Patentability Protection Sample Clauses

Patentability Protection. University in writing must notify the Members of any occurrence that each then-current Consortium participant – upon receiving University’s Section V.C.1.a disclosure – has notified University that patent protection is desirable for the NMSU Invention.
AutoNDA by SimpleDocs

Related to Patentability Protection

  • Liability Protection Whenever an action or proceeding for damages is filed against any Bargaining Unit employee arising from his/her act or omission while performing his/her official duties, such employee(s) may request that the Attorney General defend the action or proceeding at the expense of the state. If the Attorney General determines that the employee was acting in good faith and within the course of his or her official duties, the Attorney General will defend the employee. If the body presiding over the action determines that the employee was acting within the scope of his or her official duties and enters a judgment against the employee, the judgment will be satisfied by the state.

  • Wetlands Protection Xxxxxxxx requiring protection under Executive Order 11990 are shown on Sale Area Map. Vehicular or skidding equipment shall not be used in such wetlands, except where roads, landings, and tractor roads are approved under B5.1 or B6.422. Additional measures needed to protect such areas are provided in C6.62.

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Hearing Protection Hearing protection devices that reduce noise exposure below 90 dba shall be worn in all posted high noise areas, when performing work that generates noise above 90 dba, or when required by CCI Management.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Whistle Blowing Protection The Employer agrees to adhere to the whistle blowing protection pursuant to the Long-Term Care Homes Act (LTCHA).

  • Identity Protection Law Grantee must have and maintain a formal written information security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to unauthorized persons, as required by the Oregon Consumer Information Protection Act, ORS 646A.600-646A.628. If Grantee or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600 – 628, (collectively, “Breach”) with respect to Confidential Information, Grantee must promptly but in any event within one calendar day (i) notify the Agency Grant Manager of such Breach and (ii) if the applicable Confidential Information was in the possession of Grantee or its agents at the time of such Breach, Grantee must (a) investigate and remedy the technical causes and technical effects of the Breach and (b) provide Agency with a written root cause analysis of the Breach and the specific steps Grantee will take to prevent the recurrence of the Breach or to ensure the potential Breach will not recur. For the avoidance of doubt, if Agency determines notice required of any such Breach to any individual(s) or entity(ies), Agency will have sole control over the timing, content, and method of such notice, subject to Grantee’s obligations under applicable law.

  • Patent or Copyright Protection The Consultant recognizes that certain proprietary matters or techniques may be subject to patent, trademark, copyright, license or other similar restrictions, and warrants that no work performed by The Consultant or its subcontractors will violate any such restriction.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes:

Time is Money Join Law Insider Premium to draft better contracts faster.