Usability of Source Code Sample Clauses

Usability of Source Code. Depositor represents and warrants that the Deposit made to InnovaSafe at all times (a) will be the version of the current release of the Software, as offered by Depositor to Beneficiary or other licensees in the ordinary course of business from time to time during the term of this Agreement, (b) will be understandable and useable by a reasonably skilled programmer or other professional to understand, maintain, and correct the Software without assistance of any other person, (c) will contain sufficient documentation to enable such a skilled programmer or other professional to understand and use any proprietary languages or programming components that such a skilled programmer or other professional could not reasonably be expected to understand, and (d) includes all the devices, programming, and documentation necessary for the maintenance of the Software by Beneficiary upon release of the Deposit pursuant to this Agreement, except for devices, programming, and documentation commercially available to beneficiary on reasonable terms through readily known sources other than the Depositor.
AutoNDA by SimpleDocs
Usability of Source Code. Licensors represent and warrant that the Source Code is and shall be understandable and useable by a trained computer-programming contractor. Licensors further represent and warrant that the Collateral does not involve any proprietary languages or programming components that such a contractor could not reasonably be expected to understand, except to the extent the Deposit contains sufficient commentary to enable such contractor to understand and use such languages or components. Licensors further represent and warrant that the Source Code includes all of the devices, programming, and documentation necessary for the maintenance of the Collateral by the Licensee upon release of the Source Code pursuant to this Agreement, except for devices, programming, and documentation commercially available to the Licensee on reasonable terms through readily known sources other than the Licensors.
Usability of Source Code. Author represents and warrants that the Source Code is and shall be understandable and useable by a trained computer-programming contractor who is generally familiar with hardware and software systems using the Work. Author further represents and warrants that the Source Code includes all of the devices, programming, and documentation necessary for the maintenance of the Work by Publisher upon release of the Source Code pursuant to this Agreement, except for devices, programming, and documentation commercially available to Publisher on reasonable terms through readily known sources other than the Author.

Related to Usability of Source Code

  • Applicability of Data Privacy Protections In the event that Personal Information will be Processed by Supplier in connection with the performance under this Agreement (including any SOW), then and only then shall the provisions of this Section ‘Data Protection and Privacy’ be applicable. For the avoidance of doubt, the data security requirements contained in section ‘Information Security’ shall apply regardless of whether Personal Information is Processed under this Agreement or any SOW. All Personal Information obtained from or on behalf of DXC or in connection with performance pursuant to this Agreement shall be Processed and protected pursuant to this Section ‘Data Protection and Privacy’, the Section ‘Information Security’ and any other Sections of this Agreement that address Personal Information.

  • Confidentiality of State Information In performance of this Contract, and any exhibit or schedule hereunder, the Party acknowledges that certain State Data (as defined below), to which the Contractor may have access may contain individual federal tax information, personal protected health information and other individually identifiable information protected by State or federal law or otherwise exempt from disclosure under the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq (“State Data”). [In addition to the provisions of this Section, the Contractor shall comply with the requirements set forth in the State’s HIPAA Business Associate Agreement attached hereto as Attachment E]. Before receiving or controlling State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. State Data shall not be stored, accessed from, or transferred to any location outside the United States. The Contractor agrees that (a) it will use the State Data only as may be necessary in the course of performing duties or exercising rights under this Contract; (b) it will provide at a minimum the same care to avoid disclosure or unauthorized use of State Data as it provides to protect its own similar confidential and proprietary information; (c) it will not publish, reproduce, or otherwise divulge any State Data in whole or in part, in any manner or form orally or in writing to any third party unless it has received written approval from the State and that third party is subject to a written confidentiality agreement that contains restrictions and safeguards at least as restrictive as those contained in this Contract; (d) it will take all reasonable precautions to protect the State’s information; and (e) it will not otherwise appropriate such information to its own use or to the use of any other person or entity. Contractor will take reasonable measures as are necessary to restrict access to State Data in the Contractor’s possession to only those employees on its staff who must have the information on a “need to know” basis. The Contractor shall not retain any State Data except to the extent required to perform the services under this Contract. Contractor shall not access State user accounts or State Data, except in the course of data center operations, response to service or technical issues, as required by the express terms of this Contract, or at State’s written request. Contractor may not share State Data with its parent company or other affiliate without State’s express written consent. The Contractor shall promptly notify the State of any request or demand by any court, governmental agency or other person asserting a demand or request for State Data to which the Contractor or any third party hosting service of the Contractor may have access, so that the State may seek an appropriate protective order.

  • Confidentiality of Student Records 1. Student educational records created as a result of this Agreement shall be retained and disseminated in accordance with Family Educational Rights and Privacy Act (FERPA) requirements. 2. Participation in dual credit courses requires STUDENT and, if applicable, PARENT/GUARDIAN signatures on the Form for compliance with FERPA regulations.

  • Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it.

  • Limitation of Use The parties agree that this Agreement shall not be proffered by either party in another jurisdiction as evidence of any concession or as a waiver of any position taken by the other party in that jurisdiction or for any other purpose.

  • Termination of Use These terms and Your access to Our Website may be terminated by Us (at Our sole discretion) at any time without notice or any requirement to give You a reason why. In the event of termination under this clause We shall have no liability to You whatsoever (including for any consequential or direct loss You may suffer).

  • Effect and invariability of the Clauses These Clauses set out appropriate safeguards, including enforceable data subject rights and effective legal remedies, pursuant to Article 46(1) and Article 46(2)(c) of Regulation (EU) 2016/679 and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679, provided they are not modified, except to select the appropriate Module(s) or to add or update information in the Appendix. This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a wider contract and/or to add other clauses or additional safeguards, provided that they do not contradict, directly or indirectly, these Clauses or prejudice the fundamental rights or freedoms of data subjects.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • Indemnification Related to Confidentiality of Materials The Contractor will protect, defend, indemnify, and hold harmless the Department for claims, costs, fines, and attorney’s fees arising from or relating to its designation of materials as trade secret or otherwise confidential.

  • Certification of Meeting or Exceeding Tobacco-Free Workplace Policy Minimum Standards A. Grantee certifies that it has adopted and enforces a Tobacco-Free Workplace Policy that meets or exceeds all of the following minimum standards of: i. Prohibiting the use of all forms of tobacco products, including but not limited to cigarettes, cigars, pipes, water pipes (hookah), bidis, kreteks, electronic cigarettes, smokeless tobacco, snuff and chewing tobacco; ii. Designating the property to which this Policy applies as a "designated area,” which must at least comprise all buildings and structures where activities funded under this Grant Agreement are taking place, as well as Grantee owned, leased, or controlled sidewalks, parking lots, walkways, and attached parking structures immediately adjacent to this designated area; iii. Applying to all employees and visitors in this designated area; and iv. Providing for or referring its employees to tobacco use cessation services. B. If Grantee cannot meet these minimum standards, it must obtain a waiver from the System Agency.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!