Authorized Activities In carrying out the purposes of the Partnership, but subject to all other provisions of this Agreement, the Partnership is authorized to engage in any kind of lawful activity, and perform and carry out contracts of any kind, necessary or advisable in connection with the accomplishment of the purposes and business of the Partnership described herein and for the protection and benefit of the Partnership; provided that the General Partner shall not be obligated to cause the Partnership to take, or refraining from taking, any action which, in the judgment of the General Partner, (i) could adversely affect the ability of the General Partner to qualify and continue to qualify as a REIT, (ii) could subject the General Partner to additional taxes under Code Section 857 or 4981 or (iii) could violate any law or regulation of any governmental body or agency having jurisdiction over the General Partner or its securities.
Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.
Authorized Sub-processors Customer agrees that MailChimp may engage Sub-processors to process Customer Data on Customer's behalf. The Sub-processors currently engaged by MailChimp and authorized by Customer are listed in Annex A.
Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.
CHANGES TO PRODUCT OR SERVICE OFFERINGS a. Product or Service Discontinuance Where Contractor is the Product Manufacturer/Developer, and Contractor publicly announces to all U.S. customers (“date of notice”) that a Product is being withdrawn from the U.S. market or that maintenance service or technical support provided by Contractor (“withdrawn support”) is no longer going to be offered, Contractor shall be required to: (i) notify the Commissioner, each Licensee and each Authorized User then under contract for maintenance or technical support in writing of the intended discontinuance; and (ii) continue to offer Product or withdrawn support upon the Contract terms previously offered for the greater of: a) the best terms offered by Contractor to any other customer, or b) not less than twelve (12) months from the date of notice; and (iii) at Authorized User’s option, provided that the Authorized User is under contract for maintenance on the date of notice, either: provide the Authorized User with a Product replacement or migration path with at least equivalent functionality at no additional charge to enable Authorized User to continue use and maintenance of the Product. In the event that the Contractor is not the Product Manufacturer, Contractor shall be required to: (i) provide the notice required under the paragraph above, to the entities described within five (5) business days of Contractor receiving notice from the Product Manufacturer, and (ii) include in such notice the period of time from the date of notice that the Product Manufacturer will continue to provide Product or withdraw support. The provisions of this subdivision (a) shall not apply or eliminate Contractor’s obligations where withdrawn support is being provided by an independent Subcontractor. In the event that such Subcontractor ceases to provide service, Contractor shall be responsible for subcontracting such service, subject to state approval, to an alternate Subcontractor.
Inspection of Goods 8.1 The Buyer shall inspect the goods upon delivery. 8.2 Where goods are damaged the Buyer shall notify the Supplier. The Buyer may reject the damaged goods and the following provisions shall apply: 8.2.1 the Supplier shall collect the damaged goods from the Buyer at the Supplier’s expense; 8.2.2 during the period between delivery of the goods to the Buyer and collection by the Supplier, the Buyer shall not be liable for any loss or further damage caused to the damaged goods; 8.2.3 all sums payable by the Buyer in relation to the damaged goods shall cease to become payable; 8.2.4 all sums paid by the Buyer in relation to the damaged goods shall be repaid by the Supplier immediately; 8.2.5 the Buyer shall be entitled to claim damages from the Supplier for any losses caused to the Buyer as a result of the goods being damaged. 8.3 Where there are shortages in the order the Buyer shall notify the Supplier and the following provisions shall apply: 8.3.1 all sums payable by the Buyer in relation to the missing goods shall cease to become payable; 8.3.2 all sums paid by the Buyer in relation to the missing goods shall be repaid by the Supplier immediately; 8.3.3 the Buyer shall be entitled to claim damages from the Supplier for any losses caused to the Buyer as a result of the shortages. 8.4 If the Buyer so requests, the Supplier shall immediately replace damaged goods or supply goods which are missing at the Supplier’s expense or the Buyer shall be entitled to cancel, without notice, the whole or any unexecuted part of the order and the rights referred to in Clause 5.2 shall apply. 8.5 Where there is an excess of goods in relation to the order the Buyer may reject the excess goods by notice in writing to the Supplier and the following provisions shall apply: 8.5.1 the Supplier shall collect the excess goods from the Buyer at the Supplier’s expense; 8.5.2 during the period between delivery of the goods and collection by the Supplier, the Buyer shall not be liable for any loss or damage caused to the excess goods; 8.5.3 no sum shall be due to the Supplier for the excess goods and in the event that sums are paid to the Supplier for the excess goods, the Supplier shall repay such sums to the Buyer immediately. 8.6 The Buyer may accept excess goods by notifying the Supplier of such acceptance and the price of the excess goods shall be payable by the Buyer. 8.7 The Supplier shall repair or replace free of charge, goods damaged or lost in transit upon receiving notice to that effect from the Buyer. 8.8 The Buyer’s signature on any delivery note of the Supplier is evidence of the number of packages received only and not evidence of the correct quantity of goods received or that the goods are in a good condition or of the correct quality.
Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.
Accessing the Website and Account Security We reserve the right to withdraw or amend this Website and any service or material we provide on the Website in our sole discretion without notice. We will not be liable if for any reason all or any part of the Website is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the Website, or the entire Website, to users, including registered users. To access the Website or some of the resources it offers, you may be asked to provide certain registration details or other information. It is a condition of your use of the Website and any resources downloaded from the Website that all the information you provide on the Website is correct, current, and complete. You agree that all information you provide to register with this Website or otherwise, including but not limited to through the use of any interactive features on the Website, is governed by our Privacy Policy, and you consent to all actions we take with respect to your information consistent with our Privacy Policy. If you choose, or are provided with, a user name, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any other person or entity. You also acknowledge that your account is personal to you and agree not to provide any other person with access to this Website or portions of it using your user name, password or other security information. You agree to notify us immediately of any unauthorized access to or use of your user name or password or any other breach of security. You also agree to ensure that you exit from your account at the end of each session. You should use particular caution when accessing your account from a public or shared computer so that others are not able to view or record your password or other personal information. We have the right to disable any user name, password or other identifier, whether chosen by you or provided by us, at any time in our sole discretion for any or no reason, including if, in our opinion, you have violated any provision of these Terms of Use.
Office of Inspector General Investigative Findings Expert Review In accordance with Senate Bill 799, Acts 2021, 87th Leg., R.S., if Texas Government Code, Section 531.102(m-1)(2) is applicable to this Contract, Contractor affirms that it possesses the necessary occupational licenses and experience.
Background Screening and Security All Contractor employees and agents performing work under the Contract must comply with all security and other requirements of the Department.