Security of Technology Sample Clauses

Security of Technology. (a) Proprietary Manufacturing Technology, Licensed Primary Trade Secrets and Confidential Manufacture Information. Without limiting the generality of Section 5.1, a Licensee shall, during the term of this Agreement and thereafter in perpetuity (subject to Section 5.3): (i) limit the use of or access to the Proprietary Manufacturing Technology and Licensed Primary Trade Secrets to their employees who have a need to use or access such Proprietary Manufacturing Technology and Licensed Primary Trade Secret for the purposes of exercising the Licensees’ rights hereunder and to their authorized third party manufacturers or distributers if allowed under the license); (ii) provide appropriate training with respect to the protection of the confidentiality of the Proprietary Manufacturing Technology and Licensed Primary Trade Secret prior to allowing such use or access; (iii) limit such employees’ or third parties’ access to only the part(s) of such Proprietary Manufacturing Technology and Licensed Primary Trade Secret) that are necessary for such use or access, solely during the period such use or access is necessary for the purposes of exercising the Licensees’ rights hereunder; (iv) not otherwise disclose the Proprietary Manufacturing Technology and Licensed Primary Trade Secret or any part thereof to any third party; and (v) comply at the Licensee’s expense with any Security Policy related to a Licensed Primary Trade Secret as of the date of Distribution or as of the effective time of Exit under Section 2.11 of the TCMA.
AutoNDA by SimpleDocs
Security of Technology 

Related to Security of Technology

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Protection of Intellectual Property Rights Borrower and each of its Subsidiaries shall: (a) use commercially reasonable efforts to protect, defend and maintain the validity and enforceability of its Intellectual Property that is material to Borrower’s business; (b) promptly advise Collateral Agent in writing of material infringement by a third party of its Intellectual Property; and (c) not allow any Intellectual Property material to Borrower’s business to be abandoned, forfeited or dedicated to the public without Collateral Agent’s prior written consent.

  • Intellectual Property; Software Other than as set forth on Schedule 5.12: (a) There are no Copyrights, Patent Rights and Trademarks (including any assumed or fictitious names used by the Company within the previous two (2) years) owned by or licensed to the Company. (b) There is no Software owned by or licensed to the Company except for mass market Software licensed to the Company that is commercially available and subject to “shrink-wrap” or “click-through” license agreements. (c) The Company is not a party to Contracts which relate to: (i) any Copyrights, Patent Rights or Trademarks; (ii) any Trade Secrets owned by or licensed to the Company; and (iii) any Software, other than market Software licensed to the Company that is commercially available and subject to “shrink-wrap” or “click-through” license agreements. (d) The Company owns the entire right, title and interest in and to, or has the valid and enforceable right to use, the Intellectual Property and Software used in the Business as currently conducted, and to the Knowledge of Seller there is no other Intellectual Property necessary for the Company to conduct the Business as currently conducted. (i) No infringement, misappropriation or violation of any Intellectual Property, or any rights of publicity or privacy relating to the use of names, likenesses, voices, signatures or biographical information, of any other Person has occurred or results in any way from the operation of the Business or the use, sale or distribution of any Intellectual Property owned by or licensed exclusively to the Company; (ii) no claim of any infringement, misappropriation, violation or dilution of any Intellectual Property or any such rights of any other Person has been made or asserted in respect of the operation of the Business; (iii) no claim of invalidity of any Intellectual Property owned by the Company has been made by any other Person; (iv) no Proceedings are pending or, to the Knowledge of Seller, threatened that challenge the validity, ownership or use of any Intellectual Property owned by the Company; (v) the Company has not had notice of, and, to the Knowledge of Seller, there is no basis for, a claim against the Company that the operations, activities, products, Software, equipment or processes of the Business infringe, misappropriate, violate or dilute any Intellectual Property or any such rights of any other Person; and (vi) to the Knowledge of Seller, no Person infringes, misappropriates or violates any Intellectual Property owned or exclusively licensed by or to Seller, in each case except as could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Patents and Intellectual Property Rights Recipients are subject to the Xxxx-Xxxx Act, 35 U.S.C. § 200 et seq, unless otherwise provided by law. Recipients are subject to the specific requirements governing the development, reporting, and disposition of rights to inventions and patents resulting from federal financial assistance awards located at 37 C.F.R. Part 401 and the standard patent rights clause located at 37 C.F.R. § 401.14.

  • Protection of Intellectual Property Subject to and except as permitted by the Credit Agreement, such Grantor shall use commercially reasonable efforts not to do any act or omit to do any act whereby any of the Intellectual Property that is material to the business of Grantor may lapse, expire, or become abandoned, or unenforceable, except as would not reasonably be expected to have a Material Adverse Effect.

  • Assignment of Intellectual Property Rights (a) Executive hereby assigns to Nucor Corporation Executive’s entire right, title and interest, including copyrights and patents, in any idea, invention, design of a useful article (whether the design is ornamental or otherwise), work product and any other work of authorship (collectively the “Developments”), made or conceived solely or jointly by Executive at any time during Executive’s employment by Nucor (whether prior or subsequent to the execution of this Agreement), or created wholly or in part by Executive, whether or not such Developments are patentable, copyrightable or susceptible to other forms of protection, where the Developments: (i) were developed, invented, or conceived within the scope of Executive’s employment with Nucor; (ii) relate to Nucor’s actual or demonstrably anticipated research or development; or (iii) result from any work performed by Executive on Nucor’s behalf. Executive shall disclose any Developments to Nucor’s management within 30 days following Executive’s development, making or conception thereof. (b) The assignment requirement in Section 15(a) shall not apply to an invention that Executive developed entirely on Executive’s own time without using Nucor’s equipment, supplies, facilities or Secret Information or Confidential Information except for those inventions that (i) relate to Nucor’s business or actual or demonstrably anticipated research or development, or (ii) result from any work performed by Executive for Nucor. (c) Executive will, within 3 business days following Nucor’s request, execute a specific assignment of title to any Developments to Nucor Corporation or its designee, and do anything else reasonably necessary to enable Nucor Corporation or its designee to secure a patent, copyright, or other form of protection for any Developments in the United States and in any other applicable country. (d) Nothing in this Section 15 is intended to waive, or shall be construed as waiving, any assignment of any Developments to Nucor implied by law.

