User Subscriptions 2.1 Subject to the Customer purchasing the User Subscriptions in accordance with 3.3 and 8.1, the restrictions set out in this 2 and the other terms and conditions of this agreement, the Supplier hereby grants to the Customer a non-exclusive, non-transferable right, without the right to grant sublicences, to permit the Authorised Users to use the Services and the Documentation during the Subscription Term solely for the Customer's internal business operations. 2.2 In relation to the Authorised Users, the Customer undertakes that: (a) the maximum number of Authorised Users that it authorises to access and use the Services and the Documentation shall not exceed the number of User Subscriptions it has purchased from time to time; (b) it will not allow or suffer any User Subscription to be used by more than one individual Authorised User unless it has been reassigned in its entirety to another individual Authorised User, in which case the prior Authorised User shall no longer have any right to access or use the Services and/or Documentation; (c) each Authorised User shall keep a secure password for their use of the Services and Documentation and that each Authorised User shall keep their password confidential; (d) it shall permit the Supplier or the Supplier's designated auditor to audit the Services in order to establish the name and password of each Authorised User and the Customer's data processing facilities to audit compliance with this agreement. Each such audit may be conducted no more than once per quarter, at the Supplier's expense, and this right shall be exercised with reasonable prior notice, in such a manner as not to substantially interfere with the Customer's normal conduct of business; (e) if any of the audits referred to in clause 2.2(d) reveal that any password has been provided to any individual who is not an Authorised User, then without prejudice to the Supplier's other rights, the Customer shall promptly disable such passwords and the Supplier shall not issue any new passwords to any such individual; and (f) if any of the audits referred to in 2.2(d) reveal that the Customer has underpaid Subscription Fees to the Supplier, then without prejudice to the Supplier's other rights, the Customer shall pay to the Supplier an amount equal to such underpayment as calculated in accordance with the prices set out in paragraph 1 of Schedule 1 within 10 Business Days of the date of the relevant audit. 2.3 The Customer shall not access, store, distribute or transmit any Viruses, or any material during the course of its use of the Services that: (a) is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; (b) facilitates illegal activity; (c) depicts sexually explicit images; (d) promotes unlawful violence; (e) is discriminatory based on race, gender, colour, religious belief, sexual orientation, disability; or (f) is otherwise illegal or causes damage or injury to any person or property; and the Supplier reserves the right, without liability or prejudice to its other rights to the Customer, to disable the Customer's access to any material that breaches the provisions of this clause. 2.4 The Customer shall not: (a) except as may be allowed by any applicable law which is incapable of exclusion by agreement between the parties and except to the extent expressly permitted under this agreement: (i) attempt to copy, modify, duplicate, create derivative works from, frame, mirror, republish, download, display, transmit, or distribute all or any portion of the Software and/or Documentation (as applicable) in any form or media or by any means; or (ii) attempt to de-compile, reverse compile, disassemble, reverse engineer or otherwise reduce to human-perceivable form all or any part of the Software; or (b) access all or any part of the Services and Documentation in order to build a product or service which competes with the Services and/or the Documentation; or (c) use the Services and/or Documentation to provide services to third parties; or (d) subject to 22.1, license, sell, rent, lease, transfer, assign, distribute, display, disclose, or otherwise commercially exploit, or otherwise make the Services and/or Documentation available to any third party except the Authorised Users, or (e) attempt to obtain, or assist third parties in obtaining, access to the Services and/or Documentation, other than as provided under this 2; or (f) introduce or permit the introduction of any Virus [or Vulnerability] into the Supplier's network and information systems. 2.5 The Customer shall use all reasonable endeavours to prevent any unauthorised access to, or use of, the Services and/or the Documentation and, in the event of any such unauthorised access or use, promptly notify the Supplier. 2.6 The rights provided under this 2 are granted to the Customer only, and shall not be considered granted to any subsidiary or holding company of the Customer.
