EXCLUSIVITY OF INFLUENCER Sample Clauses

EXCLUSIVITY OF INFLUENCER. For the purposes of this Contract, the Influencer’s role with the Advertiser is: (check one) ☐ - Exclusive: It is understood that the Influencer will be working for the Advertiser on an exclusive basis for the duration of this Contract. It is prohibited that the Influencer post, promote, or be affiliated with any other advertiser in the following type(s) of business: .
AutoNDA by SimpleDocs
EXCLUSIVITY OF INFLUENCER. For the purposes of this Agreement, the Influencer’s role with the Advertiser is: (check one) ☐ ☐ - Exclusive: It is understood that the Influencer will be working for the Advertiser on an exclusive basis for the duration of this Agreement. It is prohibited that the Influencer post, promote, or be affiliated with any other advertiser in the following types of business: - Non-Exclusive: The Influencer is free to work for other advertisers for the duration of this Agreement.
EXCLUSIVITY OF INFLUENCER. For the purposes of this Contract, the Influencer’s role with the Advertiser is: (check one)

Related to EXCLUSIVITY OF INFLUENCER

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Confidentiality of Information 8.1. By accessing this EHSAN AUCTIONEERS SDN. BHD. website, the E-Bidders acknowledge and agree that EHSAN AUCTIONEERS SDN. BHD. website may collect, retain, or disclose the E-Bidder’s information or any information by the e-bidders for the effectiveness of services, and the collected, retained or disclosed information shall comply with Personal Data Protection Act 2010 and any regulations, laws or rules applicable from time to time.

  • Supply of Information The Republic agrees to deliver or cause to be delivered to each Stock Exchange copies of such documents as may be reasonably required for the purpose of obtaining such listing.

  • Disclosure of Information to Third Parties We will disclose information to third parties about your account or electronic transfers you make:

  • Information and Technical Advice At the request of a Party, or upon its own initiative, the arbitration panel may obtain information from any source, including the Parties involved in the dispute, which it deems appropriate for the arbitration procedure. The arbitration panel also has the right to seek the opinion of experts as it deems appropriate. Any information obtained in this manner must be disclosed to each of the Parties and submitted for their comments. Interested parties are authorised to submit amicus curiae briefs to the arbitration panel in accordance with the rules of procedure.

  • Use and Protection of Information Recipient agrees to protect such Information of the Discloser provided to Recipient from whatever source from distribution, disclosure or dissemination to anyone except employees of Recipient with a need to know such Information solely in conjunction with Recipient’s analysis of the Information and for no other purpose except as authorized herein or as otherwise authorized in writing by the Discloser. Recipient will not make any copies of the Information inspected by it.

  • NON-DISCLOSURE OF INFORMATION In the event Executive's employment has been terminated pursuant to either Section 6(b) or Section 6(c) hereof, Executive agrees that, during the Restricted Period, Executive will not use or disclose any Proprietary Information of the Company for the Executive's own purposes or for the benefit of any entity engaged in Competitive Business Activities. As used herein, the term "Proprietary Information" shall mean trade secrets or confidential proprietary information of the Company which are material to the conduct of the business of the Company. No information can be considered Proprietary Information unless the same is a unique process or method material to the conduct of Company's Business, or is a customer list or similar list of persons engaged in business activities with Company, or if the same is otherwise in the public domain or is required to be disclosed by order of any court or by reason of any statute, law, rule, regulation, ordinance or other governmental requirement. Executive further agrees that in the event his employment is terminated pursuant to Sections 6(b) or 6(c) above, all Documents in his possession at the time of his termination shall be returned to the Company at the Company's principal place of business.

