Agency ownership, to protect results Sample Clauses

Agency ownership, to protect results. 26.4.1 The Agency may — with the consent of the beneficiary — assume ownership of results to protect them, if the beneficiary intends — up to four years after the period set out in Article 3 — to disseminate its results without protecting them, except in any of the following cases:
AutoNDA by SimpleDocs
Agency ownership, to protect results. 26.4.1 The Agency may — with the consent of the beneficiary — assume ownership of results to protect them, if the beneficiary intends — up to four years after the period set out in Article 3 — to disseminate its results without protecting them, except in any of the following cases: (a) the lack of protection is because protecting the results is not possible, reasonable or justified (given the circumstances); (b) the lack of protection is because there is a lack of potential for commercial or industrial exploitation, or (c) the beneficiary intends to transfer the results to a third party established in an EU Member State or associated country, which will protect them. Before the results are disseminated and unless any of the cases above under Points (a), (b) or (c) applies, the beneficiary must formally notify the Agency and at the same time inform it of any reasons for refusing consent. The beneficiary may refuse consent only if it can show that its legitimate interests would suffer significant harm. If the Agency decides to assume ownership, it will formally notify the beneficiary within 45 days of receiving notification. No dissemination relating to these results may take place before the end of this period or, if the Agency takes a positive decision, until it has taken the necessary steps to protect the results. 26.4.2

Related to Agency ownership, to protect results

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

Time is Money Join Law Insider Premium to draft better contracts faster.