Use of Client Property Sample Clauses

Use of Client Property. Client may, but is not required to (unless provided otherwise in a Statement of Work), provide certain hardware, software, data, databases, office space, security access or other materials, intellectual property, technologies or services to Contractor in connection with this Agreement (“Client Property”). Client grants Contractor a non-exclusive, non-transferable license to use the Client Property solely for Client’s benefit in connection with Contractor’s performance of the Services. Contractor shall not reverse engineer or decompile the Client Property or other computer programs, algorithms, techniques, processes, methods, know-how or other related technology supplied by Client. Client may terminate this license at any time, without cause, on written notice to Contractor. Unless specifically authorized in a Statement of Work, Contractor will use the Client Property only in the form provided by Client, without modification. In addition, Contractor will maintain and use Client Property in accordance with any written instructions and/or specifications provided by Client. Except for the limited license provided in this Section 5.4, nothing contained in this Agreement will be construed as granting Contractor any right, title, or interest in or to any of the Client Property.
AutoNDA by SimpleDocs
Use of Client Property. Subject to the terms and conditions of this Agreement, Client hereby grants Consultant an irrevocable, non- exclusive, fully-paid right and license to use any Client Property for the purpose of providing Services during the Term of this Agreement. Consultant may also retain or modify Client Intellectual Property such as documentation or passwords for the purpose of providing Services; such Property will be held in escrow and be released by Consultant by Consultant’s decision or under the provisions of Section 6.4. Same shall apply to any additional Agreements or Statements of Work.

Related to Use of Client Property

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • Proprietary Property All modeling algorithms, tools, computer programs, know-how, methodologies, processes, technologies, ideas, concepts, skills, routines, subroutines, operating instructions and other materials and aides used in performing the duties set forth in Section 2.02 that relate to advice regarding current and potential Assets, and all modifications, enhancements and derivative works of the foregoing.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • Use of Proprietary Information Officer recognizes that Corporation possesses a proprietary interest in all of the information described in Section 6 and has the exclusive right and privilege to use, protect by copyright, patent or trademark, manufacture or otherwise exploit the processes, ideas and concepts described therein to the exclusion of Officer, except as otherwise agreed between Corporation and Officer in writing. Officer expressly agrees that any products, inventions, discoveries or improvements made by Officer, his agents or affiliates based on or arising out of the information described in Section 6 shall be (i) deemed a work made for hire under the terms of United States Copyright Act, 17 U.S.C. § 101 et seq., and Corporation shall be the owner of all such rights with respect thereto and (ii) the property of and inure to the exclusive benefit of Corporation.

  • Use of Confidential Information 7.1 Each Party may be given access to Confidential Information from the other Party in order to perform its obligations under this Agreement. The Party that receives Confidential Information shall be known as “Receiving Party”. The Party that discloses Confidential Information shall be known as “Disclosing Party”. 7.2 The Receiving Party acknowledges that the Confidential Information is received on a confidential basis, and that the Disclosing Party shall remain the exclusive owner of its Confidential Information and of Intellectual Property rights contained therein. No license or conveyance of any such rights to the Receiving Party is granted or implied under this Agreement. 7.3 The Receiving Party shall: (a) use the Confidential Information of the Disclosing Party only for purposes of complying with its obligations under this Agreement and, without limiting the generality of the foregoing, shall not, directly or indirectly, deal with, use, exploit or disclose such Confidential Information or any part thereof to any person or entity or for any purpose whatsoever (or in any manner which would benefit any competitor of the Disclosing Party) except as expressly permitted hereunder or unless and until expressly authorized in writing to do so by the Disclosing Party; (b) use reasonable efforts to treat, and to cause all its officers, agents, servants, employees, professional advisors and contractors and prospective contractors to treat, as strictly confidential all Confidential Information. In no event shall such efforts be less than the degree of care and discretion as the Receiving Party exercises in protecting its own valuable confidential information. Any contractors engaged by or prospective contractors to be engaged by the Receiving Party in connection with the performance of the Services shall be required to assume obligations of secrecy equal to or greater than the obligations that the Receiving Party has assumed in this Agreement with respect to the Confidential Information; (c) not, without the prior written consent of the Disclosing Party, disclose or otherwise make available the Disclosing Party’s Confidential Information or any part thereof to any party other than those of its directors, officers, agents, servants, employees, professional advisors, contractors or prospective contractors who need to know the Confidential Information for the purposes set forth herein; (d) not copy or reproduce in any manner whatsoever the Confidential Information of the Disclosing Party or any part thereof without the prior written consent of the Disclosing Party, except where required for its own internal use in accordance with this Agreement; and (e) promptly, upon termination or expiration of this Agreement, return and confirm in writing the return of all originals, copies, reproductions and summaries of Confidential Information or, or at the option of the Disclosing Party, destroy and confirm in writing the destruction of the Confidential Information (this sub- clause being applicable only on the User). 7.4 Provided, however that nothing herein shall restrict in any manner the ability of either Party to use or disclose Confidential Information owned by it in any manner whatsoever, and the obligations of confidentiality herein shall apply to each Party only to the extent that the Confidential Information or portion thereof is not owned by that particular Party.

