Security of Nintendo Game Disks Sample Clauses

Security of Nintendo Game Disks. You shall keep the licensed -------------------------------- Nintendo games and game disks in a secure location and shall not copy or permit copying thereof.
AutoNDA by SimpleDocs

Related to Security of Nintendo Game Disks

  • License for Use of Software and Other Intellectual Property Unless expressly prohibited by the licensor thereof or any provision of applicable law, if any, the Borrower hereby grants to the Administrative Agent on behalf of the Secured Parties a limited license to use, without charge, the Borrower’s and the Servicer’s computer programs, software, printouts and other computer materials, technical knowledge or processes, data bases, materials, trademarks, registered trademarks, trademark applications, service marks, registered service marks, service xxxx applications, patents, patent applications, trade names, rights of use of any name, labels, fictitious names, inventions, designs, trade secrets, goodwill, registrations, copyrights, copyright applications, permits, licenses, franchises, customer lists, credit files, correspondence, and advertising materials or any property of a similar nature, as it pertains to the Borrower Collateral, or any rights to any of the foregoing, only as reasonably required in connection with the collection of the Transferred Receivables and the advertising for sale, and selling any of the Borrower Collateral, or exercising of any other remedies hereto, and the Borrower agrees that its rights under all licenses and franchise agreements shall inure to the Administrative Agent’s benefit (on behalf of the Secured Parties) for purposes of the license granted herein. Except upon the occurrence and during the continuation of a Termination Event, the Administrative Agent and the Lenders agree not to use any such license without giving the Borrower prior written notice.

  • Licensed Software Section 3.17(f).......................................27

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

  • Protection of Proprietary Rights 8.1 Acknowledgment of Proprietary Materials. Distributor hereby --------------------------------------- acknowledges that all Software, Documentation and technical support and training materials provided to Distributor by Xxxxxx.xxx (collectively, the "Materials") are protected by the copyright laws of the United States and other countries and that the Materials embody valuable confidential and trade secret information of Xxxxxx.xxx, the development of which required the expenditure of considerable time and money by Xxxxxx.xxx.

  • Technology and Intellectual Property (a) Schedule 2.22(a) sets forth a complete and correct list of all (i) registered trademarks, service marks, domain names, copyrights and patents; (ii) applications for registration or grant of any of the foregoing; (iii) unregistered trademarks, service marks, trade names, logos and assumed names; and (iv) licenses for any of the foregoing, in each case, owned by or for the benefit of the Company or a Company Subsidiary, or used in or necessary to conduct the Company’s or a Company Subsidiary’s business as presently conducted. The items on Schedule 2.22(a), together with all other trademarks, service marks, trade names, logos, assumed names, patents, copyrights, trade secrets, computer software, licenses, formulae, customer lists or other databases, business application designs and inventions currently used in or necessary to conduct the businesses of the Company or of a Company Subsidiary, constitute the “Intellectual Property.”

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • USE OF NAMES AND TRADEMARKS 12.1 Nothing contained in this Agreement will be construed as conferring any right to use in advertising, publicity, or other promotional activities any name, trade name, trademark, or other designation of either party hereto by the other (including contraction, abbreviation or simulation of any of the foregoing). Unless required by law, the use by Licensee of the name "The Regents of the University of California" or the name of any campus of the University of California for use in advertising, publicity, or other promotional activities is expressly prohibited.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Protection of Intellectual Property Rights (a) (i) Protect, defend and maintain the validity and enforceability of its Intellectual Property; (ii) promptly advise Bank in writing of material infringements or any other event that could reasonably be expected to materially and adversely affect the value of its Intellectual Property; and (iii) not allow any Intellectual Property material to Borrower’s business to be abandoned, forfeited or dedicated to the public without Bank’s written consent.

  • Enforcement of Proprietary Rights I will assist the Company in every proper way to obtain, and from time to time enforce, United States and foreign Proprietary Rights relating to Company Inventions in any and all countries. To that end I will execute, verify and deliver such documents and perform such other acts (including appearances as a witness) as the Company may reasonably request for use in applying for, obtaining, perfecting, evidencing, sustaining and enforcing such Proprietary Rights and the assignment thereof. In addition, I will execute, verify and deliver assignments of such Proprietary Rights to the Company or its designee. My obligation to assist the Company with respect to Proprietary Rights relating to such Company Inventions in any and all countries shall continue beyond the termination of my employment, but the Company shall compensate me at a reasonable rate after my termination for the time actually spent by me at the Company’s request on such assistance. In the event the Company is unable for any reason, after reasonable effort, to secure my signature on any document needed in connection with the actions specified in the preceding paragraph, I hereby irrevocably designate and appoint the Company and its duly authorized officers and agents as my agent and attorney in fact, which appointment is coupled with an interest, to act for and in my behalf to execute, verify and file any such documents and to do all other lawfully permitted acts to further the purposes of the preceding paragraph with the same legal force and effect as if executed by me. I hereby waive and quitclaim to the Company any and all claims, of any nature whatsoever, which I now or may hereafter have for infringement of any Proprietary Rights assigned hereunder to the Company.

Time is Money Join Law Insider Premium to draft better contracts faster.