Accessible Technology Sample Clauses

Accessible Technology. The Rehabilitation Act Amendments of 1998 apply to all electronic information technology (EIT) used by a Grantee for transmitting, receiving, using, or storing information to carry out the responsibilities of any Federal grant awarded. It includes, but is not limited to, computers (hardware, software, word processing, email and web pages) facsimile machines, copiers and telephones. When developing, procuring, maintaining or using EIT, grantees must ensure that the EIT allows:
AutoNDA by SimpleDocs
Accessible Technology. Section 508 of the Rehabilitation Act of 1973 requires HUD to ensure, when developing, procuring, maintaining, or using electronic and information technology (EIT), that the EIT allows persons with disabilities to access and use information and data comparably to those without disabilities unless an undue burden would result to the Federal agency. HUD encourages its recipients and subrecipients to adopt the goals and objectives of Section 508 by ensuring comparable access whenever EIT is used. In addition, the recipient and subrecipient(s) must assure their program and activities are carried out in compliance with applicable requirements in Section 504 of the Rehabilitation Act, HUD’s implementing regulations in 24 CFR part 8, and, where applicable, the Americans with Disabilities Act. These statutes also require effective communication with individuals with disabilities and prohibit EIT-imposed barriers to access information, programs, and activities for persons with disabilities. For more information, see HUD’s policy on Section 508 of the Rehabilitation Act and Accessible Technology.

Related to Accessible Technology

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Know-How The term “

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Operator Materials Operator retains all right, title and interest in and to any and all of Operator’s software, materials, tools, forms, documentation, training and implementation materials and intellectual property (“Operator Materials”). Operator grants to the LEA a personal, nonexclusive license to use the Operator Materials for its own non-commercial, incidental use as set forth in the Service Agreement. Operator represents that it has all intellectual property rights necessary to enter into and perform its obligations in this DPA and the Service Agreement, warrants to the District that the District will have use of any intellectual property contemplated by the Service Agreement free and clear of claims of any nature by any third Party including, without limitation, copyright or patent infringement claims, and agrees to indemnify the District for any related claims.

  • TRADEMARK INFORMATION You herein acknowledge, understand and agree that all of the LMS50 Corporation trademarks, copyright, trade name, service marks, and other LMS50 Corporation logos and any brand features, and/or product and service names are trademarks and as such, are and shall remain the property of LMS50 Corporation. You herein agree not to display and/or use in any manner the LMS50 Corporation logo or marks without obtaining LMS50 Corporation's prior written consent. COPYRIGHT OR INTELLECTUAL PROPERTY INFRINGEMENT CLAIMS NOTICE & PROCEDURES LMS50 Corporation will always respect the intellectual property of others, and we ask that all of our users do the same. With regards to appropriate circumstances and at its sole discretion, LMS50 Corporation may disable and/or terminate the accounts of any user who violates our TOS and/or infringes the rights of others. If you feel that your work has been duplicated in such a way that would constitute copyright infringement, or if you believe your intellectual property rights have been otherwise violated, you should provide to us the following information:

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Specially Created Intellectual Property Rights 27.1. All Intellectual Property Rights in Deliverables and and any reports, guidance, specification, instructions, toolkits, plans, data, drawings, databases, patents, patterns, models, designs or other material prepared by or for the Contractor on behalf of the Authority for use, or intended use, in relation to the performance by the Contractor of its obligations under the Framework Agreement belong to the Authority.

  • Proprietary Materials Each of the Parties shall own its own intellectual property including without limitation all trade secrets, know-how, proprietary data, documents, and written materials in any format. Any materials created exclusively by IPS for the School shall be owned by IPS, and any materials created exclusively by Operator for the School shall be Operator’s proprietary material. The Parties acknowledge and agree that neither has any intellectual property interest or claims in the other Party’s proprietary materials. Notwithstanding the foregoing, materials and work product jointly created by the Parties shall be jointly owned by the Parties and may be used by the individual Party as may be agreed upon by both Parties from time to time.

  • Intellectual Property Rights and Confidentiality 3.1 Party A shall have exclusive and proprietary rights and interests in all rights, ownership, interests and intellectual properties arising out of or created during the performance of this Agreement, including but not limited to copyrights, patents, patent applications, software, technical secrets, trade secrets and others. Party B shall execute all appropriate documents, take all appropriate actions, submit all filings and/or applications, render all appropriate assistance and otherwise conduct whatever is necessary as deemed by Party A in its sole discretion for the purposes of vesting any ownership, right or interest of any such intellectual property rights in Party A, and/or perfecting the protections for any such intellectual property rights in Party A.

Time is Money Join Law Insider Premium to draft better contracts faster.