  • Restricted Use of Confidential Information (a) Each Receiving Party acknowledges the confidential and proprietary nature of the Confidential Information of the Disclosing Party and agrees that such Confidential Information (i) shall be kept confidential by the Receiving Party; (ii) shall not be used for any reason or purpose other than to evaluate and consummate the Contemplated Transactions; and (iii) without limiting the foregoing, shall not be disclosed by the Receiving Party to any Person, except in each case as otherwise expressly permitted by the terms of this Agreement or with the prior written consent of an authorized representative of Seller with respect to Confidential Information of Seller(each, a "Seller Contact") or an authorized representative of Buyer with respect to Confidential Information of Buyer (each, a "Buyer Contact"). Each of Buyer and Seller shall disclose the Confidential Information of the other party only to its Representatives who require such material for the purpose of evaluating the transactions contemplated herein and are informed by Buyer or Seller, as the case may be, of the obligations of this Article 12 with respect to such information. Each of Buyer and Seller shall (iv) enforce the terms of this Article 12 as to its respective representatives; (v) take such action to the extent necessary to cause its representatives to comply with the terms and conditions of this Article 12; and (vi) be responsible and liable for any breach of the provisions of this Article 12 by it or its representatives. (b) Unless and until this Agreement is terminated, Seller shall maintain as confidential any Confidential Information (including for this purpose any information of Seller of the type referred to in Sections 12.l(a)(i), (ii) and (iii), whether or not disclosed to Buyer) of the Seller or Shareholders relating to any of the Assets or the Assumed Liabilities. (c) From and after the Closing, the provisions of Section 12.2(a) above shall not apply to or restrict in any manner Buyer's use of any Confidential Information of the Seller relating to any of the Assets or the Assumed Liabilities.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Proprietary Data NASDAQ OMX grants to Subscriber a nonexclusive, non-transferable license during the term of the Agreement to receive and use the Information transmitted to it by Distributor and thereafter, to use such Information as permitted under the terms of this Agreement and/or the NASDAQ OMX Requirements. Subscriber acknowledges and agrees that NASDAQ OMX has proprietary rights to the Information that originates on or derives from markets regulated or operated by NASDAQ OMX, and compilation or other rights to Information gathered from other sources. Subscriber further acknowledges and agrees that NASDAQ OMX 's third-party information providers have exclusive proprietary rights to their respective Information. In the event of any misappropriation or misuse by Subscriber or anyone who accesses the Information through Subscriber, NASDAQ OMX or its third-party information providers shall have the right to obtain injunctive relief for its respective materials. Subscriber will attribute source as appropriate under all the circumstances.

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!