Protection; Copies Sample Clauses

Protection; Copies. Owner shall take all reasonable means to protect the confidentiality of the DELTA-T TECHNOLOGY. In particular, but without limitation, Owner shall not (i) make copies of any document containing any of the DELTA-T TECHNOLOGY except to the extent reasonably necessary to use such technology as permitted under this Agreement, (ii) deliver any such documents to any government agency for any purpose without complying with any applicable law or regulation necessary to protect the confidentiality of the same, or (iii) remove, obliterate or fail to reproduce on any copy of any such document any and all copyright and confidentiality notices printed thereon. Except as described herein, Owner shall not be required to take any affirmative action to protect DELTA-T TECHNOLOGY from inspection by any governmental agencies, but it shall notify Delta-T of any such demand as soon as reasonably practical. In the event that Owner receives more than forty-eight (48) hours advance notice of any inspection by a governmental agency, Owner will immediately inform Delta-T of such notice, will inform such governmental agency of the confidential nature of the DELTA-T TECHNOLOGY and will request that such governmental agency agree to protect the confidential nature of the same (provided that Owner shall have no responsibility or liability for the failure of any such governmental agency to comply with such request).
AutoNDA by SimpleDocs
Protection; Copies. Owner shall take all reasonable means to protect the confidentiality of the Delta-T Technology. In particular, but without limitation, Owner shall not (i) make copies of any document containing any of the Delta-T Technology except to the extent reasonably necessary to use such technology as permitted under this License or the Prime Contract, (ii) deliver any such documents to any government agency for any purpose without complying with any applicable law or regulation necessary to protect the confidentiality of the same, or (iii) remove, obliterate or fail to reproduce on any copy of any such document any and all copyright and confidentiality notices printed thereon.

Related to Protection; Copies

  • Protection of Documents All documents, records and files, in any media of whatever kind and description, relating to the business, present or otherwise, of the Company or any of its Affiliates, and any copies, in whole or in part, thereof (the “Documents”), whether or not prepared by you shall be the sole and exclusive property of the Company. You agree to safeguard all Documents and to surrender to the Company, at the time your employment terminates or at such earlier time or times as the Committee or its designee may specify, all Documents then in your possession or control.

  • Protection of Developments The Contractor does hereby agree that, both before and after the termination of this Agreement, the Contractor shall perform such further acts and execute and deliver such further instruments, writings, documents and assurances (including, without limitation, specific assignments and other documentation which may be required anywhere in the world to register evidence of ownership of the rights assigned pursuant hereto) as the Company shall reasonably require in order to give full effect to the true intent and purpose of the assignment made under Section 5.3 hereof. If the Company is for any reason unable, after reasonable effort, to secure execution by the Contractor on documents needed to effect any registration or to apply for or prosecute any right or protection relating to the Developments, the Contractor hereby designates and appoints the Company and its duly authorized officers and agents as the Contractor’s agent and attorney to act for and in the Contractor’s behalf and stead to execute and file any such document and do all other lawfully permitted acts necessary or advisable in the opinion of the Company to effect such registration or to apply for or prosecute such right or protection, with the same legal force and effect as if executed by the Contractor.

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of Collateral All expenses of protecting, storing, warehousing, insuring, handling, maintaining and shipping any Collateral, all Taxes payable with respect to any Collateral (including any sale thereof), and all other payments required to be made by Agent to any Person to realize upon any Collateral, shall be borne and paid by Borrowers. Agent shall not be liable or responsible in any way for the safekeeping of any Collateral, for any loss or damage thereto (except for reasonable care in its custody while Collateral is in Agent’s actual possession), for any diminution in the value thereof, or for any act or default of any warehouseman, carrier, forwarding agency or other Person whatsoever, but the same shall be at Borrowers’ sole risk.

  • Preservation of Information; Communications to Holders (a) The Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of Holders contained in the most recent list furnished to the Trustee as provided in Section 7.1 and the names and addresses of Holders received by the Trustee in its capacity as Securities Registrar. The Trustee may destroy any list furnished to it as provided in Section 7.1 upon receipt of a new list so furnished.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Telephone Consumer Protection Act Consent Each Member expressly consents to receiving calls and messages, including auto-dialed and pre-recorded message calls, and SMS messages (including text messages) from the Administrator, its affiliates, agents and others calling at their request or on their behalf, at any telephone numbers that the Member has provided to the Company or Masterworks (including any cellular telephone numbers). Member’s cellular or mobile telephone provider will charge Member according to the type of plan Member carries. Any Member may unsubscribe from receiving text messages or promotional calls at any time by (i) replying STOP, STOPALL, UNSUBSCRIBE, CANCEL, END or QUIT to any text message such Member receives from the Company or Masterworks or (ii) email to sxxxxxx@Xxxxxxxxxxx.xx with one of the forgoing words in the subject line. Each Member acknowledges and consents that following such a request to unsubscribe, such Member may receive one final text message from Masterworks confirming such request.

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Communications and Computer Lines Tenant may install, maintain, replace, remove or use any communications or computer wires and cables (collectively, the “Lines”) at the Project in or serving the Premises, provided that (i) Tenant shall obtain Landlord’s prior written consent to the installation of any such Lines (such consent not to be unreasonably withheld), use an experienced and qualified contractor approved in writing by Landlord (such approval not to be unreasonably withheld), and comply with all of the other provisions of Articles 7 and 8 of this Lease, (ii) an acceptable amount of space for additional Lines shall be maintained for future occupants of the Project, as determined in Landlord’s reasonable opinion, (iii) the Lines (including riser cables) shall be appropriately insulated to prevent excessive electromagnetic fields or radiation, and shall be surrounded by a protective conduit reasonably acceptable to Landlord, (iv) any Lines servicing the Premises shall comply with all Applicable Laws, (v) as a condition to permitting the installation of new Lines, Landlord may require that Tenant remove existing Lines located in or serving the Premises that will no longer be used by Tenant and repair any damage in connection with such removal, and (vi) Tenant shall pay all costs in connection therewith. Landlord reserves the right to require that Tenant remove any Lines located in or serving the Premises which are installed in violation of these provisions, or which are at any time in violation of any Applicable Laws or represent a dangerous or potentially dangerous condition. Upon the expiration of the Lease Term, or immediately following any earlier termination of this Lease, Tenant shall, at Tenant’s sole cost and expense, remove all Lines installed by Tenant, and repair any damage caused by such removal.

Time is Money Join Law Insider Premium to draft better contracts faster.