DEVELOPMENT OR ASSISTANCE IN DEVELOPMENT OF SPECIFICATIONS REQUIREMENTS/ STATEMENTS OF WORK
Exclusion de garanties A. Si vous êtes un client qui est un consommateur (quelqu’un qui utilise le Logiciel tvOS en dehors son commerce, entreprise ou profession), il se peut que vous bénéficiez, dans votre pays de résidence, de droits selon lesquels les limitations suivantes ne s’appliqueraient pas à vous. Dans les pays où ces limitations sont interdites, elles ne s’appliquent pas à vous. Pour en savoir plus sur vos droits, prenez contact avec un organisme local de conseil aux consommateurs. B. VOUS RECONNAISSEZ ET ACCEPTEZ EXPRESSÉMENT QUE, DANS LA MESURE PERMISE PAR LA LÉGISLATION APPLICABLE, L’UTILISATION DU LOGICIEL tvOS ET DE TOUT SERVICE FOURNI OU ACCESSIBLE PAR LEDIT LOGICIEL tvOS EST À VOS RISQUES ET PÉRILS ET QUE VOUS ASSUMEZ L’INTÉGRALITÉ DES RISQUES RELATIFS À LA QUALITÉ, AUX PERFORMANCES, À L’EXACTITUDE ET AUX EFFORTS. C. DANS LES LIMITES MAXIMALES AUTORISÉES PAR LA LÉGISLATION EN VIGUEUR, LE LOGICIEL tvOS ET LES SERVICES SONT FOURNIS « TELS QUELS » AVEC TOUS LEURS DÉFAUTS ET SANS AUCUNE GARANTIE D’AUCUNE SORTE. tvOS ET LES CONCÉDANTS D’APPLE (DÉSIGNÉS COLLECTIVEMENT PAR L’EXPRESSION « APPLE » AUX FINS DES DISPOSITIONS DES PARAGRAPHES 7 ET 8) EXCLUENT PAR LA PRÉSENTE LICENCE LA TOTALITÉ DES GARANTIES ET CONDITIONS, EXPLICITES, TACITES OU LÉGALES, Y COMPRIS DE FAÇON NON LIMITATIVE LES GARANTIES ET/OU CONDITIONS IMPLICITES DE QUALITÉ MARCHANDE, DE QUALITÉ SATISFAISANTE, D’ADÉQUATION À UN OBJECTIF PARTICULIER, D’EXACTITUDE, DE SÉRÉNITÉ D’UTILISATION ET DE NON EMPIÉTEMENT SUR LES DROITS DE TIERCES PARTIES, LE TOUT À L’ÉGARD DU LOGICIEL tvOS ET DES SERVICES. D. APPLE NE GARANTIT NULLEMENT L’ABSENCE DE TROUBLES LORS DE VOTRE UTILISATION DU LOGICIEL tvOS ET DES SERVICES, QUE LES FONCTIONS CONTENUES DANS LE LOGICIEL tvOS OU LES SERVICES EXÉCUTÉS OU FOURNIS PAR CELUI-CI CORRESPONDRONT À VOS BESOINS, QUE LE FONCTIONNEMENT DU LOGICIEL tvOS OU DES SERVICES SERA ININTERROMPU OU EXEMPT D’ERREUR, QUE TOUS LES SERVICES SERONT TOUJOURS DISPONIBLES, QUE TOUT DÉFAUT DU LOGICIEL tvOS OU DES SERVICES SERA CORRIGÉ OU QUE LE LOGICIEL tvOS SERA COMPATIBLE AVEC TOUT AUTRE LOGICIEL, APPLICATION OU SERVICE TIERS. L’INSTALLATION DU LOGICIEL tvOS PEUT AFFECTER LA DISPONIBILITÉ ET L’UTILISATION DE LOGICIELS, APPLICATIONS OU SERVICES XX XXXXXX PARTIE, AINSI QUE DE PRODUITS ET SERVICES APPLE. E. VOUS RECONNAISSEZ ÉGALEMENT QUE LE LOGICIEL tvOS ET LES SERVICES NE SONT NI DESTINÉS NI ADAPTÉS À UN USAGE DANS DES SITUATIONS OU DES ENVIRONNEMENTS OÙ UNE DÉFAILLANCE, DES ERREURS OU DES INEXACTITUDES DU CONTENU, DES DONNÉES OU DES INFORMATIONS FOURNIS PAR LE LOGICIEL tvOS OU LES SERVICES RISQUENT D’ENTRAÎNER DES BLESSURES, DES ACCIDENTS XXXXXX OU MORTELS POUR LES PERSONNES OU DES DOMMAGES PHYSIQUES OU ENVIRONNEMENTAUX. CES SITUATIONS COMPRENNENT NOTAMMENT LE FONCTIONNEMENT D’INSTALLATIONS NUCLÉAIRES, LA NAVIGATION OU LES SYSTÈMES DE COMMUNICATION AÉRIENS, LE CONTRÔLE AÉRIEN, LES SYSTÈMES D’ENTRETIEN ARTIFICIEL DE LA VIE OU LES SYSTÈMES D’ARMEMENT.
Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.
Restrictions on the Use of the Beat Licensee hereby agrees and acknowledges that it is expressly prohibited from taking any action(s) and from engaging in any use of the Beat or New Song in the manners, or for the purposes, set forth below: a. The rights granted to Licensee are NON-TRANSFERABLE and that Licensee may not transfer or assign any of its rights hereunder to any third-party; b. The Licensee shall not synchronize, or permit third parties to synchronize, the Beat or New Song with any audiovisual works EXCEPT as expressly provided for and pursuant to Paragraph 4(b)(iii) of this Agreement for use in one (1)
Community Engagement Integration Activities The SP will support the HSP to engage the community of diverse persons and entities in the area where it provides health services when setting priorities for the delivery of health services and when developing plans for submission to the LHIN including but not limited to CAPS and integration proposals.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
AT WEBSITE XXX XXXXXXXXXXXXXXXX.XXX
Certification Regarding Prohibition of Boycotting Israel (Tex Gov. Code 2271)
Limitation on Out-of-State Litigation - Texas Business and Commerce Code § 272 This is a requirement of the TIPS Contract and is non-negotiable. Texas Business and Commerce Code § 272 prohibits a construction contract, or an agreement collateral to or affecting the construction contract, from containing a provision making the contract or agreement, or any conflict arising under the contract or agreement, subject to another state’s law, litigation in the courts of another state, or arbitration in another state. If included in Texas construction contracts, such provisions are voidable by a party obligated by the contract or agreement to perform the work. By submission of this proposal, Vendor acknowledges this law and if Vendor enters into a construction contract with a Texas TIPS Member under this procurement, Vendor certifies compliance.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.