The IT contract is an important form of good service delivery, as well as a payment “airbag” for all services. Although the big data as a service agreement is not yet as popular as for example. B a software development contract (for more information on the risks of this agreement, please see this article), we recommend you refer to such a relationship management tool. They collect the data that collects the world. Reliable protection is the most powerful weapon. And it can be guaranteed by our lawyers! Don`t hesitate to contact them:) This data services agreement (this agreement) is entered into by and between UtilityAPI, Inc., a Delaware company located at 1212 Broadway, 16th Floor, Oakland, CA 94612 (“UtilityAPI”) and the company identified as the company that wishes to recover UtilityAPI`s data services (“Company”). This agreement applies from the date you activate a box with your consent under this Agreement (effective date). 5.3 Confidential information disclosed to the other party must be clearly identified. Written confidential information must be clearly identified in a place of identification, with a caption that identifies the information as confidential. Confidential information that is not written must be identified before, during or immediately after the presentation or communication. The recipient is not required to protect the confidential information known to the recipient without restriction prior to receipt by the discloser; (b) be available to the public without the recipient`s fault; (c) be received legally by the recipient by a third party, without any obligation of secrecy; or (d) regardless of the recipient. If confidential information is to be provided by law, court order or government authority, the recipient must immediately inform the Discloser of this obligation. The recipient uses confidential information only to maintain the relationship between the parties.
Confidential information cannot be disclosed to third parties without the discloser`s written consent. At the request of the Discloser, all written, recorded, graphic or other confidential information, including copies, must be returned to the Discloser or destroyed by the recipient. At the request of the Discloser, the recipient will confirm in writing that all confidential information that has not been returned to the Discloser has been destroyed. The recipient may use leftovers for any purpose, including use in sourcing, development, manufacturing, promotion, sale or maintenance of products and services; whether this right to remains does not constitute a licence in the context of the intellectual property and/or property rights of the public party. 3.3 The customer (and will not leave it to a third party): (a) decompile, decompiling, recompiling, reconstituting, refounding or otherwise extracting the source code from an encrypted or coded part of the software, in whole or in part, nor will the client track, decompile, decompil or identify the source code of the software, or encourage or authorize the software (except and in scope, (b) to sell, sublicensing, leasing, leasing, distributing, marketing or marketing the software for any use, including for time-sharing or service purposes, (c) create, develop, install, use or use software, access, permissions or rights that violate the technical limitations of the software`s , property rights, copyrights or other software initiative notices, (e) modifying or creating an encrypted or encrypted part of the software or any other part of the software, (f) publicly disseminating performance information or analysis, including, but not only, the results of calibration tests; (g) use the software with the exception of servers; or (h) change all property mentions that appear in the software or documentation.