Third Party Materials The Application may display, include, or make available third-party content (including data, information, applications, and other products, services, and/or materials) or provide links to third-party websites or services, including through third- party advertising ("Third-Party Materials"). You acknowledge and agree that Company is not responsible for Third-Party Materials, including their accuracy, completeness, timeliness, validity, copyright compliance, legality, decency, quality, or any other aspect thereof. Company does not assume and will not have any liability or responsibility to you or any other person or entity for any Third-Party Materials. Third-Party Materials and links thereto are provided solely as a convenience to you, and you access and use them entirely at your own risk and subject to such third parties' terms and conditions.
Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.
Collaboration 31.1 If the Buyer has specified in the Order Form that it requires the Supplier to enter into a Collaboration Agreement, the Supplier must give the Buyer an executed Collaboration Agreement before the Start date. 31.2 In addition to any obligations under the Collaboration Agreement, the Supplier must: 31.2.1 work proactively and in good faith with each of the Buyer’s contractors 31.2.2 co-operate and share information with the Buyer’s contractors to enable the efficient operation of the Buyer’s ICT services and G-Cloud Services
Licensee “Licensee” means the individual or company that has entered into an Agreement with the Embassy. “Offer” means a response to a solicitation that, if accepted, would bind the offeror to perform the resultant Agreement.
Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.
MIDDLE SCHOOLS 1. Where there are no negotiated provisions concerning the implementation or operation of a middle school program, this article shall govern the implementation or operation of a middle school program in a school district. 2. Should the employer seek to establish a middle school program in one or more schools in a district, the employer and the local shall meet, no later than ten (10) working days from a decision of the employer to implement a middle school program, in order to negotiate any alternate or additional provisions to the Collective Agreement which are necessary to accommodate the intended middle school program. 3. In the absence of any other agreement with respect to the instructional day and preparation time, the provisions of the Collective Agreement with regard to secondary schools shall apply to middle schools. 4. If the employer and the local are unable to agree on what, if any, alternate or additional provisions of the collective agreement are necessary to accommodate the intended middle school program(s), either party may refer the matter(s) in dispute to expedited arbitration for final and binding resolution pursuant to Article D.5.5 below. a. The jurisdiction of the arbitrator shall be limited to the determination of alternate or additional provisions necessary to accommodate the intended middle school program(s). b. In the event the arbitration is not concluded prior to the implementation of the middle school program, the arbitrator will have remedial authority to make appropriate retroactive modifications and adjustments to the agreement. c. The arbitration shall convene within thirty (30) working days of referral to arbitration in accordance with the following: i. Within ten (10) working days of the matter being referred to arbitration, the parties shall identify all issues in dispute; ii. Within a further five (5) working days, there shall be a complete disclosure of particulars and documents; iii. Within a further five (5) working days, the parties shall exchange initial written submissions; iv. The hearing shall commence within a further ten (10) working days; and v. The arbitrator shall render a final and binding decision within fifteen (15) working days of the arbitration concluding. 6. Where a middle school program has been established on or prior to ratification of the 2006-2011 Provincial Collective Agreement, the existing provisions shall be retained unless the parties mutually agree that they should be amended.
Third Party Vendors Nothing herein shall impose any duty upon DST in connection with or make DST liable for the actions or omissions to act of the following types of unaffiliated third parties: (a) courier and mail services including but not limited to Airborne Services, Federal Express, UPS and the U.S. Mails, (b) telecommunications companies including but not limited to AT&T, Sprint, MCI and other delivery, telecommunications and other such companies not under the party’s reasonable control, and (c) third parties not under the party’s reasonable control or subcontract relationship providing services to the financial industry generally, such as, by way of example and not limitation, the National Securities Clearing Corporation (processing and settlement services), Fund custodian banks (custody and fund accounting services) and administrators (blue sky and Fund administration services), and national database providers such as Choice Point, Acxiom, TransUnion or Lexis/Nexis and any replacements thereof or similar entities, provided, if DST selected such company, DST shall have exercised due care in selecting the same. Such third party vendors shall not be deemed, and are not, subcontractors for purposes of this Agreement.
Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.
Smoke Detectors At Owner's expense, smoke detectors will be installed on the Property in working condition in accordance with the law prior to the tenant's occupancy. During the occupancy, it shall be the tenant's responsibility to maintain all smoke detectors. Owner will replace smoke detector equipment as needed.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.