Southwest Information and Materials Sample Clauses

Southwest Information and Materials. All information, materials and technology, including computer software, provided to Row 44 by Southwest in connection with the Service, including modifications, changes and derivatives thereto whether or not created as part of the services provided hereunder (the “Southwest Materials”) are and shall remain the property of Southwest or its licensors, which shall retain all Intellectual Property Rights therein. Row 44 obtains no right, title, or interest therein, except that during the Term Row 44 may use the Southwest Materials for the sole, exclusive and limited purpose of performing the services in connection with the Service in compliance with the terms and conditions of this Agreement. Row 44 shall comply with the terms of any license or other agreement applicable to such Southwest Material. All Southwest Materials shall be subject to the confidentiality provisions of this Agreement. Row 44 shall not encumber the Southwest Materials in any way, and promptly shall return to Southwest any and all Southwest Materials in Row 44’s possession or control upon Southwest’s request and, in any event, upon termination or expiration of this Agreement. For clarity, as between the Parties, Row 44 will own the Intellectual Property Rights in the Row 44 Materials (a) owned by Row 44 prior to the August 13, 2010 or (b) independently created or acquired by Row 44 after August 13, 2010 provided such materials do not constitute a derivative work of or misappropriate or infringe upon any Southwest Materials, Southwest Intellectual Property Rights or Southwest Confidential Information.
AutoNDA by SimpleDocs

Related to Southwest Information and Materials

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.

  • Alert Information As Alerts delivered via SMS, email and push notifications are not encrypted, we will never include your passcode or full account number. You acknowledge and agree that Alerts may not be encrypted and may include your name and some information about your accounts, and anyone with access to your Alerts will be able to view the contents of these messages.

  • Client Information Protected Health Information in any form including without limitation, Electronic Protected Health Information or Unsecured Protected Health Information (herein “PHI”);

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • CONTRACT INFORMATION 1. The State of Arkansas may not contract with another party: a. Upon default, to pay all sums to become due under a contract. b. To pay damages, legal expenses or other costs and expenses of any party. c. To conduct litigation in a place other than Pulaski County, Arkansas d. To agree to any provision of a contract; which violates the laws or constitution of the State of Arkansas. 2. A party wishing to contract with the State of Arkansas should: a. Remove any language from its contract which grants to it any remedies other than: i. The right to possession. ii. The right to accrued payments. iii. The right to expenses of de-installation. iv. The right to expenses of repair to return the equipment to normal working order, normal wear and tear excluded. v. The right to recover only amounts due at the time of repossession and any unamortized nonrecurring cost as allowed by Arkansas Law. b. Include in its contract that the laws of the State of Arkansas govern the contract. c. Acknowledge that contracts become effective when awarded by the State Procurement Official.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Student Information In the course of providing services during the term of the contract, certain personnel of Consultant may have access to student education records that are subject to the Family Educational Rights and Privacy Act (FERPA), 20 U.S.C. 1232g, et seq. and the regulations promulgated there under. Such information confidential and is therefore protected. To the extent that Consultant’s personnel require access to “education records” to perform Services pursuant to this Agreement, such personnel are deemed a “school official,” as each of these terms are defined under FERPA. Consultant agrees that it shall not use education records for any purpose other than in the performance of this contract. Except as required by law, Consultant shall not disclose or share education records with any third party unless permitted by the terms of the contract or to subcontractors who have agreed to maintain the confidentiality of the education records to the same extent required of Consultant under this contract. For the avoidance of doubt, District will be responsible for obtaining any necessary consents from students or parents pursuant to FERPA to provide the information to Consultant. In the event any person(s) seek to access protected education records, whether in accordance with FERPA or other Federal or relevant State law or regulations, the Consultant will immediately inform the District of such request in writing if allowed by law or judicial and/or administrative order. Consultant shall not provide direct access to such data or information or respond to individual requests. Consultant shall only retrieve such data or information upon receipt of, and in accordance with, written directions by the District and shall only provide such data and information to the District. It shall be District’s sole responsibility to respond to requests for data or information received by Vendor regarding District data or information. Should Consultant receive a court order or lawfully issued subpoena seeking the release of such data or information, Consultant shall provide immediate notification to the District of its receipt of such court order or lawfully issued subpoena and shall immediately provide the District with a copy of such court order or lawfully issued subpoena prior to releasing the requested data or information, if allowed by law or judicial and/or administrative order. If Consultant experiences a security breach concerning any education record covered by this contract, then Consultant will immediately notify the District and take immediate steps to limit and mitigate such security breach to the extent possible. The parties agree that any breach of the confidentiality obligation set forth in the contract may, at District’s discretion, result in cancellation of further consideration for contract award and the eligibility for Consultant to receive any information from District for a period of not less than five (5) years. In addition, Consultant agrees to indemnify and hold the District harmless for any loss, cost, damage or expense suffered by the District, including but not limited to the cost of notification of affected persons, as a direct result of the unauthorized disclosure of education records. Upon termination of Agreement, Consultant shall return and/or destroy all data or information received from the District upon, and in accordance with, direction from the District. Consultant shall not retain copies of any data or information received from the District once the District has directed Consultant as to how such information shall be returned to the District and/or destroyed. Furthermore, Consultant shall ensure that they dispose of any and all data or information received from the District in a District-approved manner that maintains the confidentiality of the contents of such records (e.g. shredding paper records, erasing and reformatting hard drives, erasing and/or physically destroying any portable electronic devices).

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!