Acceptable Use of Deliverables Sample Clauses

Acceptable Use of Deliverables. You shall use the Deliverables only as permitted herein and in accordance with applicable laws and government regulations.
AutoNDA by SimpleDocs

Related to Acceptable Use of Deliverables

  • Rejection of Deliverables The Department reserves the right to reject deliverables, as outlined in the Grant Work Plan, as incomplete, inadequate, or unacceptable due, in whole or in part, to Xxxxxxx’s lack of satisfactory performance under the terms of this Agreement. The Grantee’s efforts to correct the rejected deliverables will be at Xxxxxxx’s sole expense. Failure to fulfill the applicable technical requirements or complete all tasks or activities in accordance with the Grant Work Plan will result in rejection of the deliverable and the associated invoice. Payment for the rejected deliverable will not be issued unless the rejected deliverable is made acceptable to Department in accordance with the Agreement requirements. The Department, at its option, may allow additional time within which Grantee may remedy the objections noted by Department. The Grantee’s failure to make adequate or acceptable deliverables after a reasonable opportunity to do so shall constitute an event of default.

  • OWNERSHIP AND USE OF DELIVERABLES The City shall own all rights, titles, and interests throughout the world in and to the deliverables.

  • Acceptance of Deliverables The State’s Project Manager shall be responsible for the sign-off acceptance of all Deliverables required and performed/submitted pursuant to this Agreement. Upon successful completion of a Deliverable, Contractor shall provide the State’s Project Manager with a completed Acceptance and Signoff Form (Exhibit E). The State’s Project Manager will apply the standards established in Exhibit D and the acceptance criteria set forth in subparagraph B of this article, as appropriate, to determine the acceptability of the Deliverable provided by Contractor. If the State’s Project Manager rejects the Deliverable, the parties agree to any dispute(s) resulting from such rejection(s) will be resolved as set forth in this article. Acceptance Criteria for Deliverables (“Criteria”) provided by Contractor pursuant to this Agreement include: Timeliness: The Work was provided on time; according to schedule; Completeness: The Deliverable contained all of the, Data, Materials, and features required by the Agreement; and Technical accuracy: The Deliverable complied with the standards of this Agreement, or, if this Agreement lacks a standard for provision of the Work, the currently generally accepted industry standard. Contractor shall provide the Deliverable to the State, in accordance with direction from the Project Manager and as provided for in Exhibit D. The State shall accept the Deliverable, provided that Contractor has delivered the Deliverable in accordance with the Criteria. The State’s Project Manager shall assign the Acceptance and Signoff Form to notify Contractor of the Deliverable’s acceptability. If the State rejects the Deliverable provided, the State’s Project Manager shall submit to Contractor’s Project Manager a written rejection describing in detail the failure of the Deliverable as measured against the Criteria. If the State rejects the Deliverable, then Contractor shall have a period of ten (10) Business Days from receipt of the Notice of rejection to correct the stated failure(s) to conform to the Criteria.

  • Description of Deliverables The Contractor shall Perform as set forth in Exhibit A.

  • Acceptable Use Agreement I understand that I must use school ICT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the ICT systems and other users. I will, where possible, educate the young people in my care in the safe use of ICT and embed E-Safety in my work with young people including my ‘Prevent’ duty. For my professional and personal safety: • I understand that the school will monitor my use of the ICT systems, email and other digital communications. • I understand that the rules set out in this agreement also apply to use of school ICT systems (e.g. laptops, email, VLE etc.) out of school, and to the transfer of personal data (digital or paper based) out of school • I understand that the school ICT systems are intended for educational use and that I will only use the systems for personal or recreational use within the policies and rules set down by the school. • I will not disclose my username or password to anyone else, nor will I try to use any other person’s username and password. I understand that I should not write down or store a password where it is possible that someone may steal it. • I will immediately report any illegal, inappropriate or harmful material or incident, I become aware of, to the appropriate person.  Will report damaged equipment to the ICT support staff and will not attempt to repair any damage. I will be professional in my communications and actions when using school ICT systems: • I will not access, copy, remove or otherwise alter any other user’s files, without their express permission. • I will ensure that when I take and / or publish images of others I will do so with their permission and in accordance with the school’s policy on the use of digital / video images. If my personal device is used to record images this should be transferred to school systems and deleted from my device as soon as is practicable • I will only use chat and social networking sites in school in accordance with the school’s policies. • I will only communicate with students / pupils and parents / carers using official school systems. • I will not engage in any on-line activity that may compromise my professional responsibilities or be harmful to the reputation of the school. The school and the local authority have the responsibility to provide safe and secure access to technologies and ensure the smooth running of the school: • I will not use personal email addresses when communicating with pupils and parents. • I will not try to upload, download or access any materials which are illegal (including but not restricted to child sexual abuse images, criminally racist material, adult pornography covered by the Obscene Publications Act) or inappropriate or may cause harm or distress to others. I will not try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials. • I will not install or attempt to install programmes of any type on a machine, or store programmes on a computer and understand that all software should be appropriately licenced. • I will not disable or cause any damage to school equipment, or the equipment belonging to others. • Where digital personal data is transferred outside the secure local network, it must be encrypted. • I understand that the GDPR policy requires that any staff or student / pupil data to which I have access, will be kept private and confidential. • I will immediately report any damage or faults and loss of data to an appropriate person. I understand that I am responsible for my actions in and out of the school: • I understand that this Acceptable Use Agreement applies not only to my work and use of school ICT equipment in school, but also applies to my use of school ICT systems and equipment off the premises and my use of personal equipment on the premises or in situations related to my employment by the school • I understand that if I fail to comply with this Acceptable Use Agreement, I could be subject to disciplinary action. I have read and understand the above and agree to use the school ICT systems (both in and out of school) and my own devices (in school and when carrying out communications related to the school) within these guidelines. Staff / Volunteer Name Signed

