NMAP TECHNOLOGY SELECTIONS Sample Clauses

NMAP TECHNOLOGY SELECTIONS. For the purposes of this Agreement, Nmap Technology describes the permitted Nmap integration methods and scanning techniques chosen for this license. They are marked in the next two subsections. All integration methods and scanning techniques are described in Schedule 1.

Related to NMAP TECHNOLOGY SELECTIONS

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate Covista’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. Covista shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/aupdetail.html • The UC Policy on Copyright Ownership: ▇▇▇▇://▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.