Additional Products and Services Subject to the allocation of funds, the CPO may add similar equipment, supplies, services, or locations, within the scope of this Agreement, to the list of equipment, supplies, services, or locations to be performed or provided by giving written notification to Contractor. For purposes of this Section, the “Effective Date” means the date specified in the notification from the CPO. As of the Effective Date, each item added is subject to this Agreement, as if it had originally been a part, but the charge for each item starts to accrue only on the Effective Date. In the event the additional equipment, supplies, services, or locations are not identical to the items(s) already under this Agreement, the charges therefor will then be Contractor’s normal and customary charges or rates for the equipment, supplies, services, or locations classified in the Fees and Costs (Exhibit “F”).
Other Products and Services As our customer, you have access to a suite of financial products and services availed by ourselves, our affiliates and strategic partners designed to help you address and achieve your financial needs and goals. You agree that you can obtain information about such Products and Services via our website xxx.xxxxxxxx.xxx.xx and you further agree that we can from time to time communicate information in relation to such Products or Services to you specifically or generally to all cardmembers via such communication mode as we consider appropriate.
Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.
Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.
Sublicense to Use the Scudder Trademarks As exclusive licensee of the rights to use anx xxxxxcense the use of the "Scudder," "Scudder Investments" and "Scudder, Stevens & Clark, Inx." xxxdemaxxx (xxgether, the "Scuddex Xxxxx"), xxx xerexx xxant the Trust a nonexclusive right xxx xxxlicense to use (i) the "Scudder" name and mark as part of the Trust's name (the "Fund Namx"), xxd (ii) the Scudder Marks in connection with the Trust's investment products xxx xxxvices, in each case only for so long as this Agreement, any other investment management agreement between you or any organization which shall have succeeded to your business as investment manager ("your Successor") and the Trust, or any extension, renewal or amendment hereof or thereof remains in effect, and only for so long as you are a licensee of the Scudder Marks, provided however, that you agree to use your best xxxxxxx to maintain your license to use and sublicense the Scudder Marks. The Trust agrees that it shall have no right to suxxxxxxxe or assign rights to use the Scudder Marks, shall acquire no interest in the Scudder Marks othxx xxxx the rights granted herein, that all of txx Xxxxt's uses of the Scudder Marks shall inure to the benefit of Scudder Trust Company xx xxxer and licensor of the Scudder Marks (xxx "Xrademark Owner"), and that the Trust shall nxx xxxxlenge the validity of the Scudder Marks or the Trademark Owner's ownership thereof. The Truxx xxxxher agrees that all services and products it offers in connection with the Scudder Marks shall meet commercially reasonable standards of duaxxxx, xs may be determined by you or the Trademark Owner from time to time, provided that you acknowledge that the services and products the Trust rendered during the one-year period preceding the date of this Agreement are acceptable. At your reasonable request, the Trust shall cooperate with you and the Trademark Owner and shall execute and deliver any and all documents necessary to maintain and protect (including but not limited to in connection with any trademark infringement action) the Scudder Marks and/or enter the Trust as a registered user thereof. Xx xxch time as this Agreement or any other investment management agreement shall no longer be in effect between you (or your Successor) and the Trust, or you no longer are a licensee of the Scudder Marks, the Trust shall (to the extent that, and as soon ax, xx xawfully can) cease to use the Fund Name or any other name indicating that it is advised by, managed by or otherwise connected with you (or your Successor) or the Trademark Owner. In no event shall the Trust use the Scudder Marks or any other name or mark confusingly similar therexx (xxxluding, but not limited to, any name or mark that includes the name "Scudder") if this Agreement or any other investment advisory agrexxxxx xetween you (or your Successor) and the Fund is terminated.
Marking of Licensed Products To the extent commercially feasible and consistent with prevailing business practices, Company shall xxxx, and shall cause its Affiliates and Sublicensees to xxxx, all Licensed Products that are manufactured or sold under this Agreement with the number of each issued patent under the Patent Rights that applies to such Licensed Product.
Products and Services General Information
New Products You agree to comply with NASD Notice to Members 5-26 recommending best practices for reviewing new products.
Use of FIIOC’s and FSC's Name The Trust shall not use the name of FIIOC and FSC in any Prospectus, sales literature or other material relating to the Trust or any Fund of the Trust in a manner not consented to by FIIOC and FSC prior to use; provided, however, that FIIOC and FSC shall approve all uses of its name which merely refer in accurate terms to its appointments, duties or fees hereunder or which are required by the Securities and Exchange Commission ("SEC" or “Commission”) or a state securities commission; and further, provided that in no event shall such approval be unreasonably withheld.
Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.