unregistered: (a) all patents, patentable inventions and other patent rights, including all reissues, divisions, divisionals, provisionals, continuations and continuations-in-part, renewals, extensions, reexaminations, utility models, design patents, certificates of invention and all documents and filings claiming priority to or serving as a basis for priority thereof, (b) all trademarks, service marks, trade names, service names, brand names, trade dress rights, logos, designs, corporate names, trade styles and other source or business identifiers, together with the goodwill associated with any of the foregoing, (c) all copyrights, copyrightable works, works of authorship and all other rights corresponding thereto, (d) all computer programs and other software, firmware and middleware, including software implementations of algorithms, models, and methodologies, whether in source code, object code or other form, including libraries, subroutines and other components thereof, together with input and output formats, (e) all trade secrets, know-how, industrial designs, business methods, technical and business data, improvements, processes, techniques, manuals, blueprints, plans, procedures, subscriber lists, distributor lists, supplier lists, confidential information and proprietary information and rights (whether or not patentable, reduced to practice or subject to copyright or trade secret protection), (f) all Internet domain names, (g) all other intellectual property and proprietary rights of any kind, nature or description, and (h) all issuances, registrations, applications, extensions and renewals of any of the foregoing
1.07 Third Party Support and Warranty. The Performing Party hereby passes through to the Receiving Party, and Receiving Party will have the benefit of, all rights the Performing Party obtains under representations, warranties, service agreements and indemnities given by its third party service providers in connection with any Services provided by the Performing Party pursuant to this Agreement to the extent permitted by the applicable third party service providers. To the extent that such representations, warranties, service agreements and indemnities are not capable of being passed through by the Performing Party, upon written request by the Receiving Party, the Performing Party will take commercially reasonable actions requested by the Receiving Party to enforce such warranties, representations, service agreements, and indemnities on behalf of the Receiving Party.
1.08 IP License. Each Party hereby grants, and shall cause its Affiliates to grant, to the other Party and its Affiliates a worldwide, non-exclusive, non-transferable (except as provided in Section 5.03), non-sublicensable (except to service providers in connection with the provision or receipt of the Services, as applicable), royalty-free license (or sublicense, as applicable) under (a) the Intellectual Property owned by such Party or its Affiliates, and (b) any Intellectual Property owned by any third party and licensed to such Party or any of its Affiliates (subject to the receipt of any required consents from such third parties), in each case, solely to the extent required or useful to provide, receive or use the Services, as applicable, during the Term.
1.09 IT Systems. Each Party shall (and shall cause its respective agents, subcontractors, employees or representatives to): (a) not attempt to obtain access to, use, copy or interfere with any information technology systems of the other Party, or any data owned, used or processed by the other Party (including any personally identifiable information collected or in the possession of the other Party), except to the extent required to do so to provide or receive the Services; (b) maintain at least industry standard security measures in accordance with their written policies to protect the systems of the other Party to which it has access pursuant to this Agreement from access by unauthorized third parties, and from any “back door”, “time bomb”, “Trojan Horse”, “worm”, “drop dead device”, “virus” or other computer software routine intended or designed to disrupt, disable, harm or otherwise impede in any manner the operation of such systems; (c) not permit access or use of information technology systems of the other Party by a third party (other than the Performing Personnel) except as otherwise authorized by such other Party; (d) not disable, damage or erase or disrupt or impair the normal operation of the information technology systems of the other Party and (e) comply with the reasonable written security policies and procedures of the other Party (as may be updated from time to time in the ordinary course of business) that are provided to such Party and that such other Party considers reasonably necessary to protect their information technology systems, in each case, to the extent such policies are generally applicable and do not preclude or materially adversely impact the availability of Services agreed to be provided hereunder. Each Party shall reasonably cooperate with the other Party to investigate any possible data breaches or other incidents and to