Target Background Sample Clauses

Target Background. Folate receptor α (FRα) is a glycosylphosphatidylinositol-anchored cell surface protein encoded by the folate receptor 1 (FOLR1) gene. FRα internalizes folate, which is an essential co-factor for one-carbon transfer reactions that are required for DNA and RNA synthesis, cell growth and proliferation. Marked upregulation of FRα occurs during neonatal development and in cancer, suggesting that the receptor functions primarily under conditions of high folate demand. In contrast, normal adult tissues generally lack FRα expression and employ alternative transporters such as folate receptor β, reduced folate carrier and proton-coupled folate transporter for folate uptake (Xxxxxxx 1992, Xxxxxxxxx 1994, Elnakat 2004, Xxxxxxx 2006, Investigator Brochure). Published studies have demonstrated FRα overexpression by immunohistochemistry (IHC) in various epithelial tumors, particularly serous and endometrioid ovarian cancers and serous and endometrioid endometrial cancers (Scorer 2010, Xxxxx-Xxxxx 1993, Xxxxx 2008, Xxxxx 2012, Xxxxxx 2007, Xxxxx 2008, Ab 2015, and Xxxxxx 2007). IHC results obtained from patients screened or enrolled in the Phase 1 Study IMGN853-0401 and Phase 3 Study IMGN853-403 are generally consistent with the literature (Investigator Brochure). While assessing the FRα distribution in the PROC (platinum-resistant ovarian cancer) expansion cohort, approximately 40% of patients had high expression. Several additional studies have further validated FRα as a target in serous epithelial ovarian cancer (EOC). First, quantitative polymerase chain reaction studies show ubiquitous FRα mRNA expression in serous EOC (Xxxxxx 2012, Xxxxxxx 1998, Xxxxx 2001) and high levels of FRα mRNA correlate with poor response to chemotherapy and decreased disease free survival (Xxxx 2012). Second, both Xxxxx et al and Xxxxx et al have demonstrated that recurrent tumors retain FRα expression comparably to primary tumors as shown by serial biopsy sampling and IHC (Xxxxx 2008, Xxxxx 2012). Third, studies with FRα-specific imaging agents have demonstrated real-time FRα expression at primary and metastatic tumor sites (Xxxxxx 2008, Xxxxxx 2013, Xxxxx-Xxxxx 1993, and van Dam 2011). Finally, a truncated form of FRα has been detected in ascites and blood of EOC patients (Basal 2009, Xxxxxxxxx 1994), further confirming expression in this disease and suggesting that the receptor may serve as a circulating biomarker. Collectively, these data suggest that FRα is a promising target in soli...
AutoNDA by SimpleDocs

Related to Target Background

  • Background Purchaser wishes to purchase a Revenue Sharing Note issued by the Company through xxx.Xxxxxxxx.xxx (the “Site”).

