FUNDAMENTAL PASSENGER AND OWNER RESPONSIBILITIES; AIR AND LAND PACKAGE SERVICES Sample Clauses

FUNDAMENTAL PASSENGER AND OWNER RESPONSIBILITIES; AIR AND LAND PACKAGE SERVICES. The following requirements apply to you and everyone in your party. (a) Before you board the Ship or embark on your Cruise Package, you must: (i) pay your full Cruise Package fare; (ii) familiarize yourself with the terms of this Contract; (iii) allow us to take your temperature and test you for COVID-19, and (iv) provide us with, and allow us to make copies of, all necessary travel documents such as passports, visas, proof of citizenship, re-entry permits, minor’s permissions, medical certificates showing all vaccinations we may in our sole discretion require, including without limitation a current COVID-19 vaccination, and all other documents necessary for ports of call in the countries to which you will travel. It is the Passenger’s sole responsibility to obtain and have available when necessary the appropriate valid travel, vaccination, and other documents as may be required. All Passengers are advised to check with their travel agent or the appropriate government authority to determine the necessary documents. You will be refused boarding or disembarked without liability for refund, payment, compensation, or credit of any kind if you do not have all proper documentation, and you will be subject to any fine or other costs incurred by Carrier which result from incomplete or improper documentation or noncompliance with applicable regulations or Carrier’s requirements with regard to documentation, testing, or otherwise. Carrier shall not be liable for refund, payment, compensation or credit of any kind, or damages resulting from your failure to comply with any of the requirements set forth above. (b) In consideration of the receipt in full of the fare and subject to the terms and conditions of this Contract: (i) Owner agrees to transport you on the Ship in order to enable you to take the Cruise; and (ii) as to Windstar Air Packages, Windstar Cruises agrees to book the air transportation required at the commencement and conclusion of your Cruise. This Contract is valid only for the Cruise and for the cabin specified in the ticket (or any other cabin assigned by us). The person accepting this Contract represents that he/she is authorized by all persons on the same booking to accept and agree to be bound by the terms and conditions of this Contract on their behalf. However, where deemed necessary by Carrier or as may be required by applicable law, Carrier reserves the right to obtain consent to certain data collection and other practices directly from each i...
AutoNDA by SimpleDocs

Related to FUNDAMENTAL PASSENGER AND OWNER RESPONSIBILITIES; AIR AND LAND PACKAGE SERVICES

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Cost Responsibility for Interconnection Facilities and Distribution Upgrades 4.1 Interconnection Facilities 4.2 Distribution Upgrades

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

  • Engineer Responsibilities No subcontract relieves the Engineer of any responsibilities under this contract.

  • Owner Responsibilities The project owner or the engineer or architect of record acting as the owner’s agent shall fund special inspection services.

  • The Publisher’s Responsibilities Subject always to the other provisions of this Clause below, the Publisher will undertake the production, publication and distribution of the Contribution and the Work in print and/or electronic form at its own expense and risk within a reasonable time after acceptance of the Work unless the Publisher is prevented from or delayed in doing so due to any circumstances beyond its reasonable control. The Publisher shall have the entire control of such production, publication and distribution determined in its sole discretion in relation to any and all editions and versions of the Contribution and the Work, including in respect of all the following matters: (a) distribution channels, including determination of markets; (b) determination of the range and functions of electronic formats and/or the number of print copies produced; (c) publication and distribution of the Contribution, the Work, or parts thereof as individual content elements, in accordance with market demand or other factors; (d) determination of layout and style as well as the standards for production; (e) setting or altering the list price, and allowing for deviations from the list price (if permitted under applicable jurisdiction); (f) promotion and marketing as the Publisher considers most appropriate. All rights, title and interest, including all intellectual property or related rights in the typography, design and/or look-and-feel of the Contribution shall remain the exclusive property of and are reserved to the Publisher. All illustrations and any other material or tangible or intangible property prepared at the expense of the Publisher including any marketing materials remain, as between the Parties, the exclusive property of the Publisher. The provisions of this subclause shall continue to apply notwithstanding any termination of, and/or any reversion of rights in the Contribution to the Author, under this Agreement. Without prejudice to the Publisher's termination and other rights hereunder including under the Clause "The Author's Responsibilities", it is agreed and acknowledged by the Parties that nothing in this Agreement shall constitute an undertaking on the part of the Publisher to publish the Contribution unless and until: (i) any and all issues in relation to the Work (including all necessary revisions, consents and permissions) raised by the Publisher have been resolved to the Publisher’s satisfaction, and (ii) the Publisher has given written notice of acceptance in writing of the final manuscript of the entire Work to the Editor. If following (i) and (ii) above the Publisher has not published the Contribution in any form within a reasonable period and the Author has given written notice to the Publisher requiring it to publish within a further reasonable period and the Publisher has failed to publish in any form, then the Author may terminate this Agreement by one month's written notice to the Publisher and all rights granted by the Author to the Publisher under this Agreement shall revert to the Author (subject to the provisions regarding any third party rights under any subsisting licence or sub-licence in accordance with the Clause "Termination"). The Author may also give such written notice requiring publication on the same terms as above if the Publisher has published the Contribution but subsequently ceases publishing the Contribution in all forms so that it is no longer available. This shall be the Author's sole right and remedy in relation to such non-publication and is subject always to the Author's continuing obligations hereunder including the Clause "Warranty".

  • Customer’s Responsibilities 9.1 If and to the extent applicable or under the control of the Customer, Customer shall provide complete and accurate information regarding requirements for the Project and the Site(s), including, without limitation, constraints, space requirements, underground or hidden facilities and structures, and all applicable drawings and specifications. 9.2 Customer shall prepare, file for, and use commercially reasonable efforts to obtain all Required Approvals necessary to perform its obligations under this Agreement. 9.3 Customer shall reasonably cooperate with Company as required to facilitate Company’s performance of the Work.

  • Customer Responsibilities Notwithstanding the above, Customer agrees that except as provided by this DPA, Customer is responsible for its secure use of the Services, including securing its account authentication credentials, protecting the security of Customer Data when in transit to and from the Services and taking any appropriate steps to securely encrypt or backup any Customer Data uploaded to the Services.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Money Market Fund Compliance Testing and Reporting Services Subject to the authorization and direction of the Trust and, in each case where appropriate, the review and comment by the Trust’s independent accountants and legal counsel, and in accordance with procedures that may be established from time to time between the Trust and the Administrator, the Administrator will:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!