Customer Responsibilities Notwithstanding the above, Customer agrees that except as provided by this DPA, Customer is responsible for its secure use of the Services, including securing its account authentication credentials, protecting the security of Customer Data when in transit to and from the Services and taking any appropriate steps to securely encrypt or backup any Customer Data uploaded to the Services.
Customer Responsibility You agree that you are responsible for all access to and use of the Service through your account or password(s) and for any fees incurred for the Service, or for software or other merchandise purchased through the Service, or any other expenses incurred in accordance with the terms of this Agreement. You agree that you are responsible for backing up (a) any data you submit, receive or transfer over the Service, including, without limitation, your email; and (b) any data, files, programs, or applications on any device you connect to the Service. You acknowledge that you are aware that content accessible on or through the Service may contain material that is unsuitable for minors (persons under 18 years of age). You agree to supervise usage of your account by minors. You ratify and confirm any obligations incurred by a minor using your account.
User Responsibilities i. Users are required to follow good security practices in the selection and use of passwords; ii. Users shall ensure that unattended equipment is protected; and iii. Users shall adopt a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities.
Customer’s Responsibilities 2.1. A properly configured hardware firewall is required for each Customer Location using a persistent connection to the public internet or any private network where there is a potential for unauthorized access. This requirement is Customer’s responsibility. 2.2. Unless you subscribe to the Network and Security Services option known as “Antivirus Service” (or its successor product), Customer will be required to have and maintain in place third party malware and anti-virus protection software, including periodic and routine updates in accordance with the manufacturer’s recommendations, and security for the Customer’s POS System Network, which security includes unique, strong passwords per user, physical security and access control policies. Customer acknowledges and agrees that security and protection of all of its networks, including the Customer POS System Network, and the data and applications on such networks, including protections against unauthorized access, is Customer’s responsibility. Customer acknowledges that, to be effective, malware protection software, system passwords and other security software and hardware components require periodic and routine updates, which Customer must obtain or perform as applicable. Customer agrees to not use or attempt to install remote access software on the Customer POS System Network unless approved by NCR Voyix.
Contractor Responsibilities 19.1. Contractor shall perform national criminal history checks for Ohio, Indiana, and Kentucky, and 10-panel drug screening tests on all prospective employees performing work under this RFP or coming onto a CMHA property and any resulting contract and provide summaries of the results to the Authority if requested. For the purposes of this section, the term “employees” includes contractor. Prospective employees whose criminal background check discloses a misdemeanor or felony involving crimes of moral turpitude, sexual offenses or harm to persons or property shall not be employed to perform work under this RFP or any resulting contract. Contractor is required to perform drug screening of all employees and to ensure acceptable test results. Criminal history and drug screening checks will be completed at the sole expense of the contractor. Any employee of the Contractor suspected of being under the influence of drugs and or alcohol will be reported to the appropriate personnel at CMHA and/or other local law enforcement. If the employee is determined to be under the influence of drugs or alcohol in any form or manner, or believed by proper authority to be dealing in illicit sale of alcohol or drugs they will be removed and shall not be allowed to return to any job site on the Authority’s property. The Contractor’s contract may be suspended and/or terminated should such a situation occur or if the Contractor fails to submit results pursuant to this section. 19.1.1. If CMHA requests additional drug screening, the test shall be performed within 24 hours and the summary shall be sent directly to CMHA from the testing facility. 19.2. Contractor(s) shall provide uniforms and ID Badges identifying Contractor for all employees working on CMHA’s properties. No employees will be allowed on CMHA’s properties out of uniform and without his/her ID badge on his/her person. Contractor(s) must submit a picture of the uniform and a sample of his/her ID badge if requested by CMHA. 19.3. Contractor’s personnel shall be neat and conduct all work in a professional and efficient manner. If any employee of Contractor is deemed unacceptable by CMHA, Contractor shall immediately replace such personnel with an acceptable substitute to CMHA. 19.4. Contractor(s) shall practice acceptable safety precautions so as not to cause harm to any persons or property while performing services under this RFP or any resulting contract. Contractor(s) shall follow industry safety standards, and use only industry approved safety equipment in accordance with the manufacturer’s specifications in the performance of all duties. 19.5. Contractor(s) shall pay all of its employees, including any and all approved Sub-Contractors, at least the legal minimum wages as determined by the United States Department of Labor and the United States Department of Housing and Urban Development and Department of Labor Prevailing Wage. Wage Determinations can be accessed via the Department of Labor website, xxx.xxxx.xxx. 19.6. Upon completion of the work, Contractor(s) shall clean up the area where the work was performed and Contractor(s) shall remove any debris generated by the products and/or services at CMHA premises. At no time, will Contractor(s) discard debris into any CMHA refuse container. 19.7. Contractor(s) shall clearly mark all work areas that might reasonably be expected to endanger the health and safety of residents, guests, or any other persons. Contractor(s) will provide such signs, markers and barricades as required to identify all work areas and minimize inherent dangers. 19.8. The contractor shall be responsible for notifying CMHA immediately of any damages (i.e. fire, container leaking) deemed to be a health or safety hazard whether the damage is caused by the contractor or other means. 19.9. The Contractor shall be responsible for safeguarding all CMHA property provided for Contractor use. At the close of each workday, CMHA facilities, property and materials shall be inspected and secured.
Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.
Client’s Responsibilities In addition to other responsibilities herein or imposed by law, the Client shall: (a) Designate in writing a person to act as its representative, such person having complete authority to transmit instructions, receive information, and make or interpret the Client's decisions. (b) Provide all information and criteria as to the Client's requirements, objectives, and expectations for the project and all standards of development, design, or construction. (c) Provide the Consultant all available studies, plans, or other documents pertaining to the project, such as surveys, engineering data, environmental information, etc., all of which the Consultant may rely upon. (d) Arrange for access to the site and other property as required for the Consultant to provide its services. (e) Review all documents or reports presented by the Consultant and communicate decisions pertaining thereto within a reasonable time so as not to delay the Consultant. (f) Furnish approvals and permits from governmental authorities having jurisdiction over the project and approvals and consents from other parties as may be necessary. (g) Obtain any independent accounting, legal, insurance, cost estimating and feasibility services required by Client. (h) Give prompt written notice to the Consultant whenever the Client becomes aware of any development that affects the Consultant's services or any defect or noncompliance in any aspect of the project.
Vendor Responsibilities Note: NO EXCEPTIONS OR REVISIONS WILL BE CONSIDERED IN C-M, O-S, V-W. Indemnification
Patent Filing Responsibilities and Costs 1. The invention and patent rights herein apply to any patent application or patents covering an invention made under this Agreement. Each Party is responsible for its own costs of obtaining and maintaining patents covering sole inventions of its employees. The Parties may agree otherwise, upon the reporting of any invention (sole or joint) or in any license granted. 2. Partner shall include the following in patent applications for an invention made jointly between NASA employees, its Related Entity employees and Partner employees: The invention described herein may be manufactured and used by or for the U.S. Government for U.S. Government purposes without the payment of royalties thereon or therefore.
Specific Responsibilities The JDC shall meet at least semi-annually, or as otherwise agreed to by the Parties, and such meetings may be conducted by telephone, video-conference or in person as determined by the JDC members, provided that with respect to in person meetings, unless otherwise agreed the location of such meetings shall alternate between locations designated by Licensor and locations designated by AbbVie. The JDC shall develop the strategies for and oversee the Development of the Licensed Antibodies or Licensed Products in the Territory, and shall serve as a forum for the coordination of Development activities for the Licensed Antibodies or Licensed Products for the Territory. In particular, the JDC shall: (a) periodically (no less often than annually) review and serve as a forum for discussing each Pre Exercise Development Plan and Budget, and review and approve amendments thereto, which approval will be reflected in the applicable minutes of the JDC meeting; *** Certain information in this agreement has been omitted and filed separately with the Securities and Exchange Commission. [***] indicates that text has been omitted and is the subject of a confidential treatment request. (b) serve as a forum for discussing and oversee the conduct of Pre Exercise Development Activities; (c) periodically (no less often than annually) review and approve each Post Exercise Development Plan and Budget, and review and approve amendments thereto, which approval will be reflected in the applicable minutes of the JDC meeting; (d) serve as a forum for discussing the conduct of the applicable Country-Specific Development Activities; (e) serve as a forum for discussing and oversee the conduct of Additional Licensor Development Activities; (f) serve as a forum for reviewing and approving strategies for obtaining Regulatory Approvals including approving use of consultants, key opinion leaders or any other experts to seek advice on strategies for seeking Regulatory Approvals for the Licensed Products in the Territory; (g) establish secure access methods (such as secure databases) for each Party to access Regulatory Documentation and other JDC related Information as contemplated under this Agreement; and (h) perform such other functions as are set forth herein or as the Parties may mutually agree in writing, except where in conflict with any provision of this Agreement.