DATA EXPLOITATION Sample Clauses

POPULAR SAMPLE Copied 3 times
DATA EXPLOITATION. The Customer owns all the Data. The customer is solely responsible for the quality, lawfulness and relevance of the Data that it transmits to the Service Provider as well as for their use with the Application Service and the results thereof. In addition, the Customer guarantees to be the owner of all rights (including intellectual property rights and authorization of third parties) allowing him/her to use the Data. The Customer guarantees that the Data does not violate the laws and regulations in force, the rights of third parties and is free from any virus or malicious code likely to harm the Solution or the Application Service. If the Service Provider becomes aware that an element of the Data violates the above stipulations, the Service Provider is entitled to remove or render unavailable such an element. The Customer guarantees the Service Provider in the event of failure to comply with the stipulations of this article. The customer undertakes to defend the Service Provider at its own expense and indemnify the Service Provider against any costs, claims or damages incurred by the Service Provider or for which the Service Provider may be liable due to the customer's default.
DATA EXPLOITATION. The Licensee owns all the Data. The Licensee is solely responsible for the quality, lawfulness and relevance of the Data that it transmits to the Processor as well as for their use with the Application Service and the results thereof. In addition, the Licensee guarantees to be the owner of all rights (including intellectual property rights and authorization of third parties) allowing him/her to use the Data. The Licensee guarantees that the Data does not violate the laws and regulations in force, the rights of third parties and is free from any virus or malicious code likely to harm the Solution or the Application Service. If the Processor becomes aware that an element of the Data violates the above stipulations, the Processor is entitled to remove or render unavailable such an element. The Licensee guarantees the Processor in the event of failure to comply with the stipulations of this article. The Licensee undertakes to defend the Processor at its own expense and indemnify the Processor against any costs, claims or damages incurred by the Processor or for which the Processor may be liable due to the Licensee's default.
DATA EXPLOITATION. The Customer owns all the Data.
DATA EXPLOITATION. The Business Model of Data CollectionData flow: The channel where data is transferred from one entity to another. A dataset is shared across several repositories. Each repository holds an 1. An example of the management flow and data flow: Let Company A be offering a service via mobile app, in which it is necessary to collect sensitive data, e.g. face and voice. This company has an service-level-agreement (SLA) with Company B, which stores and processes the datasets for Company A. At time t = t0, Company A creates an electronic consent (e-consent) for the data subject who agrees the processing of his/hers dataset. Later, at time t = t1, Company A creates new agreements with another Company C to carry out their business, selling their solutions on processing data. As new actors come into the scenario, their actions may affect the current agreement between the data subject and Company A. instance of this dataset. Each instance is a derivative of the original dataset. Formally, the formula can be described as follows: d∗ = f2(dj = f1(d, P1), P2) , where d is the original dataset, functions f1, f2 are transformation functions (e.g. pseudonymisation operations), and P1, P2 sets of policies applied to d and dj, respectively. The ideal situation is setting an equilibrium between parties. Within this exchange context, the value of a dataset to the data subject is balanced with the value of that dataset to the aggregated data processor within its domain. Therefore, the service or tool value offered is proportional to the value of the dataset exchanged along with the related costs. An important factor that aims 8 ▇. ▇▇▇▇▇▇▇▇-▇▇▇▇▇ et al. this equilibrium are the data regulations, which are forcing companies to enforce transparency, and accountability regarding customers’ privacy. For this purpose, they relay on data subject consent and privacy policies. Hence, privacy policies and the user’s consent are static entities that determines the relationship, actions and conditions between the actors of the dynamic system.
DATA EXPLOITATION 

Related to DATA EXPLOITATION

  • Exploitation (i) Exploitation of intellectual property may take the form of patenting by the originator singly or in combination with other agencies. (ii) The parties patenting the property shall reach a mutually agreeable arrangement including ownership and revenue sharing which shall be reduced to writing. (iii) In the event that the employee reaches an agreement to use the offices of the Innovation Transfer Office, disputes shall be handled in accordance with Article

  • SEXUAL EXPLOITATION 18.1 The Contractor shall take all appropriate measures to prevent sexual exploitation or abuse of anyone by it or by any of its employees or any other persons who may be engaged by the Contractor to perform any services under the Contract. For these purposes, sexual activity with any person less than eighteen years of age, regardless of any laws relating to consent, shall constitute the sexual exploitation and abuse of such person. In addition, the Contractor shall refrain from, and shall take all appropriate measures to prohibit its employees or other persons engaged by it from, exchanging any money, goods, services, offers of employment or other things of value, for sexual favors or activities, or from engaging in any sexual activities that are exploitive or degrading to any person. The Contractor acknowledges and agrees that the provisions hereof constitute an essential term of the Contract and that any breach of this representation and warranty shall entitle UNDP to terminate the Contract immediately upon notice to the Contractor, without any liability for termination charges or any other liability of any kind. 18.2 UNDP shall not apply the foregoing standard relating to age in any case in which the Contractor’s personnel or any other person who may be engaged by the Contractor to perform any services under the Contract is married to the person less than the age of eighteen years with whom sexual activity has occurred and in which such marriage is recognized as valid under the laws of the country of citizenship of such Contractor’s personnel or such other person who may be engaged by the Contractor to perform any services under the Contract.

  • Licensed Products Lessee will obtain no title to Licensed Products which will at all times remain the property of the owner of the Licensed Products. A license from the owner may be required and it is Lessee's responsibility to obtain any required license before the use of the Licensed Products. Lessee agrees to treat the Licensed Products as confidential information of the owner, to observe all copyright restrictions, and not to reproduce or sell the Licensed Products.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Commercialization Intrexon shall have the right to develop and Commercialize the Reverted Products itself or with one or more Third Parties, and shall have the right, without obligation to Fibrocell, to take any such actions in connection with such activities as Intrexon (or its designee), at its discretion, deems appropriate.