Xxxxxxxx Of 100% Of Mountain Software Sample Clauses

Xxxxxxxx Of 100% Of Mountain Software. AG In Exchange Of SECT Shares ------------------------------------------------------------------- Xxxxx Xxxxx holds 100% of the outstanding share capital of Mountain Software AG of CHF 50,000.00 divided into 500 registered shares of nominal value of CHF 100.00 each. Sector AG is obliged to purchase and Xxxxx Xxxxx agrees to sell to Sector AG the total 500 shares of Mountain Software AG as above in exchange for 716,191 SECT shares (valuation USD 1,600,000.00) no later than Aug.23,1996. If the average of the NASDAQ bid price of SECT during the last 10 trading days of October 1996 is below USD 2.25, then Sector AG has to compensate the shortfall up to a value of USD 1,600,000 by issuing additional SECT shares ("reconciliation shares") or in cash, at the option of SECT or Sector AG.
AutoNDA by SimpleDocs

Related to Xxxxxxxx Of 100% Of Mountain Software

  • XXXXXXXX AND W XXXXXXX XXXXXX

  • Computer Software All computer applications software, owned or licensed, whether for general business usage (e.g., accounting, word processing, graphics, spreadsheet analysis, etc.), or specific, unique-to-the-business usage, and all computer operating, security or programming software, owned or licensed by Seller and used in the operation of the Business; and

  • Xxxxxxxx Tobacco Co the jury returned a verdict in favor of the plaintiff, found the plaintiff to be 30% at fault and RJR Tobacco to be 70% at fault, and awarded $9 million in compensatory damages and $1 million in punitive damages. For a detailed description of the above-described cases, see “— Xxxxx and Xxxxx Progeny Cases” below. In addition, since the end of the third quarter of 2013, jurors returned a verdict in the following Xxxxx Progeny case:

  • Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).

  • WHEXXXX xs xxxx of a plan of reorganization, RESTART PARTNERS, L.P., a Delaware Limited Partnership ("Restart"), may acquire an ownership interest in Elsinore Corporation ("Elsinore") or the Four Queens, Inc. ("FQI");

  • Licensed Software Section 3.17(f).......................................27

  • Third Party Software Customer acknowledges that in order for MyEcheck to perform the Consulting Services, Customer may need to obtain additional third party services ("Third Party Services") or third party technology ("Third Party Technology"). Customer agrees that the rights and licenses with respect to Third Party Technology and Third Party Services shall be under terms set forth in the pertinent purchase, license or services agreements between Customer and the vendors of such Third Party Software or Third Party Services. Customer shall execute and comply with appropriate purchase, license, or services agreements with respect to any Third Party Software or Third Party Services. Any amounts payable to third party vendors or service providers under such agreements are the sole responsibility of Customer and shall be paid directly by Customer to such third party vendors or service providers. MyEcheck Services Agreement

  • Xxxxxxx Xxxxxxx/Market Abuse Laws You acknowledge that, depending on your country or broker’s country, or the country in which Common Stock is listed, you may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect your ability to accept, acquire, sell or attempt to sell, or otherwise dispose of the shares of Common Stock, rights to shares of Common Stock (e.g., RSUs) or rights linked to the value of Common Stock, during such times as you are considered to have “inside information” regarding the Company (as defined by the laws or regulations in applicable jurisdictions, including the United States and your country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders you placed before possessing inside information. Furthermore, you may be prohibited from (i) disclosing insider information to any third party, including fellow employees and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. You acknowledge that it is your responsibility to comply with any applicable restrictions, and you should speak to your personal advisor on this matter.

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Information Technology The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.

Time is Money Join Law Insider Premium to draft better contracts faster.