Exploitation of single Foregrounds Sample Clauses

Exploitation of single Foregrounds. In general terms, the Project Partner that generates the Foreground is its owner, and it is therefore free to commercially exploit it to its best, without involving any other project partner. However, it may happen that Foreground is the result of the participation of different project partners. In case it is possible to define the specific piece of Foreground pertaining to each project partner participating to the creation of Foreground, each participant remains the owner of that specific piece. In contrast, if it is impossible to distinguish the individual contribution provided by the participant project partners, then the Foreground is subject to joint ownership of all the project partners who provide contribution in generating the Foreground. In some cases, the ownership percentage might be defined taking into consideration the criteria of the efforts deployed by the relevant partners (e.g. Person Months) for the specific task giving rise to the Foreground. According to this default joint ownership regime, each partner that participates to the creation of joint Foreground is entitled to use the jointly owned Foreground on a royalty-free basis, without the need to obtain prior consent of the other participating partners. In addition, each participating partner is entitled to grant non-exclusive licenses to third parties, without any right to sub-license, provided the following conditions are fulfilled: • the participant Project Partner shall provide the others with at least 45 days prior notice; and • the participant Project Partner shall provide the others with fair and reasonable compensation.
AutoNDA by SimpleDocs

Related to Exploitation of single Foregrounds

  • SEXUAL EXPLOITATION 22.1 The Contractor shall take all appropriate measures to prevent sexual exploitation or abuse of anyone by it or by any of its employees or any other persons who may be engaged by the Contractor to perform any services under the Contract. For these purposes, sexual activity with any person less than eighteen years of age, regardless of any laws relating to consent, shall constitute the sexual exploitation and abuse of such person. In addition, the Contractor shall refrain from, and shall take all appropriate measures to prohibit its employees or other persons engaged by it from, exchanging any money, goods, services, offers of employment or other things of value, for sexual favors or activities, or from engaging in any sexual activities that are exploitive or degrading to any person. The Contractor acknowledges and agrees that the provisions hereof constitute an essential term of the Contract and that any breach of this representation and warranty shall entitle UNDP to terminate the Contract immediately upon notice to the Contractor, without any liability for termination charges or any other liability of any kind.

  • Exploitation (i) Exploitation of intellectual property may take the form of patenting by the originator singly or in combination with other agencies.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Foreground Regarding Foreground, EC-GA Article II.26. - Article II.29. shall apply with the following additions:

  • Return of Materials Pertaining to Work Product Upon the request of Customer, but in any event upon termination or expiration of this Contract or a Statement of Work, Vendor shall surrender to Customer all documents and things pertaining to the Work Product, including but not limited to drafts, memoranda, notes, records, drawings, manuals, computer software, reports, data, and all other documents or materials (and copies of same) generated or developed by Vendor or furnished by Customer to Vendor, including all materials embodying the Work Product, any Customer confidential information, or Intellectual Property Rights in such Work Product, regardless of whether complete or incomplete. This section is intended to apply to all Work Product as well as to all documents and things furnished to Vendor by Customer or by anyone else that pertain to the Work Product.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • SOURCE CODE ESCROW FOR LICENSED PRODUCT If Source Code or Source Code escrow is offered by either Contractor or Product manufacturer or developer to any other commercial customers, Contractor shall either: (i) provide Licensee with the Source Code for the Product; or (ii) place the Source Code in a third party escrow arrangement with a designated escrow agent who shall be named and identified to the State, and who shall be directed to release the deposited Source Code in accordance with a standard escrow agreement acceptable to the State; or (iii) will certify to the State that the Product manufacturer/developer has named the State, acting by and through the Authorized User, and the Licensee, as a named beneficiary of an established escrow arrangement with its designated escrow agent who shall be named and identified to the State and Licensee, and who shall be directed to release the deposited Source Code in accordance with the terms of escrow. Source Code, as well as any corrections or enhancements to such source code, shall be updated for each new release of the Product in the same manner as provided above and such updating of escrow shall be certified to the State in writing. Contractor shall identify the escrow agent upon commencement of the Contract term and shall certify annually that the escrow remains in effect in compliance with the terms of this clause. The State may release the Source Code to Licensees under this Contract who have licensed Product or obtained services, who may use such copy of the Source Code to maintain the Product.

  • Distribution of Materials You will keep an accurate record of the names and addresses of all persons to whom you give copies of the Registration Statement, the Prospectus, any Preliminary Prospectus (or any amendment or supplement thereto) or any Offering Circular or any Preliminary Offering Circular and, when furnished with any subsequent amendment to the Registration Statement, any subsequent Prospectus, any subsequent Offering Circular or any memorandum outlining changes in the Registration Statement or any Prospectus or Offering Circular, you will, upon request of the Manager, promptly forward copies thereof to such persons.

  • Manufacture 2.1. The LED(s) on the LED module shall be equipped with suitable fixation elements.

  • Specific Restrictions on Use of Licensed Materials Unauthorized Use. Licensee shall not knowingly permit anyone other than Authorized Users to use the Licensed Materials.

Time is Money Join Law Insider Premium to draft better contracts faster.