Protection of Technological Measures Sample Clauses

Protection of Technological Measures. 1. Each Party shall provide adequate legal protection against the circumvention of any effective technological measures, which the person concerned carries out in the knowledge, or with reasonable grounds to know, that he is pursuing that objective.
AutoNDA by SimpleDocs
Protection of Technological Measures. The Parties shall comply with the provisions of Article 11 of the WCT and Article 18 of the WPPT.
Protection of Technological Measures. 1. Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of any effective technological measures (41) that are used by authors, performers or producers of phonograms in connection with the exercise of their rights in, and that restrict acts in respect of, their works, performances, and phonograms, which are not authorised by the authors, the performers or the producers of phonograms concerned or permitted by domestic law (42).

Related to Protection of Technological Measures

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Protection of Third Parties No person (including a purchaser) dealing with the Collateral Agent or a Receiver or its or his agents will be concerned to enquire:

  • PROTECTION OF TEACHERS A. The Board recognizes its responsibility to give all reasonable support and assistance to teachers with respect to the maintenance of control and discipline in the classroom.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Protection of Trade Secrets The Executive agrees to maintain in strict confidence and, except as necessary to perform his duties for the Employer, the Executive agrees not to use or disclose any Trade Secrets of the Employer during or after his employment. “Trade Secret” means information, including a formula, pattern, compilation, program, device, method, technique, process, drawing, cost data or customer list, that: (i) derives economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

  • Protection of Intellectual Property Rights (a) (i) Protect, defend and maintain the validity and enforceability of its Intellectual Property; (ii) promptly advise Bank in writing of material infringements or any other event that could reasonably be expected to materially and adversely affect the value of its Intellectual Property; and (iii) not allow any Intellectual Property material to Borrower’s business to be abandoned, forfeited or dedicated to the public without Bank’s written consent.

  • Protection of Legal Rights of Third Parties Registry Operator must specify, and comply with, the processes and procedures for launch of the TLD and initial registration-­‐related and ongoing protection of the legal rights of third parties as set forth Specification 7 attached hereto (“Specification 7”). Registry Operator may, at its election, implement additional protections of the legal rights of third parties. Any changes or modifications to the process and procedures required by Specification 7 following the Effective Date must be approved in advance by ICANN in writing. Registry Operator must comply with all remedies imposed by ICANN pursuant to Section 2 of Specification 7, subject to Registry Operator’s right to challenge such remedies as set forth in the applicable procedure described therein. Registry Operator shall take reasonable steps to investigate and respond to any reports from law enforcement and governmental and quasi-­‐governmental agencies of illegal conduct in connection with the use of the TLD. In responding to such reports, Registry Operator will not be required to take any action in contravention of applicable law.

  • Use of Intellectual Property The Adviser grants to the Sub-Adviser a sublicense to use the trademarks, service marks, logos, names, or any other proprietary designations of the Adviser (“AdvisorShares Marks”) on a non-exclusive basis. The Sub-Adviser will acquire no rights in the AdvisorShares Marks, and all goodwill of the AdvisorShares Marks shall inure to and remain with the Adviser. The Sub-Adviser agrees that neither it, nor any of its affiliates, will knowingly in any way refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates or use AdvisorShares Marks in offering, marketing or other promotional materials without the prior express written consent of the Adviser, which approval will not be unreasonably withheld or delayed, except as required by rule, regulation or upon the request of a governmental authority. Notwithstanding the forgoing, the Sub-Adviser and its affiliates may, without obtaining the Adviser’s prior approval, refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates and use AdvisorShares Marks in offering, marketing or other promotional materials provided that such materials were previously approved by the Adviser and remain in substantially the same form.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

Time is Money Join Law Insider Premium to draft better contracts faster.