Restricted Use of Third Party Trademarks Sample Clauses

Restricted Use of Third Party Trademarks. If you do choose to create your own marketing imagery, in addition to the policies outlined in Section 5.4, you must also not use trademark-protected names, phrases, or logos of third parties or other brands. As a general matter, use of another party’s trademark-protected words, phrases, symbols or designs, or a combination thereof that identifies and distinguishes the source of the goods or services of one party from those of others is not permitted without the consent of such party. Even if you feel you obtained images from a credible source, your use of such image can still be in violation of another party’s rights. In order to avoid creating personal liability issues for yourself as well as for Stella & Dot, you must be extremely cautious about this issue when creating your own marketing materials.
AutoNDA by SimpleDocs
Restricted Use of Third Party Trademarks. If you do choose to create your own marketing imagery, you may not use trademark-protected names, phrases, or logos of third parties or other brands, and it must be in compliance with all S&D policies on trademark usage.

Related to Restricted Use of Third Party Trademarks

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Restricted Use by Licensee Except as expressly authorized by the terms of license, Licensee shall not:

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • Restricted Use By Third Parties Third parties retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: (i) Licensee gives notice to Contractor of such third party, Site of intended use of the Product, and means of access; and (ii) such third party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement, which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and (iii) such third party maintains a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non- Disclosure Agreement create or impose any liabilities on the State or Licensee.

  • Patent/Copyright Materials/Proprietary Infringement Unless otherwise expressly provided in this Contract, Contractor shall be solely responsible for clearing the right to use any patented or copyrighted materials in the performance of this Contract. Contractor warrants that any software as modified through services provided hereunder will not infringe upon or violate any patent, proprietary right or trade secret right of any third party. Contractor agrees that, in accordance with the more specific requirement contained in paragraph 18 below, it shall indemnify, defend and hold County and County Indemnitees harmless from any and all such claims and be responsible for payment of all costs, damages, penalties and expenses related to or arising from such claim(s), including, but not limited to, attorney’s fees, costs and expenses.

  • Use of Intellectual Property The Adviser grants to the Sub-Adviser a sublicense to use the trademarks, service marks, logos, names, or any other proprietary designations of the Adviser (“AdvisorShares Marks”) on a non-exclusive basis. The Sub-Adviser will acquire no rights in the AdvisorShares Marks, and all goodwill of the AdvisorShares Marks shall inure to and remain with the Adviser. The Sub-Adviser agrees that neither it, nor any of its affiliates, will knowingly in any way refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates or use AdvisorShares Marks in offering, marketing or other promotional materials without the prior express written consent of the Adviser, which approval will not be unreasonably withheld or delayed, except as required by rule, regulation or upon the request of a governmental authority. Notwithstanding the forgoing, the Sub-Adviser and its affiliates may, without obtaining the Adviser’s prior approval, refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates and use AdvisorShares Marks in offering, marketing or other promotional materials provided that such materials were previously approved by the Adviser and remain in substantially the same form.

  • Restricted Uses Without limiting the unsupported or prohibited use cases identified in the Stripe Identity Permitted Businesses list, you must not, and must not enable or allow any other party to:

  • Use of Third Parties Except as may be expressly agreed to in writing by the State Entity, Contractor shall not subcontract, assign, delegate or otherwise permit anyone other than Contractor or Contractor's personnel to perform any of Contractor's obligations under this Contract or any of the work subsequently assigned under this Contract. No subcontract which Contractor enters into with respect to performance of obligations or work assigned under the Contract shall in any way relieve Contractor of any responsibility, obligation or liability under this Contract and for the acts and omissions of all subcontractors, agents, and employees. All restrictions, obligations and responsibilities of the Contractor under the Contract shall also apply to the subcontractors. Any contract with a subcontractor must also preserve the rights of the State Entity. The State Entity shall have the right to request the removal of a subcontractor from the Contract for good cause.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

Time is Money Join Law Insider Premium to draft better contracts faster.