Technology Security Sample Clauses

Technology Security. The Company shall cause SB Oils to appoint a technology officer (recommended by Solazyme, Inc.) at SB Oils who shall, in consultation with Solazyme, Inc. and Bunge Brazil (subject to the consent of Bunge Brazil and Solazyme, Inc.), determine, establish, implement and audit appropriate security procedures regarding Technology used or developed by the JV Companies, including (i) rules regarding visitation to SB Oils’ facilities, (ii) confidentiality documentation requirements and (iii) Technology access procedures and policies, including regarding the transfer of Microbes used or developed by or on behalf of the JV Companies.
AutoNDA by SimpleDocs
Technology Security. The District will comply fully with all County information technology security policies, which are detailed in Countywide Policies 1400-1, 1400-2, 1400-3, 1400-4, 1400-5, 1400-6, 1400-7, and 1400-8, and any other information technology policies that may be adopted during the term of this Agreement. If County policies conflict with District policies, the Parties shall meet and confer pursuant to section 23, and if the conflict cannot be resolved, then either Party may terminate the Agreement in accordance with section 8. The District shall hold the County harmless from any loss or damage resulting from the violation of such security procedures or policies by the District, its officers, agents, employees, and subcontractors.
Technology Security a. You are responsible for the security of your password, and should take all reasonable precautions to prevent others from being able to use your password. Under no circumstances should you give your password to another person. b. You will immediately notify a teacher or the system administrator if you have identified a possible security problem. Do not look for security problems; this may be construed as an illegal attempt to gain access. c. You will avoid the inadvertent spread of computer viruses and spyware caused by downloading files. d. Personal software may not be installed or used at the school site.
Technology Security. MinnState shall be solely responsible for all MinnState Systems, and CONTRACTOR shall be responsible for all non-MinnState Systems, including taking the necessary security and privacy protections as are reasonable under the circumstances. Reasonable security and privacy protections shall include, but not be limited to, network firewall protection, anti-virus software and the ability to maintain regular patching levels of software. Each party shall use commercially reasonable procedures to check for commonly known viruses and to check the integrity of data before sending information electronically to the other party, but each party recognizes that such procedures cannot be a guarantee that transmissions will be virus free. Each party agrees that the receiving party shall be responsible for carrying out virus checks on any attachments before opening any electronic files whether received on disk or otherwise.

Related to Technology Security

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Technology License 4.1 Unless any event described in Article 2.2 or 2.3 of this Agreement occurs, all of the technology required to be licensed for any of Party B’s business shall be provided by Party A on an exclusive basis. Party A will try its best to license Party B to use the technology owned by Party A, or re-license Party B to use the technology as approved by the owner. 4.2 The Parties shall negotiate with each other to enter into specific technology license contracts to expressly specify the detail matters such as the technology to be licensed, the method to license the technology, license fees and payment.

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Registered Intellectual Property (i) Schedule 6.01(w)(2) of the Disclosure Schedule lists all of the Registered Intellectual Property owned by the Obligors, identifies which entity owns such Registered Intellectual Property, and lists the current status of any inter partes proceedings or actions pending as of the date hereof before any court, tribunal or agency (including the United States Patent and Trademark Office (“PTO”) or equivalent authority anywhere in the world) relating to any Registered Intellectual Property. Except as set forth on Schedule 6.01(w)(2), each item of Registered Intellectual Property is subsisting, and all necessary registration, maintenance, renewal fees, annuity fees and taxes in connection with such Registered Intellectual Property have been paid if due and all filings necessary as of the date of this Agreement have been submitted for the purposes of maintaining such Registered Intellectual Property.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Safety; Security Contractor’s failure to comply with any of the requirements in this Section shall be cause for termination.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Licensed Intellectual Property Section 3.17(h)(vi)...................................29

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!