Use of Client Property Sample Clauses

Use of Client Property. Client may, but is not required to (unless provided otherwise in a Statement of Work), provide certain hardware, software, data, databases, office space, security access or other materials, intellectual property, technologies or services to Contractor in connection with this Agreement (“Client Property”). Client grants Contractor a non-exclusive, non-transferable license to use the Client Property solely for Client’s benefit in connection with Contractor’s performance of the Services. Contractor shall not reverse engineer or decompile the Client Property or other computer programs, algorithms, techniques, processes, methods, know-how or other related technology supplied by Client. Client may terminate this license at any time, without cause, on written notice to Contractor. Unless specifically authorized in a Statement of Work, Contractor will use the Client Property only in the form provided by Client, without modification. In addition, Contractor will maintain and use Client Property in accordance with any written instructions and/or specifications provided by Client. Except for the limited license provided in this Section 5.4, nothing contained in this Agreement will be construed as granting Contractor any right, title, or interest in or to any of the Client Property.
AutoNDA by SimpleDocs
Use of Client Property. Subject to the terms and conditions of this Agreement, Client hereby grants Consultant an irrevocable, non- exclusive, fully-paid right and license to use any Client Property for the purpose of providing Services during the Term of this Agreement. Consultant may also retain or modify Client Intellectual Property such as documentation or passwords for the purpose of providing Services; such Property will be held in escrow and be released by Consultant by Consultant’s decision or under the provisions of Section 6.4. Same shall apply to any additional Agreements or Statements of Work.

Related to Use of Client Property

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • Proprietary Property All modeling algorithms, tools, computer programs, know-how, methodologies, processes, technologies, ideas, concepts, skills, routines, subroutines, operating instructions and other materials and aides used in performing the duties set forth in Section 2.02 that relate to advice regarding current and potential Assets, and all modifications, enhancements and derivative works of the foregoing.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • Use of Proprietary Information Officer recognizes that Corporation possesses a proprietary interest in all of the information described in Section 6 and has the exclusive right and privilege to use, protect by copyright, patent or trademark, manufacture or otherwise exploit the processes, ideas and concepts described therein to the exclusion of Officer, except as otherwise agreed between Corporation and Officer in writing. Officer expressly agrees that any products, inventions, discoveries or improvements made by Officer, his agents or affiliates based on or arising out of the information described in Section 6 shall be (i) deemed a work made for hire under the terms of United States Copyright Act, 17 U.S.C. § 101 et seq., and Corporation shall be the owner of all such rights with respect thereto and (ii) the property of and inure to the exclusive benefit of Corporation.

  • Use of Confidential Information The parties agree that during the term of this Agreement and thereafter, Confidential Information is to be used solely in connection with satisfying their obligations pursuant to this Agreement, and that a party shall neither disclose Confidential Information to any third party, nor use Confidential Information for its own benefit, except as may be necessary to perform its obligations pursuant to this Agreement or as expressly authorized in writing by the other party, as the case may be. Neither party shall disclose any Confidential Information to any other persons or entities, except on a “need to know” basis and then only: (i) to their own employees and Agents (as defined below); (ii) to their own accountants and legal representatives, provided that any such representatives shall be subject to subsection(iv) below; (iii) to their own affiliates, provided that such affiliates shall be restricted in use and redisclosure of the Confidential Information to the same extent as the parties hereto. “Agents”, for purposes of this Section, mean each of the parties’ advisors, directors, officers, employees, contractors, consultants affiliated entities (i.e., an entity controlling, controlled by, or under common control with a party), or other agents. If and to the extent any Agent of the recipient receive Confidential Information, such recipient party shall be responsible for such Agent’s full compliance with the terms and conditions of this Agreement and shall be liable for any such Agent’s non-compliance.

  • Restricted Use of Confidential Information (a) Each Receiving Party acknowledges the confidential and proprietary nature of the Confidential Information of the Disclosing Party and agrees that such Confidential Information (i) shall be kept confidential by the Receiving Party; (ii) shall not be used for any reason or purpose other than to evaluate and consummate the Contemplated Transactions; and (iii) without limiting the foregoing, shall not be disclosed by the Receiving Party to any Person, except in each case as otherwise expressly permitted by the terms of this Agreement or with the prior written consent of an authorized representative of Seller with respect to Confidential Information of Seller(each, a "Seller Contact") or an authorized representative of Buyer with respect to Confidential Information of Buyer (each, a "Buyer Contact"). Each of Buyer and Seller shall disclose the Confidential Information of the other party only to its Representatives who require such material for the purpose of evaluating the transactions contemplated herein and are informed by Buyer or Seller, as the case may be, of the obligations of this Article 12 with respect to such information. Each of Buyer and Seller shall (iv) enforce the terms of this Article 12 as to its respective representatives; (v) take such action to the extent necessary to cause its representatives to comply with the terms and conditions of this Article 12; and (vi) be responsible and liable for any breach of the provisions of this Article 12 by it or its representatives.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Proprietary Data NASDAQ OMX grants to Subscriber a nonexclusive, non-transferable license during the term of the Agreement to receive and use the Information transmitted to it by Distributor and thereafter, to use such Information as permitted under the terms of this Agreement and/or the NASDAQ OMX Requirements. Subscriber acknowledges and agrees that NASDAQ OMX has proprietary rights to the Information that originates on or derives from markets regulated or operated by NASDAQ OMX, and compilation or other rights to Information gathered from other sources. Subscriber further acknowledges and agrees that NASDAQ OMX 's third-party information providers have exclusive proprietary rights to their respective Information. In the event of any misappropriation or misuse by Subscriber or anyone who accesses the Information through Subscriber, NASDAQ OMX or its third-party information providers shall have the right to obtain injunctive relief for its respective materials. Subscriber will attribute source as appropriate under all the circumstances.

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.

Time is Money Join Law Insider Premium to draft better contracts faster.