  • Intellectual Property The Company and the Subsidiaries have, or have rights to use, all patents, patent applications, trademarks, trademark applications, service marks, trade names, trade secrets, inventions, copyrights, licenses and other intellectual property rights and similar rights necessary or required for use in connection with their respective businesses as described in the SEC Reports and which the failure to so have could have a Material Adverse Effect (collectively, the “Intellectual Property Rights”). None of, and neither the Company nor any Subsidiary has received a notice (written or otherwise) that any of, the Intellectual Property Rights has expired, terminated or been abandoned, or is expected to expire or terminate or be abandoned, within two (2) years from the date of this Agreement. Neither the Company nor any Subsidiary has received, since the date of the latest audited financial statements included within the SEC Reports, a written notice of a claim or otherwise has any knowledge that the Intellectual Property Rights violate or infringe upon the rights of any Person, except as could not have or reasonably be expected to not have a Material Adverse Effect. To the knowledge of the Company, all such Intellectual Property Rights are enforceable and there is no existing infringement by another Person of any of the Intellectual Property Rights. The Company and its Subsidiaries have taken reasonable security measures to protect the secrecy, confidentiality and value of all of their intellectual properties, except where failure to do so could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • ACKNOWLEDGEMENT AND PROTECTION OF INTELLECTUAL PROPERTY RIGHTS 1. Licensee acknowledges that all Intellectual Property Rights in the Licensed Material are the property of the Publisher or duly licensed to the Publisher and that this Licence Agreement does not assign or transfer to the Licensee any right, title or interest therein except for the right to access and use the Licensed Material in accordance with the terms and conditions of this Licence Agreement. 2. For the avoidance of doubt, the Publisher hereby acknowledges that any database rights created by the Licensee or the Institutions as a result of Local Hosting, text mining or data mining of the Licensed Material shall be the property of the Licensee, or the Institution.

  • INTELLECTUAL PROPERTY RIGHTS AND INDEMNITY 42.1 Save as granted under this Framework Agreement, neither the Authority nor the Supplier shall acquire any right, title or interest in the other's Pre-Existing Intellectual Property Rights. 42.2 The Supplier shall ensure and procure that the availability, provision and use of the Services and the performance of the Supplier's responsibilities and obligations hereunder shall not infringe any Intellectual Property Rights of any Third party. 42.3 With respect to the Supplier's obligations under this Framework Agreement, the Supplier warrants and represents that: 42.3.1 it owns, has obtained or shall obtain valid licences for all Intellectual Property Rights that are necessary to perform its obligations under this Framework Agreement and/or any Call-Off Contract which may be entered with the Authority or Other Contracting Bodies and shall maintain the same in full force and effect; 42.3.2 it has and shall continue to take all steps, in accordance with Good Industry Practice, to prevent the introduction, creation or propagation of any disruptive elements (including any virus, worms and/or Trojans, spyware or other malware) into systems, data, software or Authority Confidential Information (held in electronic form (owned by or under the control of, or used by the Authority and/or Other Contracting Bodies; 42.4 The Supplier shall during and after the Term of this Framework Agreement indemnify and keep indemnified the Authority on demand from and against all claims, proceedings, suits, demands, actions, costs, expenses (including legal costs and disbursements on a solicitor and client basis), losses and damages and any other liabilities whatsoever arising from, out of, in respect of or incurred by reason of any infringement or alleged infringement (including the defence of such alleged infringement) of any Intellectual Property Right by the: 42.4.1 availability, provision or use of the Services (or any parts thereof); and 42.4.2 performance of the Supplier's responsibilities and obligations hereunder. 42.5 The Supplier shall promptly notify the Authority if any claim or demand is made or action brought against the Supplier for infringement or alleged infringement of any Intellectual Property Right that may affect the availability, provision or use of the Services (or any deliverables or parts thereof) and/or the performance of the Supplier's responsibilities and obligations hereunder. 42.6 If a claim or demand is made or action brought to which Clauses 42.3 and/or 42.4 may apply, or in the reasonable opinion of the Supplier is likely to be made or brought, the Supplier may (subject to Approval) at its own expense and within a reasonable time either: 42.6.1 modify any or all of the affected Services without reducing the performance and functionality of the same, or substitute alternative services of equivalent performance and functionality for any or all of the affected Services, so as to avoid the infringement or the alleged infringement, provided that the terms herein shall apply mutatis mutandis to such modified or substituted services and such substitution shall not increase the burden on Contracting Bodies to a Call-Off Contract; or 42.6.2 procure a licence to use the Services on terms that are reasonably acceptable to the Authority and in relation to the performance of the Supplier’s responsibilities and obligations hereunder, promptly re-perform those responsibilities and obligations; and 42.7 Subject to full compliance with the Branding Guidance, the Supplier shall be entitled to use the Authority’s logo exclusively in connection with the provision of the Services during the Term and for no other purpose.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!