Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.
Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/aupdetail.html • The UC Policy on Copyright Ownership: ▇▇▇▇://▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.
Diagnostic Services Procedures ordered by a recognized Provider because of specific symptoms to diagnose a specific condition or disease. Some examples include, but are not limited to:
Technology License 4.1 Unless any event described in Article 2.2 or 2.3 of this Agreement occurs, all of the technology required to be licensed for any of Party B’s business shall be provided by Party A on an exclusive basis. Party A will try its best to license Party B to use the technology owned by Party A, or re-license Party B to use the technology as approved by the owner. 4.2 The Parties shall negotiate with each other to enter into specific technology license contracts to expressly specify the detail matters such as the technology to be licensed, the method to license the technology, license fees and payment.
By Licensor Licensor will indemnify and hold harmless Licensee, and its respective members, managers, directors, officers, shareholders, employees, agents, representatives and Affiliates (collectively, the "Licensee Indemnified Parties"), on an After Tax Basis, from and against all claims, losses, damages (including loss of profits and consequential damages awarded to unrelated third parties, if any, but excluding loss of profits and consequential damages otherwise suffered by the Licensee Indemnified Parties), expenses, judgements, costs and liabilities (including reasonable attorneys' fees and costs) (collectively, "Losses") incurred by the Licensee Indemnified Parties arising from Licensor's breach of any obligation, representation or warranty contained in this Agreement, including any Losses resulting from any claim of infringement or misappropriation relating to Licensee's authorized use of the Trademarks, but excluding any Losses resulting from the use of any Trademark in a country where Licensor has not obtained a trademark registration relating to the Media, does not have a pending application for such registration or where a pending application is not sufficient, under the laws of such country, to permit the grant of licensed rights hereunder. Notwithstanding the foregoing, any claims for indemnification that Licensee Indemnified Parties may have pursuant to this Section 9.1 will exclude claims based on information known by BMI (or its Affiliates) as of the Funding Date, whether or not such information formed the basis of issues raised by BMI during Due Diligence (as defined in the Operating Agreement) and whether or not asserted prior to the Walk Away Notice (as defined in the Operating Agreement) or thereafter. In the event of a dispute regarding a claim for indemnification, the Licensee Indemnified Party will have the burden or proof in establishing the validity and amount of the claims and Licensor will have the burden or proof in establishing any defense to such claim, including but not limited to a defense asserted by Licensor that BMI (or its Affiliates) had knowledge of the requisite facts.