RIGHT TO COPY, PROTECTION AND SECURITY Sample Clauses

RIGHT TO COPY, PROTECTION AND SECURITY. 4.1 Software provided hereunder may be copied (for back-up purposes only) in whole or in part, in machine-readable form for Clearwire's internal use only, provided, however, that no more than two (2) printed copies and two (2) machine-readable copies will be in existence at any one time without the prior written consent of Motorola, other than copies resident in the System Configuration.
AutoNDA by SimpleDocs
RIGHT TO COPY, PROTECTION AND SECURITY. 5.1. Software provided hereunder may be copied (for back-up purposes and disaster recovery only) in whole or in part, in printed or machine- readable form for Customer's internal use only, provided, however, that no more than two (2) printed copies and two (2) machine-readable copies (other than copies electronically resident in Products) shall be in existence at any one time `Without the prior written consent of Seller.
RIGHT TO COPY, PROTECTION AND SECURITY. 4.1 The Software provided by Motorola Solutions may be copied (for back-up purposes only) in whole or in part, in printed or machine-readable form for the Licensee’s internal use only, provided, however, that no more than two (2) printed copies and two (2) machine-readable copies will be in existence at any one time without the prior written consent of Motorola Solutions, other than copies resident in the System.
RIGHT TO COPY, PROTECTION AND SECURITY. 5.1 Software provided hereunder may be copied (for back-up purposes only) in whole or in part, in printed or machine-readable form for Customer's internal use only, provided, however, that no more than three (3) printed copies and three (3) machine-readable copies shall be in existence at any one time without the prior written consent of Seller, other than copies electronically resident in SpotLight Systems.
RIGHT TO COPY, PROTECTION AND SECURITY a. LICENSEE agrees to reproduce any LICENSOR copyright notice, and other proprietary legend in the Software and to include the same on all copies of the Software it makes in whole or in part. The LICENSOR copyright notice may appear in any of several forms, including machine readable form within the Software, and LICENSEE agrees to reproduce such notice in each form in which it appears.

Related to RIGHT TO COPY, PROTECTION AND SECURITY

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Contract. Contractor shall be responsible for complying with the District’s rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • Health, Safety and Security 22.2.1 The University and the Association agree to promote safe, secure and healthy working conditions and procedures, and to encourage Members to adopt and follow sound health, safety and security procedures in the performance of their work.

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • UNION RECOGNITION AND SECURITY 3.1 The Employer recognizes the Union as the sole bargaining authority for all employees covered by this Agreement and coming within the jurisdiction of the Union. The Union recognizes that the Association is the sole bargaining authority for all subcontractors of the Employer covered by this Agreement and coming within the jurisdiction of the Union.

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Identification and Disclosure of Privacy and Security Offices Business Associate and Subcontractors shall provide, within ten (10) days of the execution of this agreement, written notice to the Covered Entity’s contract/grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer. This information must be updated any time either of these contacts changes.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

Time is Money Join Law Insider Premium to draft better contracts faster.