Documentation, Security and Ownership of Software Clause Samples

Documentation, Security and Ownership of Software. Except as set forth on Schedule 3.16(d), Percon and its subsidiaries have user installation and operation manuals for all Software used in the development of or incorporated in Product Software that is critical to the development of products offered by Percon and its subsidiaries and for all Operations Software. Except as set forth on Schedule 3.16(d), all Product Software is documented through flow charts, designs, database models, entity relationship diagrams or business processes and user installation and procedure manuals that are sufficient to enable Percon and its subsidiaries to offer such Software to its customers and support such Software. Except as set forth on Schedule 3.16(d), neither Percon nor any of its subsidiaries has disclosed or delivered to any person, or permitted the disclosure or delivery to any escrow agent or other person, of the source code, or any portion or aspect of the source code, or any proprietary information or algorithm contained in any source code, of any Software. Except for Software that Percon and its subsidiaries license on a nonexclusive basis to its customers in the ordinary course of business and except as set forth on Schedule 3.16, Percon and its subsidiaries have not conveyed or granted any other rights to such Software, nor are Percon and its subsidiaries obligated to convey or grant any rights to license, market, incorporate in other Software, sell or otherwise use such Software to third parties, and to the knowledge of Percon, no third party has unauthorized access to such Software. Percon and its subsidiaries possess the original of all documentation, including without limitation all source codes, for all Software owned outright by it. Except as disclosed on Schedule 3.16(d), upon consummation of the transactions contemplated hereby, Percon and its subsidiaries or Surviving Corporation will continue to own all of the Software owned outright by Percon and its subsidiaries prior to the Closing, free and clear of all claims, liens, encumbrances, obligations and liabilities except for such claims, liens, encumbrances, obligations and liabilities of Percon and its subsidiaries (A) applicable to Software licensed to third parties and (B) as may be granted by Percon and its subsidiaries or Surviving Corporation after the Closing Date. Percon and its subsidiaries have provided to PSC or Newco access to or copies of Percon and its subsidiaries' customer support log and trouble shooting tools and solutions relating t...

Related to Documentation, Security and Ownership of Software

  • INFORMATION SECURITY SCHEDULE All capitalized terms not defined in this Information Security Schedule (this “Security Schedule”) shall have the meanings ascribed to them in the Transfer Agency and Service Agreement by and between DST and each of the funds listed on Exhibit A thereto (each such fund, or series thereof, severally, and not jointly, the “Fund”) dated March 1, 2022 (the “Agreement”). DST and Fund hereby agree that DST shall maintain and comply with an information security policy (“Security Policy”) that satisfies the requirements set forth below; provided, that, because information security is a highly dynamic space (where laws, regulations and threats are constantly changing), DST reserves the right to make changes to its information security controls at any time and at the sole discretion of DST in a manner that it believes does not materially reduce the protection it applies to Fund Data. From time to time, DST may subcontract services performed under the Agreement (to the extent provided for under the Agreement) or provide access to Fund Data or its network to a subcontractor or other third party; provided, that, such subcontractor or third party implements and maintains security measures DST believes are at least as stringent as those described in this Security Schedule. For the purposes of this Schedule “prevailing industry practices and standards” refers to standards among financial institutions, including mutual funds, and third parties providing financial services to financial institutions.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • Data Security and Privacy Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, the Company and each of its Subsidiaries (i) is in compliance with all Data Security Requirements and (ii) has taken commercially reasonable steps consistent with standard industry practice by companies of similar size and maturity, and in compliance in all material respects with all Data Security Requirements to protect (A) the confidentiality, integrity, availability and security of its Business Systems that are involved in the Processing of Personally Identifiable Information, in the conduct of the business of the Company and its Subsidiaries as currently conducted; and (B) Personally Identifiable Information Processed by or on behalf of the Company or such Subsidiary or on their behalf from unauthorized use, access, disclosure, theft and modification. Except as would not, individually or in the aggregate, reasonably be expected to be material to the business of the Company Group, taken as a whole, (i) there are, and since January 1, 2022, have been, no pending complaints, investigations, inquiries, notices, enforcement proceedings, or Actions by or before any Governmental Authority and (ii) since January 1, 2022, no fines or other penalties have been imposed on or written claims, notice, complaints or other communications have been received by the Company or any Subsidiary, relating to any Specified Data Breach or alleging non-compliance with any Data Security Requirement. The Company and each of its Subsidiaries have not, since January 1, 2022, (1) experienced any Specified Data Breaches, or (2) been involved in any Legal Proceedings related to or alleging any violation of any Data Security Requirements by the Company Group or any Specified Data Breaches, each except as would not be material to the business of the Company Group, taken as a whole. The consummation of the transactions contemplated by this Agreement will not cause the Company Group to breach any Data Security Requirement, except as would not reasonably be expected to be material to the business of the Company Group, taken as a whole.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC ▇▇▇▇▇ Cyber-safety Policy, UC ▇▇▇▇▇ Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC ▇▇▇▇▇ computing systems and electronic data.