Modes of exploitation Sample Clauses

Modes of exploitation. In accordance with paragraph 1, 2 and 3, Article 10, the Agency shall acquire ownership of each of the results produced as an outcome of this contract which may be used for any of the following purposes:
AutoNDA by SimpleDocs
Modes of exploitation. All reports, data, materials, analysis and other discoveries produced within this Contract and for which the rights vest in the Union and thereby the Union has acquired the ownership in accordance with Article II.10 may be used in the following way:
Modes of exploitation. All studies, analysis, materials, reports, dramatic, musical, cinematographic or other artistic work, broadcasts, designs, drawings, website layout or content, computations, documented data, database format and data, methods of creation produced within this Contract and for which the rights vest in the SJU and thereby the SJU has acquired the ownership in accordance with Article II.10 may be used in the following way: [i) distribution: • publishing in paper copies • publishing in electronic form as downloadable/non-downloadable file • making available on internet • broadcasting • public presentation or display • communication through a press information services, • inclusion in widely accessible databases or indexes • in any form and by any method existing at this date and in the future • giving access on individual requests without right to reproduce or exploit, as provided for by Regulation 1049/2001 regarding public access to European Parliament, Council and SJU documents
Modes of exploitation. The ETF shall acquire ownership of each of the results produced as an outcome of this Contract which may be used for any of the following purposes:
Modes of exploitation. All media analysis reports and summaries of media items produced within this Contract and for which the rights vest in the Union and thereby the Union has acquired the ownership in accordance with Article II.10 may be used in the following way:
Modes of exploitation. All studies/analysis /materials/reports or scientific work, designs, computations, documented data, database format and data, methods of creation, discoveries produced within this Contract and for which the rights vest in EIGE and thereby EIGE has acquired the ownership in accordance with Article II.10 may be used in the following way:
Modes of exploitation. Fusion for Energy shall acquire ownership of each of the Results produced as an outcome of this Contract.
AutoNDA by SimpleDocs

Related to Modes of exploitation

  • Exploitation (i) Exploitation of intellectual property may take the form of patenting by the originator singly or in combination with other agencies.

  • SEXUAL EXPLOITATION 22.1 The Contractor shall take all appropriate measures to prevent sexual exploitation or abuse of anyone by it or by any of its employees or any other persons who may be engaged by the Contractor to perform any services under the Contract. For these purposes, sexual activity with any person less than eighteen years of age, regardless of any laws relating to consent, shall constitute the sexual exploitation and abuse of such person. In addition, the Contractor shall refrain from, and shall take all appropriate measures to prohibit its employees or other persons engaged by it from, exchanging any money, goods, services, offers of employment or other things of value, for sexual favors or activities, or from engaging in any sexual activities that are exploitive or degrading to any person. The Contractor acknowledges and agrees that the provisions hereof constitute an essential term of the Contract and that any breach of this representation and warranty shall entitle UNDP to terminate the Contract immediately upon notice to the Contractor, without any liability for termination charges or any other liability of any kind.

  • New Products You agree to comply with NASD Notice to Members 5-26 recommending best practices for reviewing new products.

  • Products Products available under this Contract are limited to Software, including Software as a Service, products and related products as specified in Appendix C, Pricing Index. Vendor may incorporate changes to their product offering; however, any changes must be within the scope of products awarded based on the posting described in Section 1.B above. Vendor may not add a manufacturer’s product line which was not included in the Vendor’s response to the solicitation described in Section 1.B above.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Licensed Products Lessee will obtain no title to Licensed Products which will at all times remain the property of the owner of the Licensed Products. A license from the owner may be required and it is Lessee's responsibility to obtain any required license before the use of the Licensed Products. Lessee agrees to treat the Licensed Products as confidential information of the owner, to observe all copyright restrictions, and not to reproduce or sell the Licensed Products.

  • End User License Agreement This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. xxxx://xxxxxxxxxxxxxxx.xxx/licenses/by-nc-nd/3.0/ You are free to: Share: to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work).

  • Licensed Materials The materials that are the subject of this Agreement are set forth in Appendix A ("Licensed Materials").

  • Third Party Products and Services Through its Product(s), Palo Alto Networks may make available to you third-party products or services (“third-party apps”) which contain features designed to interoperate with our Products. To use such features, you must either obtain access to such third-party apps from their respective providers or permit Palo Alto Networks to obtain access on your behalf. All third-party apps are optional and if you choose to utilize such third-party apps:

Time is Money Join Law Insider Premium to draft better contracts faster.