Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.
Internationalized Domain Names (IDNs) Registry Operator may offer registration of IDNs at the second and lower levels provided that Registry Operator complies with the following requirements:
Use of Intellectual Property The Adviser grants to the Sub-Adviser a sublicense to use the trademarks, service marks, logos, names, or any other proprietary designations of the Adviser (“AdvisorShares Marks”) on a non-exclusive basis. The Sub-Adviser will acquire no rights in the AdvisorShares Marks, and all goodwill of the AdvisorShares Marks shall inure to and remain with the Adviser. The Sub-Adviser agrees that neither it, nor any of its affiliates, will knowingly in any way refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates or use AdvisorShares Marks in offering, marketing or other promotional materials without the prior express written consent of the Adviser, which approval will not be unreasonably withheld or delayed, except as required by rule, regulation or upon the request of a governmental authority. Notwithstanding the forgoing, the Sub-Adviser and its affiliates may, without obtaining the Adviser’s prior approval, refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates and use AdvisorShares Marks in offering, marketing or other promotional materials provided that such materials were previously approved by the Adviser and remain in substantially the same form.
E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.
Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.
Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.
INTELLECTUAL PROPERTY RIGHTS - DATA RIGHTS A. Data produced under this Annex which is subject to paragraph C. of the Intellectual Property Rights - Data Rights Article of the Umbrella Agreement will be protected for the period of one year.
Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.