Protection and Security Sample Clauses

Protection and Security. The End User acknowledges that all techniques and processes contained in the SOFTWARE are Trade Secrets of STATCREW. The End User agrees to take all necessary steps to safeguard the SOFTWARE and to ensure that no unauthorized person shall have access to it and that no unauthorized copy of any part of it, in any form, shall be made.
AutoNDA by SimpleDocs
Protection and Security. During the Term of this Master Agreement, PeopleGuru shall maintain a formal security program materially in accordance with industry standards that is designed to: (a) ensure the security and integrity of Customer Data; (b) protect against threats or hazards to the security or integrity of Customer Data; and (c) prevent unauthorized access to Customer Data. Such security program will conform to PeopleGuru’s most recent annual SSAE 18 report, available upon Customer’s written request. In no event during the Term shall PeopleGuru’s security program use controls materially less protective than those provided in the PeopleGuru SSAE 18. Customer understands that its use of the Service and compliance with any terms hereunder does not constitute compliance with any Law. Customer understands that it has an independent duty to comply with any and all Laws applicable to it.
Protection and Security. 5.1 Licensee agrees to afford Licensor proprietary information embodied in the Licensed Program the same degree of protection against unauthorized use or disclosure as Licensee normally provides for its own proprietary information, provided that Licensee's obligation hereunder shall not apply to information which (i) is known to Licensee at the time of disclosure by Licensor, (ii) is now or hereafter in the public domain through no fault of Licensee, (iii) is developed independently by Licensee, (iv) is generally known or available from third parties without restriction, and (v) is inadvertently disclosed by Licensee despite the same degree of protection against unauthorized use or disclosure which Licensee normally provides for its own proprietary information.
Protection and Security. You agree to use your best efforts and take all reasonable steps to safeguard the Licensed Materials to ensure that no unauthorized person shall have access thereto and that no unauthorized copy, publication, disclosure or distribution, in whole or in part, in any form shall be made. You acknowledge that the Licensed materials contain valuable, confidential information and trade secrets and that unauthorized use and/or copying are harmful to Software Patent Co.
Protection and Security. The Licensee agrees to use reasonable endeavors to safeguard the Software to ensure that no unauthorized person has access to them and that there is no unauthorized copying or distribution of the Software or the license key(s).
Protection and Security. The terms and conditions applicable to the Card set out certain steps you must take to keep your account and Card details secure. These terms and conditions also apply to the use of your Card with Apple Pay. For example, but not limited to, you must do all you reasonably can to: • not leave the Device unattended; • use appropriate security on the Device, such as passcodes, passwords, fingerprint recognition and other unlock methods; • if applicable, ensure you only register your own fingerprints and not anyone else’s; • keep your log in details, such as user ID, passwords, passcodes and any other means you have to access the Device or the information stored on it confidential; • use Apple Pay in accordance with all terms and conditions applicable; • delete all your personal and financial information from your Device in case your Device is sold, discarded, destroyed or in any way, either physically or not, out of your reasonable control; • Contact us as immediately in case your Device is stolen, lost or otherwise considered lost and/or you suspect any unauthorised use of your Device, or if your Device or security details have been compromised, lost or stolen. You should also suspend your Device by logging into your Apple account.
Protection and Security. Licensee acknowledges that information and materials disclosed or provided to Licensee pursuant to this Agreement may contain Intel trade secrets. Such trade secrets are protected by the provisions of the applicable nondisclosure agreement(s) between the parties. Licensee will not make MB-UDK or Derivative Works available in whole or in part or in any form, to any person other than Licensee's employees who are designated to work on Licensee's development effort authorized hereunder and who have a specific need for access to MB-UDK. Licensee agrees to instruct these employees of his or her obligations with respect to use, copying, protection, and security of MB-UDK and associated documentation. Notwithstanding the earlier termination of this Agreement, the obligations of this section are to remain in effect until the time as MB-UDK becomes publicly known, through no act or failure to act on Licensee's or Subsidiary’s part.
AutoNDA by SimpleDocs
Protection and Security. Koverse shall use commercially reasonable efforts to protect Customer Data against unauthorized access, disclosure or use of such Customer Data. Customer acknowledges and agrees that it is solely responsible for (a) the accuracy, quality, and legality of all Customer Data, (b) all changes, additions to, or deletions of Customer Data that are made using Customer’s passwords and other login credentials, (c) the security of all passwords and other login information required in order the access the Service, and (d) the security of all Customer Data sent to Koverse via unsecure or unencrypted methods. If Koverse processes Personal Data about Data Subjects (as those terms are defined in the Data Processing Exhibit), the Data Processing Exhibit attached as Exhibit B hereto and incorporated herein shall apply. Customer agrees that it will specify on the applicable Order when Customer Data will include Personal Data about Data Subjects.
Protection and Security. End User agrees to use its best efforts and to take all reasonable steps to safeguard the Software Product to ensure that no unauthorized person shall have access thereto and that no unauthorized copy, publication, disclosure or distribution in whole or in part, in any form, shall be made. You acknowledge that the Software Product contains valuable confidential information and trade secrets and that unauthorized use and copying are harmful to Genetec.
Protection and Security. You agree to use your best efforts and take all reasonable steps to safeguard the License Materials to ensure that no unauthorized person has access to them and that non authorized copying, publication, disclosure, or distribution of any of the Licensed Material is made. You acknowledge that the Licensed Materials contain valuable, confidential, and trade secrets and that unauthorized use and copying are harmful to Digi-Star® and its software suppliers, and that you have the confidential obligation on such valuable information and trade secrets.
Time is Money Join Law Insider Premium to draft better contracts faster.