USE OF THE TECHNOLOGY Sample Clauses

USE OF THE TECHNOLOGY. The Licensee shall comply with all laws applying to the Technology, the Improvements and the Licensee’s Products.
AutoNDA by SimpleDocs
USE OF THE TECHNOLOGY. With the exception of the Technology License Agreements and the government entitlements referred to in Section 4.3(b) hereto, the Sellers have not permitted, or granted any right to, any person or entity to use the Technology or the Intellectual Property Rights relating to the Technology.
USE OF THE TECHNOLOGY. Your Responsibilities. You will: (i) be responsible for Your or for Your Usersagreement to and compliance with this Agreement, and any applicable order forms or purchase orders between You and Your Users, (ii) be responsible for the accuracy, quality and legality of Your Data, (iii) use all reasonable efforts to prevent unauthorized access to or use of the Cycloid DevOps framework and notify Us as soon as possible of any such unauthorized access or use, (iv) use the Cycloid DevOps framework only in accordance with this Agreement, any Order Forms, and any other attachments or amendments thereto, and (v) comply with all applicable laws and regulations. • Usage Restrictions. You may not: (i) make the Cycloid DevOps framework available to anyone outside of the necessary personnel within Your company; (ii) sell, lease, subscription, distribute or otherwise make the Cycloid DevOps framework available to any third parties, other than any subscription rights expressly granted in Your Order Form or this Agreement, or grant or attempt to grant any User or third party such rights; (iii) use the Cycloid DevOps framework to upload, transmit, store, or share any information or materials that infringes the intellectual property or privacy rights of a third party, or information or material that is unlawful; (iv) use the Cycloid DevOps framework to transmit any Malicious Code; (v) attempt to gain, or assist another party’s attempt to gain, unauthorized access to the Cycloid DevOps framework; (vi) copy, modify, or create derivative works of the Cycloid DevOps framework or any of Our Intellectual Property, other than as expressly permitted under this Agreement or an Order Form, or (vii) build a competitive product to the Cycloid DevOps framework. Any violation of these restrictions shall be considered a material breach of this Agreement.
USE OF THE TECHNOLOGY. (a) Anacomp grants to SKC an exclusive, non-transferable and non-assignable royalty free right to use the Technology to manufacture the Microfilm Products exclusively for Anacomp and, commencing on July 1, 1997, provided that SKC supplies Microfilm Products solely to Indirect Channels, to manufacture the Microfilm Products for sale to Indirect Channels. Notwithstanding such royalty-free right to use the Technology, SKC shall remit to Anacomp a 15% royalty, payable semi-annually within forty-five (45) days of the end of each semi-annual period, of the price paid by Anacomp to SKC during such time period of sales to such Indirect Channels for the same product code on SKC's sales (net of returns) of Vesicular Microfilm Products to Rexam Graphics Ltd. ("Rexam") and Fuji Photo Film USA, Inc. ("Fuji"), whether such sales are made directly or, with the actual knowledge of SKC, indirectly through other companies. Actual knowledge shall exist if Anacomp notifies SKC that any intermediary is reselling to Rexam or Fuji. The royalty period shall be deemed to commence on the date of such notice to SKC by Anacomp. SKC shall not be obligated to pay the 15% royalty if SKC can establish to Anacomp's reasonable satisfaction that such other company did not and will not resell to Rexam or Fuji. SKC shall be permitted to sell such Microfilm Products under its own SKC label or the private label of its customers. SKC's royalty calculations shall be subject to an annual Audit Right by Anacomp. The right to use the Technology authorizes SKC, among other matters, to manufacture in volume the Microfilm Products. SKC may make a reasonable number of copies of the Technology in order to effectively exercise the rights granted hereunder. However, SKC acknowledges that all copies of the Technology and proprietary rights in and appurtenant thereto, including but not limited to copyright, patent and trade secret rights, are and shall remain the sole property of Anacomp, and SKC agrees to treat all Technology and related documentation as Confidential Information in the manner specified in Section 13. (b) Upon the expiration or early termination of this Agreement for any reason, the right granted in Section 4.5(a) shall immediately terminate, and SKC agrees to return the Proprietary Technology to Anacomp in accordance with Section 3.2(f). Anacomp agrees that upon such expiration or early termination, SKC may retain the Technology, other than the Proprietary Technology (except to the extent a...
USE OF THE TECHNOLOGY. 10.1 Except as permitted by this Agreement or as may be permitted by any applicable law which is incapable of exclusion, KNL shall not: 10.1.1 access all or any part of the Technology in order to build a product or service which competes with the Technology; 10.1.2 use the Technology to provide services to third parties (save as permitted pursuant to clause 7.6 or as may otherwise be agreed in connection with an Alternative Deposit Transaction pursuant to clause 7.5); 10.1.3 license, sell, rent, lease, transfer, assign, distribute, display, disclose or otherwise make the Technology available to any third party other than in accordance with clauses 7.6 and/or 27; or 10.1.4 register or attempt to register any patents, trade marks or any other registered rights in respect of any Intellectual Property Rights subsisting in all or any part of the Technology.

Related to USE OF THE TECHNOLOGY

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Joint Technology The Parties agree that, in order to effectuate the provisions of Section 4.4.2, subject to any exclusive licenses granted hereunder, (a) the non-use provisions of this Article 9 shall not apply to each Party’s use of Joint Technology, and (b) each Party may disclose the Joint Technology to Third Parties who are under terms of confidentiality no less strict than those contained in this Agreement.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Use of Materials There should be no limitations or restrictions by Union upon a Contractor's choice of materials or design, nor, regardless of source or location, upon the full use and utilization, of equipment, machinery, packaging, precast, prefabricated, prefinished, or preassembled materials, tools or other labor saving devices, subject to the application of the California Public Contract and Labor Codes. Generally, the onsite installation or application of such items shall be performed by the craft having jurisdiction over such work.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!