Use and Exploitation of Proprietary Knowledge Sample Clauses

Use and Exploitation of Proprietary Knowledge. 10.1.1. Each Party shall have the free disposal of its Proprietary Knowledge.
AutoNDA by SimpleDocs
Use and Exploitation of Proprietary Knowledge. The Establishments and the UNIME shall freely avail of their own Proprietary Knowledge. To meet the needs of executing the Study and for this sole end, each Party may use the Proprietary Knowledge of the other Party with no financial counterpart. Such Proprietary Knowledge shall be communicated by the holder upon the express request of the other Party and must be treated as Confidential Information, in keeping with Article 5 of this Agreement. Each Party undertakes to grant the other Party, upon its express request and subject to the reservation of third-party rights, those licences to its Proprietary Knowledge that may be needful for the use and exploitation of the Results and/or new patents, under normal commercial conditions for the sector of application under consideration.

Related to Use and Exploitation of Proprietary Knowledge

  • Restricting on disclosure and use of the Confidential Information 5.1 The Receiving Party undertakes not to use the Confidential Information for any purpose other than:

  • CONFIDENTIALITY AND INTELLECTUAL PROPERTY RIGHTS 3.1 Any License Key to the Software is the confidential information of Wowza.

  • Treatment of Proprietary and Confidential Information A. Both parties agree that it may be necessary to provide each other during the term of this Agreement with certain confidential information, including trade secret information, including but not limited to, technical and business plans, technical information, proposals, specifications, drawings, procedures, customer account data and like information (hereinafter collectively referred to as “Information”). Both parties agree that all Information shall either be in writing or other tangible format and clearly marked with a confidential, private or proprietary legend, or, when the Information is communicated orally, it shall also be communicated that the Information is confidential, private or proprietary. The Information will be returned to the owner within a reasonable time. Both parties agree that the Information shall not be copied or reproduced in any form. Both parties agree to receive such Information and not disclose such Information. Both parties agree to protect the Information received from distribution, disclosure or dissemination to anyone except employees of the parties with a need to know such Information and which employees agree to be bound by the terms of this Section. Both parties will use the same standard of care to protect Information received as they would use to protect their own confidential and proprietary Information.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Intellectual Property Rights and Confidentiality 3.1 Party A shall have exclusive and proprietary rights and interests in all rights, ownership, interests and intellectual properties arising out of or created during the performance of this Agreement, including but not limited to copyrights, patents, patent applications, software, technical secrets, trade secrets and others. Party B shall execute all appropriate documents, take all appropriate actions, submit all filings and/or applications, render all appropriate assistance and otherwise conduct whatever is necessary as deemed by Party A in its sole discretion for the purposes of vesting any ownership, right or interest of any such intellectual property rights in Party A, and/or perfecting the protections for any such intellectual property rights in Party A.

  • CITY OWNERSHIP OF PROPRIETARY INFORMATION All reports, drawings, plans, specifications, and other documents prepared by Consultant as products of service under this Agreement shall be the exclusive property of the City and all such materials shall be remitted to the City by Consultant in a timely manner upon completion, termination or cancellation of this Agreement. Consultant shall not use, willingly allow or cause to have such materials used for any purpose other than performance of Consultant’s obligations under this Agreement without the prior written consent of the City.

  • Confidentiality and Intellectual Property 6.1 You must not disclose to any other person or entity any confidential information belonging to the Group or any of its divisions, customers, suppliers or collaboration partners (including, without limitation, this Contract, specifications, formulae, manufacturing processes, know-how and any technical or economic information) or use such information for any purpose except for the supply of goods and/or services to us or as expressly authorised in writing by us. You must return to us such information and any copies if requested.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Return of Proprietary Information The Executive acknowledges and agrees that all the Proprietary Information used or generated during the course of working for the Company Group is the property of the Company Group. The Executive agrees to deliver to the Company Group all documents and other tangibles (including diskettes and other storage media) containing the Proprietary Information at any time upon request by the Board of Trustees during his employment and immediately upon termination of his employment.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!