Speech Data Clause Samples

The 'Speech Data' clause defines the terms under which speech-related data—such as audio recordings, transcripts, or voice samples—are collected, used, and managed within the agreement. Typically, this clause outlines the types of speech data involved, the purposes for which the data may be processed (such as improving speech recognition technologies), and any restrictions on sharing or storing such data. Its core practical function is to ensure both parties understand their rights and obligations regarding speech data, thereby protecting privacy and clarifying data usage boundaries.
POPULAR SAMPLE Copied 1 times
Speech Data. To assess the labeling conventions of K-ToBI and to demonstrate that these conventions are applicable to various types of speech, we selected twenty utterances representing five different discourse types: TV drama, interview, news, text reading, and story reading. Four sentences were selected from each discourse type. These sentences contained a total of 153 words, and lasted a total of 78.5 seconds. 18 speakers (8 male and 10 female) produced the sentences. Table 1 shows a summary of the speech files: Twenty-one labelers, differing in their experience with intonation transcription and in their familiarity with the ToBI model, participated in the experiment. The labelers were divided into four groups: Group 1 (Experts), Group 2 (Familiar with K- ToBI), Group 3 (Familiar with the British intonation model, but new to K-ToBI and intonation transcription), and Group 4 (Beginners, completely new to any model of intonation or prosodic transcription). Each group included five labelers, except for Group 2 which had six labelers. The labelers came from four sites. Six of the labelers from Site A and all of the labelers from Site B and C were provided with 2-3 hours of lecture by the person in charge of each site during which the labeling conventions and background assumptions of K-ToBI were introduced. Site C had 4 hours of group discussion and a review session after the lecture. Two of the labelers from Site A and the one labeler from Site D performed their transcriptions based on the K-ToBI manual alone. Table 2 shows the distribution of labeler groups at each site. Sites # Experts (G1) # Familiar to K-ToBI (G2) # Familiar toother model (G3) # Beginners (G4) Discourse Types # of Utter- ances # of Words # of Speakers Total durat- ion (ms) interview 4 29 2 female 14,911 news 4 35 2 male, 2 female 16,869 reading 4 28 2 male, 2 female 15,849 story 4 30 2 male, 2 female 16,086 We selected 20 speech files from the data bank in Korea. The first author sent the following materials to the person in charge at each site: 1) the speech files in wave format, 2) the K-ToBI manual, version 3, together with the example sentence files mentioned in the manual, and 3) a Hangul file in which the sentences from each speech file were written in Hangul orthography with empty spaces below for writing tones and break indices. The wave files and the Hangul files for writing transcriptions were necessary because not all sites used the same speech analysis software (they ranged from xwaves ...
Speech Data. The audio recordings used were sourced from the JASMIN cor- pus [18]. The ▇▇▇▇▇▇ ▇▇▇▇▇▇ is a Dutch-Flemish corpus of read and extemporaneous speech collected from children, non- native speakers, and elderly people. Due to time restraints of the session in which the responses were collected, the ques- tionnaire was designed to be relatively short. Eight sentences were selected, each produced by a different non-native speaker of Dutch, aged between 11-17 years (Group 3 in the corpus). Second language (L2) learners were chosen as a reflection of the increasing diversity and multilingualism in society and schools. Furthermore, feedback on intelligibility is particularly benefi- cial for L2 learners. The sentences were extracted from recordings of children reading texts intended for L2 Dutch learners. The sentences were selected based on age-appropriateness for the listeners, in- telligibility, and the number and type of speech and/or reading errors, to produce a sample of sentences ranging in difficulty for each task. During selection the reader’s age, sex and read- ing level were also taken into account to try create a balanced sample. The sentences ranged from six to twelve words, except for one of twenty-one words (S5). 1▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/
Speech Data. If Client receives speech recognition services as part of the Epocrates EHR Service, Epocrates or its licensors may collect and use the audio files, associated transcriptions and log files provided by Authorized Users pursuant to this Agreement or generated in connection with the Epocrates EHR Service (“Speech Data”) to tune, enhance and improve the speech recognition and other components of the Epocrates EHR Service, and other services and products. In accepting the terms and conditions of this Agreement, Client acknowledges, consents and agrees that Epocrates and its licensors may collect the Speech Data as part of the Epocrates EHR Service and that such information shall only be used by Epocrates and its licensors, or third parties acting under the direction of Epocrates or its licensors pursuant to confidentiality agreements, to tune, enhance and improve the speech recognition and other components of the Epocrates EHR Service, and other services and products.
Speech Data. To assess the labeling conventions of K-ToBI and to demonstrate that these conventions are applicable to various types of speech, we selected twenty utterances representing five different discourse types: TV drama, interview, news, text reading, and story reading. Four sentences were selected from each discourse type. These sentences contained a total of 153 words, and lasted a total of 78.5 seconds. 18 speakers (8 male and 10 female) produced the sentences. Table 1 shows a summary of the speech files: Discourse Types # of Utter-ances # of Words # of Speakers Total durat- ion (ms) drama 4 31 2 male, 2 female 14,841 interview 4 29 2 female 14,911 news 4 35 2 male, 2 female 16,869 reading 4 28 2 male, 2 female 15,849 story 4 30 2 male, 2 female 16,086 Total 20 153 8 male, 10 female 78,556

Related to Speech Data

  • Product Data Illustrations, standard schedules, performance charts, instructions, brochures, diagrams, and other information furnished by Developer to illustrate a material, product, or system for some portion of the Work.

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • Licensee Data Licensee acknowledges and agrees that Licensee will be solely responsible for backing-up, and taking all appropriate measures to protect and secure, Licensee Data. Licensee acknowledges that Nuix may make, store and maintain back up copies of Licensee Data, but is not obliged to do so. Nuix will not be liable for any loss or corruption of Licensee Data.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Customer Data 5.1 The Customer shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. The customer being a contractor of DSA Airport, the customer shall not own the rights, title and interest in and to the Data which belongs to DSA Airport. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back- Up Policy available at ▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ or such other website address as may be notified to the Customer from time to time, as such document may be amended by the Supplier in its sole discretion from time to time. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties subcontracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy relating to the privacy and security of the Customer Data available at ▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ or such other website address as may be notified to the Customer from time to time, as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer acknowledges and agrees that the personal data may be transferred or stored outside the EEA or the country where the Customer and the Authorised Users are located in order to carry out the Services and the Supplier’s other obligations under this agreement; (b) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (c) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (d) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (e) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage.