Use of Third Party Technology by AdStar Sample Clauses

Use of Third Party Technology by AdStar. AdStar has not and shall not incorporate any material Third Party Technology in the CareerBuilder Services unless: (i) such technology and their owners (including the owners of any patents, copyrights, trade secrets, trademarks or other intellectual property rights embedded therein) are identified in writing to Tribune, and (ii) AdStar either: (x) has sufficient authority to grant to Tribune the rights and licenses necessary to exploit the CareerBuilder Service as contemplated herein (y) the third party owner has granted directly to Tribune rights and licenses in such materials necessary to exploit the CareerBuilder Service as contemplated herein pursuant to a separate written agreement. Schedule 6 contains a complete and accurate list of all Third Party Technology used or contemplated to be used in the CareerBuilder Service and except as specified in Schedule 6, AdStar has the right to assign all Third Party Technology licenses incorporated in the CareerBuilder Service to Tribune in the event of a release of the Deposit Materials pursuant to Article X. AdStar also agrees that it will use its best efforts to assign any Third Party Technology licenses to Tribune in the event of a release of the Deposit Materials as specified in Article X and will use it best efforts to secure such rights in all future Third Party Technology licenses. AdStar shall have sole responsibility for payment of all royalties and other charges with respect to Third Party Technology employed by AdStar and included in the CareerBuilder Service or the Modules, including as they may accrue with respect to subsequent exercise by Tribune, its Affiliates, customers, and successors and assigns. With respect to material Third Party Technology that is identified in writing to Tribune, AdStar shall, prior to incorporating the same in the CareerBuilder Services, either provide to Tribune a copy of any agreements or other instruments from which AdStar derives its authority to grant Tribune the rights contemplated herein, or shall allow Tribune's counsel to review such agreements or other instruments on a confidential basis for the purpose of advising Tribune with respect to AdStar's authority to grant Tribune such rights and licenses. Failure to provide such agreements or instruments to Tribune or Tribune's counsel shall be deemed a material breach of this Agreement; provided, however, that AdStar shall have ten (10) calendar days to provide such agreements upon notice from Tribune. If Tribune is...
AutoNDA by SimpleDocs

Related to Use of Third Party Technology by AdStar

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Use of Third Parties Except as may be expressly agreed to in writing by the State Entity, Contractor shall not subcontract, assign, delegate or otherwise permit anyone other than Contractor or Contractor's personnel to perform any of Contractor's obligations under this Contract or any of the work subsequently assigned under this Contract. No subcontract which Contractor enters into with respect to performance of obligations or work assigned under the Contract shall in any way relieve Contractor of any responsibility, obligation or liability under this Contract and for the acts and omissions of all subcontractors, agents, and employees. All restrictions, obligations and responsibilities of the Contractor under the Contract shall also apply to the subcontractors. Any contract with a subcontractor must also preserve the rights of the State Entity. The State Entity shall have the right to request the removal of a subcontractor from the Contract for good cause.

  • Proprietary Information of Third Parties No third party has claimed or has reason to claim that any person employed by or affiliated with the Company has (a) violated or may be violating to any material extent any of the terms or conditions of his employment, non-competition or non-disclosure agreement with such third party, (b) disclosed or may be disclosing or utilized or may be utilizing any trade secret or proprietary information or documentation of such third party, or (c) interfered or may be interfering in the employment relationship between such third party and any of its present or former employees, or has requested information from the Company that suggests that such a claim might be contemplated. To the best of the Company’s knowledge, no person employed by or affiliated with the Company has improperly utilized or proposes to improperly utilize any trade secret or any information or documentation proprietary to any former employer, and to the best of the Company’s knowledge, no person employed by or affiliated with the Company has violated any confidential relationship which such person may have had with any third party, in connection with the development, manufacture or sale of any product or proposed product or the development or sale of any service or proposed service of the Company, and the Company has no reason to believe there will be any such employment or violation. To the best of the Company’s knowledge, none of the execution or delivery of this Agreement and the other related agreements and documents executed in connection herewith, or the carrying on of the business of the Company as officers, employees or agents by any officer, director or key employee of the Company, or the conduct or proposed conduct of the business of the Company, will materially conflict with or result in a material breach of the terms, conditions or provisions of or constitute a material default under any contract, covenant or instrument under which any such person is obligated.

  • No Improper Use of Materials During his or her employment with the Company, Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom Employee has an obligation of confidentiality, and Employee will not bring onto the premises of the Company any unpublished documents or any property belonging to any former employer or any other person to whom Employee has an obligation of confidentiality unless consented to in writing by that former employer or person.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Non-Disclosure of Third Party Information Executive represents and warrants and covenants that Executive shall not disclose to the Company, or use, or induce the Company to use, any proprietary information or trade secrets of others at any time, including but not limited to any proprietary information or trade secrets of any former employer, if any; and Executive acknowledges and agrees that any violation of this provision shall be grounds for Executive’s immediate termination and could subject Executive to substantial civil liabilities and criminal penalties. Executive further specifically and expressly acknowledges that no officer or other employee or representative of the Company has requested or instructed Executive to disclose or use any such third party proprietary information or trade secrets.

  • Use of Intellectual Property The Adviser grants to the Sub-Adviser a sublicense to use the trademarks, service marks, logos, names, or any other proprietary designations of the Adviser (“AdvisorShares Marks”) on a non-exclusive basis. The Sub-Adviser will acquire no rights in the AdvisorShares Marks, and all goodwill of the AdvisorShares Marks shall inure to and remain with the Adviser. The Sub-Adviser agrees that neither it, nor any of its affiliates, will knowingly in any way refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates or use AdvisorShares Marks in offering, marketing or other promotional materials without the prior express written consent of the Adviser, which approval will not be unreasonably withheld or delayed, except as required by rule, regulation or upon the request of a governmental authority. Notwithstanding the forgoing, the Sub-Adviser and its affiliates may, without obtaining the Adviser’s prior approval, refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates and use AdvisorShares Marks in offering, marketing or other promotional materials provided that such materials were previously approved by the Adviser and remain in substantially the same form.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Infringement of Third Party Rights Each Party shall promptly notify the other in writing of any allegation by a Third Party that the activity of either of the Parties hereunder infringes or may infringe the intellectual property rights of such Third Party. Genentech shall have the first right but not the obligation to control any defense of any such claim involving alleged infringement of Third Party rights by Genentech’s activities under this Agreement at its own expense and by counsel of its own choice, and Curis shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. If Genentech fails to proceed in a timely fashion with regard to such defense, Curis shall have the right but not the obligation to control any such defense of such claim at its own expense and by counsel of its own choice, and Genentech shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. Curis shall have the first right but not the obligation to control any defense of any such claim involving alleged infringement of Third Party rights by Curis’ activities under this Agreement at its own expense and by counsel of its own choice, and Genentech shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. If Curis fails to proceed in a timely fashion with regard to such defense, Genentech shall have the right but not the obligation to control any such defense of such claim at its own expense and by counsel of its own choice, and Curis shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. Neither Party shall have the right to settle any infringement action under this Section 10.5 in a manner that diminishes the rights or interests of the other Party hereunder without the consent of such Party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!