Transfer of Domain Names and Social Media Accounts Sample Clauses

Transfer of Domain Names and Social Media Accounts. Without limiting Section 4(l), Multi-Cinema shall, reasonably promptly, but within forty-five (45) days following the Closing Date, take all further actions required for transferring to Muvico registration and control over the Internet domain names and social media accounts included in the Transferred Assets and as set forth on Schedule II, including by carrying out any applicable transfer procedures and executing any additional documents required by any applicable Internet domain name registrars or social media platform providers, and by delivering to Muvico any authorization codes and passwords necessary to effect such transfers.
AutoNDA by SimpleDocs
Transfer of Domain Names and Social Media Accounts. Promptly after the Closing, Company Parent shall provide to the Surviving Corporation all authorization codes or “unlock” codes as required to transfer control of any domain names and social media accounts exclusively used in connection with the Business and as set forth in Schedule 3.13(a) of the Company Disclosure Schedules.
Transfer of Domain Names and Social Media Accounts. Seller shall, and shall cause the Subsidiary Transferors to, transfer control of any domain names and social media accounts included in the Transferred Intellectual Property to Purchaser in accordance with the Transition Services Agreement.

Related to Transfer of Domain Names and Social Media Accounts

  • Transfer of Materials To facilitate the conduct of activities under the Research Plan or an Additional Research Plan, as applicable, either Party (the “Transferor Party”) may, at its election, provide Materials to the other Party (the “Transferee Party”) solely as mutually agreed by the Parties or as set forth in the Research Plan or any Additional Research Plan. All such Materials (a) will remain the sole property of the Transferor Party, (b) will be used only in the exercise if the Transferee Party’s rights or fulfillment of the Transferee Party’s obligations under this Agreement, (c) except as provided in the Research Plan or Additional Research Plan or as otherwise agreed by the Parties, (i) will remain solely under the control of the Transferee Party, (ii) will not be used or delivered by the Transferee Party to or for the benefit of any Third Party, and (iii) will not be used in research or testing involving human subjects, and (d) will be subject to all additional restrictions and obligations that the Transferor Party has identified in a written notice to the Transferee Party as being necessary for the Transferor Party to comply with its obligations to Third Parties with respect to the applicable Material, which notice is provided at or prior to the delivery of such Materials to the Transferee Party. Without limitation to ARTICLE 7, all Materials supplied under this Section 2.1.9 are supplied “as is”, with no warranties of fitness for a particular purpose, and must be used with prudence and appropriate caution in any experimental work, as not all of their characteristics may be known. Following the completion of the activities for which the applicable Materials were supplied under this Section 2.1.9 or upon the Transferor Party’s earlier request, the Transferee Party will either destroy or return to the Transferor Party, at the Transferor Party’s sole discretion, all Materials provided by the Transferor Party that are unused; provided that Vertex will have the right to retain and continue to use any Materials provided by Company that Vertex has the right to Exploit under the license granted to Vertex pursuant to Section 4.1.1.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Transfer of Personal Information Supplier warrants to DXC that Personal Information provided to Supplier or obtained by Supplier under this Agreement on behalf of DXC (including any SOW) shall not be transferred across national boundaries unless authorized by law or specified within this Agreement or the applicable SOW as authorized for transfer across national boundaries. Supplier agrees that any such transfer will only be made in compliance with applicable Data Privacy Laws. If there is a conflict between this Section ‘Data Protection and Privacy’ and the other provisions of this Agreement, the requirements of this Section shall take precedence.

  • Transfer of Personal Data The Participant authorizes, agrees and unambiguously consents to the transmission by the Company (or any Subsidiary) of any personal data information related to the RSUs awarded under this Agreement for legitimate business purposes (including, without limitation, the administration of the Plan). This authorization and consent is freely given by the Participant.

  • Transfer of Technology 1. The Parties agree to exchange views and information on their law and international practices on the protection and enforcement of intellectual property rights, affecting transfer of technology. This shall, in particular, include exchanges on measures to facilitate information flows, business partnerships, and voluntary licensing and subcontracting agreements. Particular attention shall be paid to the conditions necessary to create an adequate enabling environment for technology transfer in the host countries, including issues such as the domestic legal framework and the development of human capital. 2. When measures are taken with regard to technology transfer, the legitimate interests of the intellectual property right holders shall be protected.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.

  • Transfer of Data The Participant consents to the Company or any Affiliate thereof processing data relating to the Participant for legal, personnel, administrative and management purposes and in particular to the processing of any sensitive personal data relating to the Participant. The Company may make such information available to any Affiliate thereof, those who provide products or services to the Company or any Affiliate thereof (such as advisers and payroll administrators), regulatory authorities, potential purchasers of the Company or the business in which the Participant works, and as may be required by law.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!