  • Intellectual Property The Company and the Subsidiaries have, or have rights to use, all patents, patent applications, trademarks, trademark applications, service marks, trade names, trade secrets, inventions, copyrights, licenses and other intellectual property rights and similar rights necessary or required for use in connection with their respective businesses as described in the SEC Reports and which the failure to so have could have a Material Adverse Effect (collectively, the “Intellectual Property Rights”). None of, and neither the Company nor any Subsidiary has received a notice (written or otherwise) that any of, the Intellectual Property Rights has expired, terminated or been abandoned, or is expected to expire or terminate or be abandoned, within two (2) years from the date of this Agreement. Neither the Company nor any Subsidiary has received, since the date of the latest audited financial statements included within the SEC Reports, a written notice of a claim or otherwise has any knowledge that the Intellectual Property Rights violate or infringe upon the rights of any Person, except as could not have or reasonably be expected to not have a Material Adverse Effect. To the knowledge of the Company, all such Intellectual Property Rights are enforceable and there is no existing infringement by another Person of any of the Intellectual Property Rights. The Company and its Subsidiaries have taken reasonable security measures to protect the secrecy, confidentiality and value of all of their intellectual properties, except where failure to do so could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Confidential Information Each party agrees that all code, inventions, know-how, business, technical and financial information it obtains (“Receiving Party”) from the disclosing party (“Disclosing Party”) constitutes the confidential information of the Disclosing Party (“Confidential Information”), provided that it is identified as confidential at the time of disclosure or should be reasonably known by the Receiving Party to be Confidential Information due to the nature of the information disclosed and the circumstances surrounding the disclosure. The Services and any updates, upgrades, modifications, derivatives, specifications, technical guides, other software, or other documentation provided by Xxxxxx (or its agents) shall be deemed Confidential Information of Xxxxxx without any marking or future designation. Except as expressly authorized herein, the Receiving Party will hold in confidence and not use or disclose any Confidential Information. The Receiving Party’s nondisclosure obligation shall not apply to information which the Receiving Party can document: (i) was rightfully in its possession or known to it prior to receipt of the Confidential Information; (ii) is or has become public knowledge through no fault of the Receiving Party; (iii) is rightfully obtained by the Receiving Party from a third party without breach of any confidentiality obligation; (iv) is independently developed by employees of the Receiving Party who had no access to such information; or (v) is required to be disclosed pursuant to the regulation, law, or court order (but only to the minimum extent required to comply with such regulation or order and with advance notice to the Disclosing Party). The Receiving Party acknowledges that disclosure of Confidential Information would cause substantial harm for which damages alone may not be a sufficient remedy, and therefore that upon any such disclosure by the Receiving Party the Disclosing Party shall be entitled to seek appropriate equitable relief in addition to whatever other remedies it might have at law. Upon termination or expiration of this Agreement, if Xxxxxx is in possession of any Customer Materials, Xxxxxx shall delete, return, or make available to Customer all Customer Materials then in its possession. Upon request by Customer within thirty (30) days after any expiration or termination of the applicable Order Form, Xxxxxx will either make Customer Materials available to Customer through the Services on a limited basis solely for the purposes of data retrieval or will reasonably assist Customer with such retrieval. After such thirty (30) day period, Xxxxxx will have no obligation to maintain or provide any Customer Materials and, unless legally prohibited, may delete all Customer Materials. Customer acknowledges that certain Xxxxxx Services do not store or maintain Customer Materials.

  • Representations and Warranties Borrower represents and warrants as follows:

  • GRIEVANCE PROCEDURE 7.01 For purposes of this Agreement, a grievance is defined as a difference arising between the parties relating to the interpretation, application, administration or alleged violation of the Agreement including any question as to whether a matter is arbitrable.

  • Effective Date The obligations of the Lenders to make Loans and of the Issuing Bank to issue Letters of Credit hereunder shall not become effective until the date on which each of the following conditions is satisfied (or waived in accordance with Section 9.02):

  • Audits No more than once a year, or following unauthorized access, upon receipt of a written request from the LEA with at least ten (10) business days’ notice and upon the execution of an appropriate confidentiality agreement, the Provider will allow the LEA to audit the security and privacy measures that are in place to ensure protection of Student Data or any portion thereof as it pertains to the delivery of services to the LEA . The Provider will cooperate reasonably with the LEA and any local, state, or federal agency with oversight authority or jurisdiction in connection with any audit or investigation of the Provider and/or delivery of Services to students and/or LEA, and shall provide reasonable access to the Provider’s facilities, staff, agents and XXX’s Student Data and all records pertaining to the Provider, LEA and delivery of Services to the LEA. Failure to reasonably cooperate shall be deemed a material breach of the DPA.

  • Services FASC agrees to provide to the Adviser the services indicated in Exhibit A to this Agreement (the “Services”).

  • Indemnification In the event any Registrable Securities are included in a Registration Statement under this Agreement:

  • No Third Party Beneficiaries This Agreement is intended for the benefit of the parties hereto and their respective permitted successors and assigns, and is not for the benefit of, nor may any provision hereof be enforced by, any other person.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!