CERTIFICATION OF NO ASBESTOS CONTAINING MATERIALS OR WORK 8.1 The Contractor shall be responsible for ensuring that no asbestos containing materials or work is included within the scope of the Work. The Contractor shall take whatever measures it deems necessary to insure that all employees, suppliers, fabricators, material men, subcontractors, or their assigns, comply with this requirement.
Services, Materials, and Equipment Unless otherwise specified, the Contractor shall provide and assume full responsibility for all services, materials, equipment, labor, transportation, construction equipment and machinery, tools, appliances, fuel, power, light, heat, telephone, water, sanitary facilities, temporary facilities, and all other facilities, incidentals, and services necessary for the construction, performance, testing, start-up, inspection and completion of the Work.
COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).
COMPUTER SOFTWARE The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.
Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.
Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.
Background Intellectual Property Notwithstanding and superseding anything to the contrary in this ARTICLE 14, each Party retains title to all Intellectual Property Rights owned or possessed by it or any of its affiliates prior to or independent of performance of this Agreement and used by it in fulfilling its obligations under this Agreement, as well as any modifications or improvements made thereto in the course of performing this Agreement (“Background IP”). To the extent that one Party acquires any right, title, or interest in and to any aspect of the modifications or improvements to the Background IP of the other Party, such first Party shall assign such right, title, and interest to the second Party, immediately following such acquisition. If any of the Supplier’s Background IP is included in or required to use the Documentation provided by the Supplier to the City, the Supplier hereby grants to the City an irrevocable, perpetual, fully paid-up, royalty-free, worldwide, transferable and non-exclusive licence (including the right to sub-licence only to members of the City’s Group) to, itself and through contractors and agents, use, copy, amend, reproduce, modify, create derivative works of, use, commercialize, and otherwise exploit the Supplier’s Background IP but only to the extent required to use such Documentation for the purpose (or any reasonably inferred purpose) for which it has been provided or for the provision of the Supply under this Agreement (excluding any software source code).
Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.
COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.
Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.