Company Suggested Searches using Company Provided Keywords Sample Clauses

Company Suggested Searches using Company Provided Keywords. 3.1 Subject to the remainder of this clause 3, Company may implement on the Site certain text links consisting of suggested keywords which are provided by Company or a third party (subject to Company obtaining Google’s prior written approval of such third party such approval not to be unreasonably withheld or delayed) (“Company Provided Keywords”) and which generate Requests when clicked on by End Users. If Company wishes to use Company Provided Keywords that are provided by a third party it shall send a written request to Google (each a “Third Party Notice”) and Google shall provide Company with a written reply, either approving or rejecting Company’s request, within fifteen days of Google’s receipt of such Third Party Notice. In the event that Google does not send a reply to a Third Party Notice within fifteen days of Google’s receipt of such notice then Google shall be deemed to have given its approval to the Third Party Notice but Customer shall still be required to comply with all other provisions of this clause 3 including but not limited to clause 3.9. 3.2 Company shall ensure that all clicks by End Users on Company Provided Keywords generate Valid Requests: (i) which contain all of the relevant Company Provided Keyword(s) as presented to and clicked by the End User; and (ii) which are transmitted to Google in the manner specified by Google from time to time, without editing, filtering, truncating, appending terms to or otherwise modifying such Requests, either individually or in the aggregate. 3.3 Company may select the Company Provided Keywords using an automated or algorithmic mechanism which shall be subject to Google's approval ( such approval not to be unreasonably withheld or delayed). If Company wishes to select Company Provided Keywords using an automated or algorithmic mechanism it shall send a written request to Google (each an “ Automated Notice”) and Google shall provide Company with a written reply, either approving or rejecting Company’s request, within fifteen days of Google’s receipt of such Automated Notice. In the event that Google does not send a reply to a request within fifteen days of Google’s receipt of such Automated Notice then Google shall be deemed to have given its approval to the Automated Notice but Customer shall still be required to comply with all other provisions of this clause 3 including but not limited to clause 3.9. 3.4 Company shall ensure that 3.4.1 Company Provided Keywords are determined by objective measur...
AutoNDA by SimpleDocs
Company Suggested Searches using Company Provided Keywords. 9.1. Subject to the remainder of this clause 9, Company may implement on the Site certain text links consisting of suggested keywords (“Company Provided Keywords”) which are provided by Company and which generate Requests when clicked on by End Users. 9.2. Company shall ensure that all clicks by End Users on Company Provided Keywords generate Valid Requests: (i) which contain all of the relevant Company Provided Keyword(s) as presented to and clicked by the End User; and (ii) which are transmitted to Google in the manner specified by Google from time to time, without editing, filtering, truncating, appending terms to or otherwise modifying such Requests, either individually or in the aggregate. - 5 - Google Confidential AVG – ORDER FORM - EXECUTION 9.3. [***] 9.4. Company shall ensure that that Company Provided Keywords: 9.4.1. [***] 9.4.2. do not include any Google Brand Features; 9.4.3. do not contain or refer to any pornographic, hate-related or violent content or contain or refer to any other material, products or services that violate or encourage conduct that would violate any criminal laws, any other applicable laws, or any third party rights; 9.4.4. if Company Provided Keywords are related keywords, such keywords are relevant to the Request which generated the Results Page containing Search Results on which such Company Provided Keywords are displayed; 9.4.5. if Company Provided Keywords are popular keywords, then such keywords are derived from previous End User searches and arranged by popularity; if Company Provided Keywords are suggested keywords, then such keywords are relevant to the current text entered into the Search Box by the End User. 9.5. Google may from time to time require that particular words or terms are not used as Company Provided Keywords. 9.6. Google may prohibit the sending of Requests by Company using Company Provided Keywords or may refuse to serve Ads in response to Requests generated via Company Provided Keywords, if Google in its sole discretion determines that such feature or implementation is detrimental to Google and/or Google’s advertiser(s). 9.7. [***] 9.8. Company shall ensure that the implementation of such functionality is in accordance with the mock ups in Schedule B and that Company Provided Keywords are clearly labelled with the designation approved, or notified, by Google to Company from time to time. 9.9. Company may only put its implementation of Company Provided Keywords into live use once Google’s technica...

