The Rights Information Infrastructure Sample Clauses

The Rights Information Infrastructure. The Rights Information Infrastructure (RII) is at the heart of the ARROW system4. The RII is the backbone and the engine that enables ARROW to query and retrieve information from a multiplicity of data providers, in multiple formats, to make the formats interoperable, to process this information and take decisions on the successive elaboration and finally to exchange information according to a planned workflow. Building on the RII, the ARROW System receives a request for permission to digitise and use a manifestation of a work (for instance a book) from a library and after querying the data providers included in the workflow and elaborating the gathered results, provides information on the work rights status. The initial library request is performed at manifestation level5, whereas the response at the end of the workflow is provided at work level. This means that the initial request passes through stages of identification and matching, work and 4 More details and terms on ARROW RII are provided in D6.1 Rights Information Infrastructure
AutoNDA by SimpleDocs
The Rights Information Infrastructure. The Rights Information Infrastructure (RII) is at the backbone of the ARROW system4 and the engine that enables ARROW to query and retrieve information from a multiplicity of data providers, in multiple formats, to make the formats interoperable, to process this information and take decisions on the successive elaboration and finally to exchange information according to a planned workflow, described in the figure below. Building on the RII, the ARROW System receives a request for permission to digitise and use a manifestation of a work (for instance a book) from a library and after querying the data providers included in the workflow (TEL/VIAF, Books in Print, RRO) and elaborating the gathered results, provides information on the work rights status. To obtain right status information ARROW RII performs three subsequent processes: the TEL process, the BIP process and the RRO process. - the TEL process in which ARROW exchanges and elaborates the information coming from TEL through the messages M2 and M4, - the BIP process in which the data coming from TEL are further elaborated and enriched with the information gathered by the BIP through the message M6, - the RRO process that sends to the RRO the library request enriched by all the data at work and manifestation level collected and processed by the previous data sources through the message M7Q and gather the RRO response in the message M7R. 4 More details and terms on ARROW RII are provided in D6.1 Rights Information Infrastructure Figure 2: ARROW Workflow diagram The initial library request is performed at manifestation level5, whereas the response at the end of the workflow is provided at work level. This means that the initial request passes through stages of identification and matching, work and manifestation clustering and the identification of related works and manifestations; each process adds a piece of relevant information towards the identification of the rights status of the work. At the end of the ARROW workflow, the following pieces of information have been retrieved in the message exchange and stored in the RII repository.: - Manifestation information

Related to The Rights Information Infrastructure

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • CENTURYLINK OSS INFORMATION 57.1 Subject to the provisions of this Agreement and Applicable Law, CLEC shall have a limited, revocable, non-transferable, non-exclusive right to use CenturyLink OSS Information during the term of this Agreement, for CLEC’s internal use for the provision of Telecommunications Services to CLEC End Users in the State.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Business Information All Business Information shall be owned jointly by the Members as their Ownership Interests are determined pursuant to this Agreement. Both before and after the termination of the Company, all Business Information may be used by either Member for any purpose, whether or not competitive with the Business, without consulting with, or obligation to, the other Member. Except as provided in Sections 13.3 and 13.4, or with the prior written consent of the other Member, each Member shall keep confidential and not disclose to any third party or the public any portion of the Business Information that constitutes Confidential Information.

  • Confidential Business Information CARB may have based this penalty in part on confidential business information provided by Xxxxx or confidential settlement communications.

  • Project Information Except for confidential information designated by the City as information not to be shared, Consultant agrees to share Project information with, and to fully cooperate with, those corporations, firms, contractors, public utilities, governmental entities, and persons involved in or associated with the Project. No information, news, or press releases related to the Project, whether made to representatives of newspapers, magazines, or television and radio stations, shall be made without the written authorization of the City’s Project Manager.

  • Access, Information and Confidentiality (i) From the Signing Date until the date on which all of the Preferred Shares have been redeemed in whole, the Company will permit, and shall cause each of the Company’s Subsidiaries to permit, Treasury, the Oversight Officials and their respective agents, consultants, contractors and advisors to (x) examine any books, papers, records, Tax returns (including all schedules attached thereto), data and other information; (y) make copies thereof; and (z) discuss the affairs, finances and accounts of the Company and the Company Subsidiaries with the personnel of the Company and the Company Subsidiaries, all upon reasonable notice; provided, that:

  • CONTRACT INFORMATION 1. The State of Arkansas may not contract with another party:

  • Property Information The Agent shall provide to the Vendor the Property Information Form including the Vendor’s Statement prescribed under the Estate Agents Practice (General Duties and Hong Kong Residential Properties) Regulation duly completed and signed by the Agent.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!