Compassionate Use/Expanded Access Program Sample Clauses

Compassionate Use/Expanded Access Program. Gilead has received inquiries regarding expanded access to the Current Product in various countries of the GSK Territory prior to the Effective Date. Gilead shall forward to GSK contact information resulting from such inquiries promptly after the Effective Date. Thereafter, Gilead shall promptly forward to GSK any additional inquiries Gilead receives regarding expanded access in the GSK Territory to any Licensed Product. Gilead shall reasonably cooperate with GSK to [ * ] to the extent set forth in such Section. GSK shall [ * ] whether made before or after the Effective Date. GSK shall have the exclusive right, and shall devote its [ * ] with the [ * ], to establish an expanded access program to make the Licensed Product available on a compassionate use basis in the countries of the GSK Territory. As GSK decides, with respect to each country of the GSK Territory, whether to establish such an expanded access program in such country, GSK shall give due consideration to the need to maintain good relations with physicians and key opinion leaders in the GSK Territory with respect to the Current Product and the Parties' efforts to develop treatments for the HBV Indication. GSK shall notify the Clinical Development Committee as GSK considers an expanded access program in any country of the GSK Territory, and the Clinical Development Committee shall discuss the considerations relevant to such decision.
AutoNDA by SimpleDocs

Related to Compassionate Use/Expanded Access Program

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • SERVICE XXXX USE A. Controlled Affiliate recognizes the importance of a comprehensive national network of independent BCBSA licensees which are committed to strengthening the Licensed Marks and Name. The Controlled Affiliate further recognizes that its actions within its Service Area may affect the value of the Licensed Marks and Name nationwide.

  • Service Level Agreement Subject to the terms and conditions of this Agreement, Bank agrees to perform the custody services provided for under this Agreement in a manner that meets or exceeds any service levels as may be agreed upon by the parties from time to time in a written document that is executed by both parties on or after the date of this Agreement, unless that written document specifically states that it is not contractually binding. For the avoidance of doubt, Bank’s Service Directory shall not be deemed to be such a written document.

  • TECHNICAL SUPPORT SERVICES 2.1 The technical support services (the "Services"): Party A agrees to provide to Party B the relevant services requested by Party B, which are specified in Exhibit 1 attached hereto ("Exhibit 1").

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Statement of Work Independently and not as an agent of the Government, the Contractor shall furnish all the necessary services, qualified personnel, material, equipment, and facilities, not otherwise provided by the Government as needed to perform the Statement of Work, SECTION J, ATTACHMENT 1, April 30, 2004, attached hereto and made a part of this contract.

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Data Processing System, Program and Information (a) The Investment Company shall not, solely by virtue of this Agreement, obtain any rights, title and interest in and to the computer systems and programs, including all related documentation, employed by FTIS in connection with rendering services hereunder; provided however, that the records prepared, maintained and preserved by FTIS pursuant to this Agreement shall be the property of the Investment Company.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

Time is Money Join Law Insider Premium to draft better contracts faster.