Related to Company Suggested Searches using Company Provided Keywords

  • Submitting Loop Makeup Service Inquiries 2.6.2.1 Comcast Phone may obtain LMU information by submitting a mechanized LMU query or a Manual LMUSI. Mechanized LMUs should be submitted through BellSouth's OSS interfaces. After obtaining the Loop information from the mechanized LMU process, if Comcast Phone needs further Loop information in order to determine Loop service capability, Comcast Phone may initiate a separate Manual Service Inquiry for a separate nonrecurring charge as set forth in Exhibit A of this Attachment. 2.6.2.2 Manual LMUSIs shall be submitted according to the guidelines in the LMU CLEC Information Package, incorporated herein by reference, as it may be amended from time to time, which can be found at the following BellSouth website: xxxx://xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/guides/html/unes.html . The service interval for the return of a Manual LMUSI is three (3) business days. Manual LMUSIs are not subject to expedite requests. This service interval is distinct from the interval applied to the subsequent service order.

  • Certification as Small Contractor or Minority Business Enterprise This paragraph was intentionally left blank.

  • Convicted, Discriminatory, Antitrust Violator, and Suspended Vendor Lists In accordance with sections 287.133, 287.134, and 287.137, F.S., the Contractor is hereby informed of the provisions of sections 287.133(2)(a), 287.134(2)(a), and 287.137(2)(a), F.S. For purposes of this Contract, a person or affiliate who is on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List may not perform work as a contractor, supplier, subcontractor, or consultant under the Contract. The Contractor must notify the Department if it or any of its suppliers, subcontractors, or consultants have been placed on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List during the term of the Contract. In accordance with section 287.1351, F.S., a vendor placed on the Suspended Vendor List may not enter into or renew a contract to provide any goods or services to an agency after its placement on the Suspended Vendor List. A firm or individual placed on the Suspended Vendor List pursuant to section 287.1351, F.S., the Convicted Vendor List pursuant to section 287.133, F.S., the Antitrust Violator Vendor List pursuant to section 287.137, F.S., or the Discriminatory Vendor List pursuant to section 287.134, F.S., is immediately disqualified from Contract eligibility.

  • Certified and Minority Business Enterprises Reports Upon Customer request, the Contractor shall report to the requesting Customer the Contractor’s spend with certified and other minority business enterprises in the provision of commodities or services related to the Customer’s orders. These reports shall include the period covered, the name, minority code, and Federal Employer Identification Number of each minority business utilized during the period; commodities and services provided by the minority business enterprise, and the amount paid to each minority business enterprise on behalf of the Customer.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.

  • Presentation of Potential Target Businesses The Company shall cause each of the Initial Shareholders to agree that, in order to minimize potential conflicts of interest which may arise from multiple affiliations, the Initial Shareholders will present to the Company for its consideration, prior to presentation to any other person or company, any suitable opportunity to acquire an operating business, until the earlier of the consummation by the Company of a Business Combination or the liquidation of the Company, subject to any pre-existing fiduciary obligations the Initial Shareholders might have.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

  • Reverse ADSL Loops If a CLEC’s ADSL Transmission Unit (including those integrated into DSLAMs) is attached to Sprint’s Network and if an ADSL Copper Loop should start at an outside location, and is looped through a host or remote, and then to the subscriber, the copper plant from the outside location to the Sprint host or remote central office must be a facility dedicated to ADSL transmission only and not part of Sprint’s regular feeder or distribution plant.

  • Personally Owned Professional Material The employer shall reimburse an employee to a maximum of $150 for loss, damage or personal insurance deductible to personally owned professional material brought to the employee’s workplace to assist in the execution of the employee’s duties, provided that: a. The loss or damage is not the result of negligence on the part of the employee claiming compensation; b. The claim for loss or damage exceeds ten (10) dollars; c. If applicable, a copy of the claim approval from their insurance carrier shall be provided to the employer; d. The appropriate Principal or Vice-Principal reports that the loss was sustained while on assignment for the employer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!