Exempted, Temporary and Accessory Uses Sample Clauses

Exempted, Temporary and Accessory Uses. Exempted and Temporary uses are allowed pursuant to the provisions of Exhibit “I” of this Tehaleh Development Agreement.
AutoNDA by SimpleDocs

Related to Exempted, Temporary and Accessory Uses

  • Installation and Acceptance 4.1 Unless otherwise agreed in the Proposal, SDSD shall install the Product and other Licensed Materials on the Equipment.

  • Supplemental JBoss Software Conditions Software Access and Software Maintenance for Supplemental JBoss Software is intended and available for Development Purposes only and for up to 25 users for each 16 Core Band Subscription of Red Hat JBoss Middleware Software that you purchased. If you deploy or use the Supplemental JBoss Software for Production Purposes or for more than 25 users, you agree to purchase the appropriate Software Subscriptions for each Unit that you deploy or use. Red Hat’s Open Source Assurance Program applies only to the Red Hat JBoss Middleware Software Subscription that you purchased (such as Red Hat JBoss Enterprise Application Platform in the example above) and does not apply to Supplemental JBoss Software. JBoss xPaaS Subscriptions (defined below) are not considered Supplemental JBoss Software. Each installation and use of JBoss xPaaS Subscriptions Software for either Development Purposes or Production Purposes is a Unit and requires a paid Software Subscription.

  • Inclusion and accessibility The institution will provide support to incoming mobile participants with fewer opportunities, according to the requirements of the Erasmus Charter for Higher Education. Information and assistance can be provided by the following contact points and information sources: Country Available infrastructure adjusted for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- xxxx://xxx.xxxxxxxxx.xxxx.xx/?la ng=en Country Available support services for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- ---

  • TEACHING LOADS AND ASSIGNMENTS A. The normal daily/weekly teaching load shall be:

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

  • Collocation Transfer of Responsibility Without Working Circuits The Collocation is not serving any End User Customers and does not have active service terminations (e.g., Interconnection trunks or UNE Loops) or 2) Collocation Transfer of Responsibility With Working Circuits – The Collocation has active service terminations, such as Interconnection trunks or is serving End User Customers.

  • Indemnification and Assumption of Risk – Vendor Data VENDOR AGREES THAT IT IS VOLUNTARILY PROVIDING DATA (INCLUDING BUT NOT LIMITED TO: VENDOR INFORMATION, VENDOR DOCUMENTATION, VENDOR’S PROPOSALS, VENDOR PRICING SUBMITTED OR PROVIDED TO TIPS, TIPS CONTRACT DOCUMENTS, TIPS CORRESPONDENCE, VENDOR LOGOS AND IMAGES, VENDOR’S CONTACT INFORMATION, VENDOR’S BROCHURES AND COMMERCIAL INFORMATION, VENDOR’S FINANCIAL INFORMATION, VENDOR’S CERTIFICATIONS, AND ANY OTHER VENDOR INFORMATION OR DOCUMENTATION, INCLUDING WITHOUT LIMITATION SOFTWARE AND SOURCE CODE UTILIZED BY VENDOR, SUBMITTED TO TIPS BY VENDOR AND ITS AGENTS) (“VENDOR DATA”) TO TIPS. FOR THE SAKE OF CLARITY, AND WITHOUT LIMITING THE BREADTH OF THE INDEMNITY OBLIGATIONS IN SECTION 14 ABOVE, VENDOR AGREES TO PROTECT, INDEMNIFY, AND HOLD THE TIPS INDEMNITEES HARMLESS FROM AND AGAINST ANY AND ALL LOSSES, CLAIMS, ACTIONS, DEMANDS, ALLEGATIONS, SUITS, JUDGMENTS, COSTS, EXPENSES, FEES, INCLUDING COURT COSTS, ATTORNEY’S FEES, AND EXPERT FEES AND ALL OTHER LIABILITY OF ANY NATURE WHATSOEVER ARISING OUT OF OR RELATING TO: (I) ANY UNAUTHORIZED, NEGLIGENT OR WRONGFUL USE OF, OR CYBER DATA BREACH INCIDENT AND VIRUSES OR OTHER CORRUPTING AGENTS INVOLVING, VENDOR’S DATA, PRICING, AND INFORMATION, COMPUTERS, OR OTHER HARDWARE OR SOFTWARE SYSTEMS, AND; (II) ALLEGATIONS OR CLAIMS THAT ANY VENDOR DATA INFRINGES ON THE INTELLECTUAL PROPERTY RIGHTS OF A THIRD-PARTY OR VENDOR.

  • Restricted Access By choosing restricted access, you are requesting that the library restrict access to all full-text copies of your dissertation – both print and electronic – for a specified period of time. Your dissertation will be listed and indexed in the Emory Library Online Catalog and in the ETD repository, but the content, the full text of your thesis or dissertation and any supplementary files, will not be accessible until the expiration of the restricted access period. If you choose to restrict access to the full-text copy of your thesis or dissertation, then you may opt to also restrict access to your abstract or table of contents. You will need to indicate your desire to restrict access to these components of your ETD record during the electronic submission process. If you do not restrict access to your abstract and/or table of contents, then this information will be displayed on the web in the ETD record for your thesis or dissertation even if you have restricted access to the full-text copy. You will be notified by the library sixty ( 60 ) days prior to the expiration of the restricted period that your thesis or dissertation will be published on the internet. It is your responsibility to notify the Graduate School and the library that you need to extend the access restriction, and to provide the library with an updated e- mail address. ☐ 6 months after my graduation ☐ 1 year after my graduation ☐ 2 years after my graduation Please select a time period you would like restricted access below. I request that the full text of my thesis or dissertation (and any supplemental files) be published no sooner than: Part 4 – Inclusion of Previously Copyrighted Material I hereby certify that all text, audio-visual, or other material not created by me or for which I no longer control copyright that is included in my submission (a) has been identified in my submission by quotation, if directly quoted, and with appropriate source citations; and (b) • falls within the parameters of “Fair Use” as defined by US copyright law; or • is unambiguously a part of the public domain as a matter of law; or • is the subject of a properly documented permission obtained from the entity that owns or controls the copyright in the material. I will provide copies of any such permission upon request. Following is a list of the items for which I have sought and received written permission from the copyright owners to include in my submission (attach a separate page if necessary):

  • EXTENSION OF USE COMMITMENT The Contractor agrees to honor all orders from State Agencies, political subdivisions and others authorized by law (see Section 25 Extension of Use) which are in compliance with the pricing, terms, and conditions set forth in the Contract. Any unilateral limitations/restrictions imposed by the Contractor on eligible Authorized Users will be grounds for cancellation of the Contract.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!