Protection and Security Sample Clauses

Protection and Security. The End User acknowledges that all techniques and processes contained in the SOFTWARE are Trade Secrets of STATCREW. The End User agrees to take all necessary steps to safeguard the SOFTWARE and to ensure that no unauthorized person shall have access to it and that no unauthorized copy of any part of it, in any form, shall be made.
AutoNDA by SimpleDocs
Protection and Security. During the Term of this Master Agreement, PeopleGuru shall maintain a formal security program materially in accordance with industry standards that is designed to: (a) ensure the security and integrity of Customer Data; (b) protect against threats or hazards to the security or integrity of Customer Data; and (c) prevent unauthorized access to Customer Data. Such security program will conform to PeopleGuru’s most recent annual SSAE 18 report, available upon Customer’s written request. In no event during the Term shall PeopleGuru’s security program use controls materially less protective than those provided in the PeopleGuru SSAE 18. Customer understands that its use of the Service and compliance with any terms hereunder does not constitute compliance with any Law. Customer understands that it has an independent duty to comply with any and all Laws applicable to it.
Protection and Security. You agree to use your best efforts and take all reasonable steps to safeguard the Licensed Materials to ensure that no unauthorized person shall have access thereto and that no unauthorized copy, publication, disclosure or distribution, in whole or in part, in any form shall be made. You acknowledge that the Licensed materials contain valuable, confidential information and trade secrets and that unauthorized use and/or copying are harmful to Software Patent Co.
Protection and Security a. Licensee agrees to afford Licensor proprietary information embodied in the Licensed Program the same degree of protection against unauthorized use or disclosure as Licensee normally provides for its own proprietary information, provided that Licensee's obligation hereunder shall not apply to information which (i) is known to Licensee at the time of disclosure by Licensor, (ii) is now or hereafter in the public domain through no fault of Licensee, (iii) is developed independently by Licensee, (iv) is generally known or available from third parties without restriction, and (v) is inadvertently disclosed by Licensee despite the same degree of protection against unauthorized use or disclosure which Licensee normally provides for its own proprietary information.
Protection and Security. The Licensee agrees to use reasonable endeavors to safeguard the Software to ensure that no unauthorized person has access to them and that there is no unauthorized copying or distribution of the Software or the license key(s).
Protection and Security. The terms and conditions applicable to the Card set out certain steps you must take to keep your account and Card details secure. These terms and conditions also apply to the use of your Card with Google Pay. For example, but not limited to, you must do all you reasonably can to: • not leave the Device unattended; • use appropriate security on the Device, such as passcodes, passwords, fingerprint recognition and other unlock methods; • if applicable, ensure you only register your own fingerprints and not anyone else’s; • keep your log in details, such as user ID, passwords, passcodes and any other means you have to access the Device or the information stored on it confidential; • use Google Pay in accordance with all applicable terms and conditions; • delete all your personal and financial information from your Device in case your Device is sold, discarded, destroyed or in any way, either physically or not, out of your reasonable control; • Contact us immediately in case your Device is stolen, lost or otherwise considered lost and/or you suspect any unauthorised use of your Device, or if your Device or security details have been compromised, lost or stolen. You should also suspend your Device by logging into your Google account.
Protection and Security. In the performance of this Agreement or in contemplation thereof, You and your employees and agents may have access to private or confidential information owned or controlled by Extreme relating to the Licensed Materials supplied hereunder including, but not limited to, product specifications and schematics, and such information may contain proprietary details and disclosures. All information and data so acquired by You or your employees or agents under this Agreement or in contemplation hereof shall be and shall remain Extreme’ exclusive property, and You shall use all commercially reasonable efforts to keep, and have your employees and agents keep, any and all such information and data confidential, and shall not copy, publish, or disclose it to others, without Extreme’ prior written approval, and shall return such information and data to Extreme at its request. Nothing herein shall limit your use or dissemination of information not actually derived from Extreme or of information which has been or subsequently is made public by Extreme, or a third party having authority to do so. You agree not to deliver or otherwise make available the Licensed Materials or any part thereof, including without limitation the object or source code (if provided) of the Licensed Software, to any party other than Extreme or its employees, except for purposes specifically related to your use of the Licensed Materials on a single computer as expressly provided in this Agreement, without the prior written consent of Extreme. You acknowledge that the Licensed Materials contain valuable confidential information and trade secrets, and that unauthorized use, copying and/or disclosure thereof are harmful to Extreme or its Affiliates and/or its/their software suppliers.
AutoNDA by SimpleDocs
Protection and Security. Koverse shall use commercially reasonable efforts to protect Customer Data against unauthorized access, disclosure or use of such Customer Data. Customer acknowledges and agrees that it is solely responsible for (a) the accuracy, quality, and legality of all Customer Data, (b) all changes, additions to, or deletions of Customer Data that are made using Customer’s passwords and other login credentials, (c) the security of all passwords and other login information required in order the access the Service, and (d) the security of all Customer Data sent to Koverse via unsecure or unencrypted methods. If Koverse processes Personal Data about Data Subjects (as those terms are defined in the Data Processing Exhibit), the Data Processing Exhibit attached as Exhibit B hereto and incorporated herein shall apply. Customer agrees that it will specify on the applicable Order when Customer Data will include Personal Data about Data Subjects.
Protection and Security. You agree to use your best efforts and take all reasonable steps to safeguard the License Materials to ensure that no unauthorized person has access to them and that non authorized copying, publication, disclosure, or distribution of any of the Licensed Material is made. You acknowledge that the Licensed Materials contain valuable, confidential, and trade secrets and that unauthorized use and copying are harmful to Digi-Star® and its software suppliers, and that you have the confidential obligation on such valuable information and trade secrets.
Protection and Security. 4.1 The End User shall use its best efforts and take all reasonable steps to safeguard its copy of the Licensed Content to ensure that no unauthorized reproduction, publication, disclosure, modification or distribution of the Licensed Content, in whole or in part, is made. To the extent that the End User becomes aware of any such unauthorized use of the Licensed Content, the End User shall immediately notify Cengage. Notification of such violations may be sent to Cengage Learning, Inc., 000 Xxxxx Xxxxxxxx Xxxxx, Xxxxxxxx, XX 00000, Attention: General Counsel.
Time is Money Join Law Insider Premium to draft better contracts faster.