Unauthorized Use of Licensed Materials Sample Clauses

Unauthorized Use of Licensed Materials. If Licensee learns of any manufacture, distribution, sale or advertisement by a third party of any product or service that is of the same general type or class as the Licensed Products and that is marketed or distributed using confusingly similar marks as the Marks, Licensee will promptly notify Friday’s in writing of the actions of such third party. Licensee shall not commence or pursue any action or proceeding against any third party alleging infringement, breach or unauthorized use of the Licensed Materials without the prior written consent of Friday’s. Friday’s shall have the sole right to determine whether any action is necessary or desirable to protect the Licensed Materials. Friday’s shall have the sole right to determine the appropriate action to be taken against any such infringement, imitation, unauthorized use, improper registration of, or improper attempt to register the Proprietary Marks, including the sole discretion to settle any claims or any controversy arising out of any such claims. Licensee, upon written request by Friday’s, shall cooperate with Friday’s in any such action or proceeding. Except as set forth below, Licensee shall not have any rights against Friday’s for damages or otherwise by reason of any determination by Friday’s not to act with respect to any alleged infringement, imitation or unauthorized use by others of the Licensed Materials and/or the Licensed Products; nor shall any such determination of Friday’s affect the validity or enforceability of this Agreement. Any and all damages or settlements recovered in any action or proceeding shall belong solely and exclusively to Friday’s, unless otherwise agreed to in writing by Friday’s.
AutoNDA by SimpleDocs
Unauthorized Use of Licensed Materials 

Related to Unauthorized Use of Licensed Materials

  • Unauthorized Use If either Party becomes aware or has knowledge of any unauthorized use or disclosure of the other Party’s Confidential Information, it shall promptly notify the disclosing Party of such unauthorized use or disclosure.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Licensed Software Section 3.17(f).......................................27

  • Authorized Use of Trademarks Any required consent and authorization has been obtained for the use of any trademark or service xxxx in any advertising and supplemental sales literature or other materials delivered by the Company to the Dealer Manager or approved by the Company for use by the Dealer Manager and, to the Company’s knowledge, its use does not constitute the unlicensed use of intellectual property.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Marking of Licensed Products To the extent commercially feasible and consistent with prevailing business practices, Company shall xxxx, and shall cause its Affiliates and Sublicensees to xxxx, all Licensed Products that are manufactured or sold under this Agreement with the number of each issued patent under the Patent Rights that applies to such Licensed Product.

  • No Improper Use of Materials During his or her employment with the Company, Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom Employee has an obligation of confidentiality, and Employee will not bring onto the premises of the Company any unpublished documents or any property belonging to any former employer or any other person to whom Employee has an obligation of confidentiality unless consented to in writing by that former employer or person.

  • Licensed Technology The term "Licensed Technology" shall mean the ------------------- Licensed Patents, plus all improvements thereto developed by Licensor, and all related data, know-how and technology.

  • Proprietary Materials Money Manager shall provide to RIMCo the following Proprietary Materials as requested: • Photographs of Portfolio Manager(s)—please provide a professionally taken color (business) headshot in portrait format. This can be provided as a 5x7 print or 300ppi resolution (or higher) Mac or PC electronic file. • Background/Biographical—please include an approved three to four sentence description of your firm, as well as a 100 word or less biography of each portfolio manager that works on a Xxxxxxx portfolio. Please make sure to identify the lead portfolio manager for each portfolio. • Logos (Trademarks)—please provide us with a 300ppi resolution (or higher) electronic Mac or PC file, preferably an .eps or in its original format—Adobe Photoshop, Freehand, or Illustrator. Include any footnote information and identity guidelines you would like included when we make use of your trademark. Please send these materials along with the appropriate marketing contact information such as their name, email address and phone number to: Xx. Xxxxxxx Xxxxxxx c/x Xxxxxxx Design Group Xxxxxxx Investment Group P.O. Box 1616 Tacoma, WA 98401-1616 U.S.A. Email Address: xxxxxxxx@xxxxxxx.xxx

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

Time is Money Join Law Insider Premium to draft better contracts faster.