  • WARRANTY – DELIVERABLES The Contractor warrants and represents that all deliverables sold the City under the Contract shall be free from defects in design, workmanship or manufacture, and conform in all material respects to the specifications, drawings, and descriptions in the Solicitation, to any samples furnished by the Contractor, to the terms, covenants and conditions of the Contract, and to all applicable State, Federal or local laws, rules, and regulations, and industry codes and standards. Unless otherwise stated in the Solicitation, the deliverables shall be new or recycled merchandise, and not used or reconditioned.

  • Acceptable Uses a. An Authorized Licensee User runs and uses the Model through the AnyLogic Software (i.e. on a computer where the AnyLogic Software is installed) manually, not via any kind of remote interface. This is an acceptable use regardless whether the Model was developed using the same installation of the AnyLogic Software or not, by the same Authorized Licensee User or not, or by the same Licensee or not. In this case, the Authorized Licensee User is also the End User.

  • Deliverables Upon satisfactory completion of the work authorization, the Engineer shall submit the deliverables as specified in the executed work authorization to the State for review and acceptance.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Contract Deliverables The Contractor shall provide information technology staff augmentation services, including comprehensive management of staff, as set forth in this Contract. The term “staff” refers to the temporary staff provided by the Contractor to render information technology services identified by Customers, but that staff shall not be deemed an employee of the State or deemed to be entitled to any benefits associated with such employment. Contracts resulting from this solicitation should not be structured as fixed-price agreements or used for any services requiring authorization for payment of milestone tasks. Contractor shall only provide information technology staff augmentation services for those Job Titles awarded to the Contractor and shall be paid on an hourly basis. The Department’s intent is for Contractor’s information technology staff to provide services closely related to those described in the Job Family Descriptions document. Detailed scopes of work, specific requirements of the work to be performed, and any requirements of staff shall be provided by the Customer in a Request for Quote. The Contractor shall possess the professional and technical staff necessary to allocate, outsource, and manage qualified information technology staff to perform the services requested by the Customer. The Contractor shall provide Customers with staff who must have sufficient skill and experience to perform the services assigned to them. All of the information technology staff augmentation services to be furnished by the Contractor under the Contract shall meet the professional standards and quality that prevails among information technology professionals in the same discipline and of similar knowledge and skill engaged in related work throughout Florida under the same or similar circumstances. The Contractor shall provide, at its own expense, training necessary for keeping Contractor’s staff abreast of industry advances and for maintaining proficiency in equipment and systems that are available on the commercial market. The Contractor shall be responsible for the administration and maintenance of all employment and payroll records, payroll processing, remittance of payroll and taxes, and all administrative tasks required by state and federal law associated with payment of staff. The Contractor shall, at its own expense, be responsible for adhering to the Contract background screening requirements, testing, evaluations, advertising, recruitment, and disciplinary actions of Contractor’s information technology staff. The Contractor shall maintain during the term of the Contract all licenses, permits, qualifications, insurance and approvals of whatever nature that are legally required to perform the information technology staff augmentation services.

Time is Money Join Law Insider Premium to draft better contracts faster.