  • USE AND DISTRIBUTION OF INFORMATION The Seller consents to the collection, use and disclosure of personal information by the Brokerage for the purpose of listing and marketing the Property including, but not limited to: listing and advertising the Property using any medium including the Internet; disclosing Property information to prospective buyers, brokerages, salespersons and others who may assist in the sale of the Property; such other use of the Seller’s personal information as is consistent with listing and marketing of the Property. The Seller consents, if this is an MLS® Listing, to placement of the listing information and sales information by the Brokerage into the database(s) of the MLS® System of the appropriate Board, and to the posting of any documents and other information (including, without limitation, photographs, images, graphics, audio and video recordings, virtual tours, drawings, floor plans, architectural designs, artistic renderings, surveys and listing descriptions) provided by or on behalf of the Seller into the database(s) of the MLS® System of the appropriate Board. The Seller hereby indemnifies and saves harmless the Brokerage and/or any of its employees, servants, brokers or sales representatives from any and all claims, liabilities, suits, actions, losses, costs and legal fees caused by, or arising out of, or resulting from the posting of any documents or other information (including, without limitation, photographs, images, graphics, audio and video recordings, virtual tours, drawings, floor plans, architectural designs, artistic renderings, surveys and listing descriptions) as aforesaid. The Seller acknowledges that the database, within the board’s MLS® System is the property of the real estate board(s) and can be licensed, resold, or otherwise dealt with by the board(s). The Seller further acknowledges that the real estate board(s) may: during the term of the listing and thereafter, distribute the information in the database, within the board’s MLS® System to any persons authorized to use such service which may include other brokerages, government departments, appraisers, municipal organizations and others; market the Property, at its option, in any medium, including electronic media; during the term of the listing and thereafter, compile, retain and publish any statistics including historical data within the board’s MLS® System and retain, reproduce and display photographs, images, graphics, audio and video recordings, virtual tours, drawings, floor plans, architectural designs, artistic renderings, surveys and listing descriptions which may be used by board members to conduct comparative analyses; and make such other use of the information as the Brokerage and/or real estate board(s) deem appropriate, in connection with the listing, marketing and selling of real estate during the term of the listing and thereafter. The Seller acknowledges that the information, personal or otherwise (“information”), provided to the real estate board or association may be stored on databases located outside of Canada, in which case the information would be subject to the laws of the jurisdiction in which the information is located. In the event that this Agreement expires or is cancelled or otherwise terminated and the Property is not sold, the Seller, by initialling: consent to allow other real estate board members to contact the Seller after expiration or other termination of this Agreement to discuss listing or otherwise marketing the Property. Does Does Not

  • Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.

  • Confidentiality of Vendor Data Vendor understands and agrees that by signing this Agreement, all Vendor Data is hereby released to TIPS, TIPS Members, and TIPS third-party administrators to effectuate Vendor’s TIPS Contract except as provided for herein. The Parties agree that Vendor Data is accessible by all TIPS Members as if submitted directly to that TIPS Member Customer for purchase consideration. If Vendor otherwise considers any portion of Vendor’s Data to be confidential and not subject to public disclosure pursuant to Chapter 552 Texas Gov’t Code (the “Public Information Act”) or other law(s) and orders, Vendor must have identified the claimed confidential materials through proper execution of the Confidentiality Claim Form which is required to be submitted as part of Vendor’s proposal resulting in this Agreement and incorporated by reference. The Confidentiality Claim Form included in Vendor’s proposal and incorporated herein by reference is the sole indicator of whether Vendor considers any Vendor Data confidential in the event TIPS receives a Public Information Request. If TIPS receives a request, any responsive documentation not deemed confidential by you in this manner will be automatically released. For Vendor Data deemed confidential by you in this manner, TIPS will follow procedures of controlling statute(s) regarding any claim of confidentiality and shall not be liable for any release of information required by law, including Attorney General determination and opinion. In the event that TIPS receives a written request for information pursuant to the Public Information Act that affects Vendor’s interest in any information or data furnished to TIPS by Vendor, and TIPS requests an opinion from the Attorney General, Vendor may, at its own option and expense, prepare comments and submit information directly to the Attorney General stating why the requested information is exempt from disclosure pursuant to the requirements of the Public Information Act. Vendor is solely responsible for submitting the memorandum brief and information to the Attorney General within the time period prescribed by the Public Information Act. Notwithstanding any other information provided in this solicitation or Vendor designation of certain Vendor Data as confidential or proprietary, Vendor’s acceptance of this TIPS Vendor Agreement constitutes Vendor’s consent to the disclosure of Vendor’s Data, including any information deemed confidential or proprietary, to TIPS Members or as ordered by a Court or government agency, including without limitation the Texas Attorney General. Vendor agrees that TIPS shall not be responsible or liable for any use or distribution of information or documentation by TIPS Members or as required by law.

Time is Money Join Law Insider Premium to draft better contracts faster.