Access Transfer Sample Clauses

Access Transfer. Should the single computer or hosting server, on which the Licensed Material is installed, be out of order, or replaced, during the Password validity period, the Customer can obtain a new Password for installation of the Licensed Material on another single computer or hosting server of the Customer, subject to the payment of a transfer fee and after having certified, in writing to Materialise, that the previous computer or hosting server is no longer in use by the Customer. Materialise shall waive the transfer fee if the Customer has a valid maintenance agreement at the time of the requested transfer. Materialise End-User License Agreement (version 2020)
AutoNDA by SimpleDocs

Related to Access Transfer

  • Data Transfer 11.1 The Processor may not transfer or authorize the transfer of Data to countries outside the EU and/or the European Economic Area (EEA) without the prior written consent of the Company. If personal data processed under this Agreement is transferred from a country within the European Economic Area to a country outside the European Economic Area, the Parties shall ensure that the personal data are adequately protected. To achieve this, the Parties shall, unless agreed otherwise, rely on EU approved standard contractual clauses for the transfer of personal data.

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

  • Global Access Transport Charges (U S. Bridged): Per-minute per-bridge port usage charges, based on availability of service, zone and origination access type. Bridging charges are additional and are priced at Customer's applicable Toll Meet Meet-Me Access rate per minute. Freephone (IFN) Transport Zone A – G. Discounts:

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • FUND TRANSFER FACILITIES VIA TBS The Account Holder may apply, in accordance with the Bank’s prescribed procedure then prevailing and the Bank may, in its reasonable discretion, permit the Account Holder to operate such fund transfer facilities via the TBS, including without limitation, GIRO or direct debit banking system as may be made available by the Bank from time to time. The Account Holder acknowledges that the operation of such fund transfer facilities shall be subject to the relevant terms and conditions governing such facilities.

  • PROMOTION AND TRANSFER 9:1 Employees may file requests, in writing, for promotion to the Working Xxxxxxx classification or for a Employees may file requests, in writing, for promotion to the Working Xxxxxxx classification or for a transfer to a new location in their present classification with the Office of the Company. Whenever a vacancy occurs, the Company will, before filling such vacancy, first give consideration to such requests and the following factors being sufficient give preference on the basis of seniority.

  • TRANSFER OF RIGHTS IN THE PROPERTY This Security Instrument secures to Lender (i) the repayment of the Loan, and all renewals, extensions, and modifications of the Note, and (ii) the performance of Borrower’s covenants and agreements under this Security Instrument and the Note. For this purpose, Borrower irrevocably grants and conveys to Trustee, in trust, with power of sale, the following described property located in the ___________________________________ of _________________________________: [Type of Recording Jurisdiction] [Name of Recording Jurisdiction] which currently has the address of__________________________________________________ [Street] _____________________________, Washington ___________________ (“Property Address”); [City] [Zip Code] TOGETHER WITH all the improvements now or subsequently erected on the property, including replacements and additions to the improvements on such property, all property rights, including, without limitation, all easements, appurtenances, royalties, mineral rights, oil or gas rights or profits, water rights, and fixtures now or subsequently a part of the property. All of the foregoing is referred to in this Security Instrument as the “Property.” BORROWER REPRESENTS, WARRANTS, COVENANTS, AND AGREES that: (i) Borrower lawfully owns and possesses the Property conveyed in this Security Instrument in fee simple or lawfully has the right to use and occupy the Property under a leasehold estate; (ii) Borrower has the right to grant and convey the Property or Borrower’s leasehold interest in the Property; and (iii) the Property is unencumbered, and not subject to any other ownership interest in the Property, except for encumbrances and ownership interests of record. Borrower warrants generally the title to the Property and covenants and agrees to defend the title to the Property against all claims and demands, subject to any encumbrances and ownership interests of record as of Loan closing. THIS SECURITY INSTRUMENT combines uniform covenants for national use with limited variations and non-uniform covenants that reflect specific Washington state requirements to constitute a uniform security instrument covering real property. UNIFORM COVENANTS. Borrower and Lender covenant and agree as follows:

  • Software Transfer You may permanently transfer all of your rights under this XXXX, provided you retain no copies, you transfer all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades, this XXXX, and, if applicable, the Certificate of Authenticity), and the recipient agrees to the terms of this XXXX. If the SOFTWARE PRODUCT is an upgrade, any transfer must include all prior versions of the SOFTWARE PRODUCT.

  • License Transfer You may not transfer the software to a third party without Microsoft’s prior written consent. If permitted, there may be additional charges for transferring the software to a third party.

Time is Money Join Law Insider Premium to draft better contracts faster.