDA by SimpleDocs

Related to Security of Nintendo Game Disks

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • ACKNOWLEDGEMENT AND PROTECTION OF INTELLECTUAL PROPERTY RIGHTS 1. Licensee acknowledges that all Intellectual Property Rights in the Licensed Material are the property of the Publisher or duly licensed to the Publisher and that this Licence Agreement does not assign or transfer to the Licensee any right, title or interest therein except for the right to access and use the Licensed Material in accordance with the terms and conditions of this Licence Agreement. 2. For the avoidance of doubt, the Publisher hereby acknowledges that any database rights created by the Licensee or the Institutions as a result of Local Hosting, text mining or data mining of the Licensed Material shall be the property of the Licensee, or the Institution.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Intellectual Property; Software Other than as set forth on Schedule 5.12: (a) There are no Copyrights, Patent Rights and Trademarks (including any assumed or fictitious names used by the Company within the previous two (2) years) owned by or licensed to the Company. (b) There is no Software owned by or licensed to the Company except for mass market Software licensed to the Company that is commercially available and subject to “shrink-wrap” or “click-through” license agreements. (c) The Company is not a party to Contracts which relate to: (i) any Copyrights, Patent Rights or Trademarks; (ii) any Trade Secrets owned by or licensed to the Company; and (iii) any Software, other than market Software licensed to the Company that is commercially available and subject to “shrink-wrap” or “click-through” license agreements. (d) The Company owns the entire right, title and interest in and to, or has the valid and enforceable right to use, the Intellectual Property and Software used in the Business as currently conducted, and to the Knowledge of Seller there is no other Intellectual Property necessary for the Company to conduct the Business as currently conducted. (i) No infringement, misappropriation or violation of any Intellectual Property, or any rights of publicity or privacy relating to the use of names, likenesses, voices, signatures or biographical information, of any other Person has occurred or results in any way from the operation of the Business or the use, sale or distribution of any Intellectual Property owned by or licensed exclusively to the Company; (ii) no claim of any infringement, misappropriation, violation or dilution of any Intellectual Property or any such rights of any other Person has been made or asserted in respect of the operation of the Business; (iii) no claim of invalidity of any Intellectual Property owned by the Company has been made by any other Person; (iv) no Proceedings are pending or, to the Knowledge of Seller, threatened that challenge the validity, ownership or use of any Intellectual Property owned by the Company; (v) the Company has not had notice of, and, to the Knowledge of Seller, there is no basis for, a claim against the Company that the operations, activities, products, Software, equipment or processes of the Business infringe, misappropriate, violate or dilute any Intellectual Property or any such rights of any other Person; and (vi) to the Knowledge of Seller, no Person infringes, misappropriates or violates any Intellectual Property owned or exclusively licensed by or to Seller, in each case except as could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Protection of Proprietary Rights 4.1 Right to Use Licensed Products Licensee acknowledges that no right, title, or interest, other than the right to use the Licensed Products, is transferred or granted by this Agreement. Licensee is prohibited from selling, renting, leasing, making available to third parties, and sublicensing the Licensed Products.

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • USE OF NAMES AND TRADEMARKS 15.1 Nothing contained in this Agreement will be construed as conferring any right to use in advertising, publicity or other promotional activities any name, trademark, trade name, or other designation of either party hereto by the other (including any contraction, abbreviation, or simulation of any of the foregoing). Unless required by law the use, by LICENSEE, of the name "The Regents of the University of California" or the name of any University of California campus in advertising, publicity or other promotional activities is expressly prohibited.

  • Protection of Intellectual Property Rights Borrower and each of its Subsidiaries shall: (a) use commercially reasonable efforts to protect, defend and maintain the validity and enforceability of its Intellectual Property that is material to Borrower’s business; (b) promptly advise Collateral Agent in writing of material infringement by a third party of its Intellectual Property; and (c) not allow any Intellectual Property material to Borrower’s business to be abandoned, forfeited or dedicated to the public without Collateral Agent’s prior written consent.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!