INTRODUCTION TO YOUR SUBSCRIBER AGREEMENT Thank you for choosing Blue Cross & Blue Shield of Rhode Island (BCBSRI) for your healthcare coverage. We appreciate the trust you’ve placed in us and want to help you make the most of your health plan. In this Subscriber Agreement (agreement), you’ll find valuable information about your • how your health coverage works; • how BCBSRI processes claims for the health services you receive; • your rights and responsibilities as a BCBSRI member; • BCBSRI’s rights and responsibilities; and • tools and programs to help you stay healthy and save money. We encourage you to read this agreement to learn about all the advantages of being a BCBSRI member. Below are some helpful tips on how to find what you need in this agreement. • As a member, you are responsible for understanding the benefits to which you are entitled under this agreement and the rules you must follow to receive those benefits. • The Table of Contents will help you find the order of the sections as they appear in the agreement. • The Summary of Benefits, included in this agreement, shows the amount you pay out of your own pocket. • Important contact information, such as, telephone numbers, addresses, and websites are located at the end of this document. • Some words and phrases used in this agreement are in italics. This means that the words or phrases have a special meaning as they relate to your healthcare coverage. Please see Section 8 for definitions of these words. • When we use the words “we,” “us,” and “our,” we are referring to BCBSRI. When we use the words “you” and “your” we are referring to the enrolled subscriber and/or member. These words are also defined in the Glossary. • Many sections of this document are related to other sections. You may need to reference more than one section to find the information you need.
Software Subscription Use Case Red Hat Storage Server for On- Premise Red Hat Storage Server for On-Premise is intended to be used as a storage system and will be supported only when used as a storage node. Red Hat Storage Server is not supported on non- server hardware such as desktops or workstations. Red Hat Storage Server for On-Premise is intended for use on a dedicated System, Physical Node, Virtual Node or Virtual Guest; running other applications and/or programs of any type on the System, Physical Node, Virtual Node or Virtual Guest can have a negative impact on the function and/or performance of the Red Hat Storage Server and is not a supported Use Case. Each Red Hat Storage Server Subscription includes one Software Subscription to Red Hat Enterprise Linux Server and the Scalable File System Add-on, which are supported solely in connection with the use of Red Hat Storage Server. Red Hat Storage Server for Public Cloud Red Hat Storage Server for Public Cloud is intended to be used as a storage system and will be supported only when used as a storage node. When running in Amazon Web Services, an EC2 M1 Large dedicated instance is required in order to be supported. Running other applications and/or programs of any type on the same instance can have a negative impact on the function and/or performance of the Red Hat Storage Server and is not a supported Use Case. Each Red Hat Storage Server Subscription includes one Software Subscription to Red Hat Enterprise Linux Server and the Scalable File System Add-on, which are supported solely in connection with the use of Red Hat Storage Server. Red Hat Storage for Red Hat Enterprise Linux OpenStack Platform Red Hat Storage Server for Red Hat Enterprise Linux OpenStack Platform is intended to be used as a storage system with Red Hat Enterprise Linux OpenStack Platform and will be supported only when used as a storage node. Red Hat Storage Server is not supported on non-server hardware such as desktops or workstations. Red Hat Storage Server for Red Hat Enterprise Linux OpenStack Platform is intended for use on a dedicated Physical Node; running other applications and/or programs of any type on the Physical Node can have a negative impact on the function and/or performance of the Red Hat Storage Server and is not a supported Use Case. Each Red Hat Storage Server Subscription includes one Software Subscription to Red Hat Enterprise Linux Server and the Scalable File System Add-on, which are supported solely in connection with the use of Red Hat Storage Server.
Subscription Procedures The Dealer Manager will comply in all material respects with the subscription procedures and “Plan of Distribution” set forth in the Prospectus, and with respect to any direct sales made by the Dealer Manager, with the transmittal of funds procedures set forth in Section 6.
Subscription Services We grant You a right to use the Genesys Cloud Service in accordance with this Agreement and the applicable product descriptions found in the Services Order.
RDDS Registration Data Directory Services refers to the collective of WHOIS and Web-‐based WHOIS services as defined in Specification 4 of this Agreement.
Anti-slavery and human trafficking The Supplier shall: ensure that slavery and human trafficking is not taking place in any part of its business or in any part of its supply chain; implement due diligence procedures for its own suppliers, subcontractors and other participants in its supply chains, to ensure that there is no slavery or human trafficking in its supply chains; respond promptly to all slavery and human trafficking due diligence questionnaires issued to it by the British Council from time to time and ensure that its responses to all such questionnaires are complete and accurate; and notify the British Council as soon as it becomes aware of any actual or suspected slavery or human trafficking in any part of its business or in a supply chain which has a connection with this Agreement. If the Supplier fails to comply with any of its obligations under clause 13.1, without prejudice to any other rights or remedies which the British Council may have, the British Council shall be entitled to: terminate this Agreement without liability to the Supplier immediately on giving notice to the Supplier; and/or reduce, withhold or claim a repayment (in full or in part) of the charges payable under this Agreement; and/or share with third parties information about such non-compliance.
Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.
Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.
Authorization Purchase and Sale Terms of the Private Placement Warrants A. Authorization of the Private Placement Warrants. The Company has duly authorized the issuance and sale of the Private Placement Warrants to the Purchaser.