Inaugural Exhibition Sample Clauses

Inaugural Exhibition. Depending on the timing of the Court Decree, Drexel intends to stage its first exhibition from the Collection, titled Philadelphia Revealed, opening in 2023, with a focus on materials that were not on permanent display at the former Museum Building. Drexel intends to hold the show in two Drexel spaces: the newly renovated gallery in the Xxxx Xxxx Center on Market Street (designed by Xxxxx Xxxxxxx as the Centennial National Bank), and the Xxxxxxx Xxxxxxxxxx Gallery on Filbert Street, which together make possible a substantial display across 4,500 sq. ft. of gallery space.
AutoNDA by SimpleDocs

Related to Inaugural Exhibition

  • Provision for Local Switching 4.2.12.1 BellSouth shall perform routine testing (e.g., Mechanized Loop Tests (MLT) and test calls such as 105, 107 and 108 type calls) and fault isolation on a mutually agreed upon schedule.

  • Topic Description Licensee Responsibilities Licensee must:  Take appropriate steps to ensure the security, integrity, and confidentiality of Confidential Information and must comply with all relevant applicable laws and regulations, including laws protecting borrower privacy.  Not disclose Confidential Information to third parties, without Xxxxxx Mae’s prior written approval, except on a need‐to‐know basis to Licensee’s partners, Topic Description affiliates, officers, employees, directors, contractors, counsels, agents or representatives, provided they are subject to confidentiality obligations at least as stringent as those set forth in this Section A3.  Not use Confidential Information in any way that could be viewed as a conflict of interest, a breach of confidentiality or privacy, or the gaining of an unfair advantage from the relationship with Xxxxxx Xxx.  Implement commercially reasonable measures meeting or exceeding industry standards to ensure the security, integrity, and confidentiality of Confidential Information, including using industry‐standard encryption for data in transit and virus checking programs designed to prevent the transmission and receipt of viruses and other malicious code, implementing appropriate disaster recovery and back‐up procedures, implementing appropriate procedures to prevent disclosure of data and other materials to a party other than the intended recipient, and employing methods for securely disposing or destroying such information.  These measures must meet, at least, the same level of protection that the Receiving Party seeks for its own information of a similar nature.  Licensee must collaborate with Xxxxxx Mae in assessing the sufficiency of these measures and Licensee’s information security program, upon reasonable request.  Instruct its Related Parties who may receive Confidential Information about the requirements of this Section A3, and the processes and procedures necessary to comply with them.  Comply with all reasonable security policies and procedures required by Xxxxxx Xxx related to the access and use of Xxxxxx Mae’s systems or any Licensed Materials.  Not transmit to Xxxxxx Mae’s systems any materials that contain bugs, viruses, worms or other functions, routines, devices or instructions which may create any unauthorized access or damage to, or interruption in the functioning of, the Licensed Application or Xxxxxx Mae’s systems. Restrictive Legends  Licensee must abide by and reproduce and include any restrictive legend or proprietary rights notice that appears in or on any Confidential Information of Xxxxxx Xxx or any Third‐Party Licensor (or other third‐party owner) that it is authorized to reproduce.  Licensee also agrees that it will not remove, alter, cover or distort any trademark, trade name, copyright or other proprietary rights notices, legends, symbols or labels appearing on or in any Confidential Information of Xxxxxx Mae or any Third‐Party Licensor (or other third‐party owner). Required Actions in Case of Data Breach  Licensee must address any Data Breach with prompt and effective corrective action, including cooperation with Xxxxxx Xxx in the investigation and remediation of such Data Breach, as well as prompt disclosure and notification where legally required; and  Licensee must promptly notify Xxxxxx Mae of any Data Breach in writing ‐‐ at xxxxxxx_xxxxxxxxxxxx@xxxxxxxxx.xxx ‐‐ and must take all steps reasonably requested by Xxxxxx Xxx to mitigate the consequences of such Data Breach.

  • Conversion of Wholesale Services to Network Elements or Network Elements to Wholesale Services Upon request, BellSouth shall convert a wholesale service, or group of wholesale services, to the equivalent Network Element or Combination that is available to Global Dialtone pursuant to Section 251 of the Act and under this Agreement or convert a Network Element or Combination that is available to Global Dialtone pursuant to Section 251 of the Act and under this Agreement to an equivalent wholesale service or group of wholesale services offered by BellSouth (collectively “Conversion”). BellSouth shall charge the applicable nonrecurring switch-as-is rates for Conversions to specific Network Elements or Combinations found in Exhibit A. BellSouth shall also charge the same nonrecurring switch-as-is rates when converting from Network Elements or Combinations. Any rate change resulting from the Conversion will be effective as of the next billing cycle following BellSouth’s receipt of a complete and accurate Conversion request from Global Dialtone. A Conversion shall be considered termination for purposes of any volume and/or term commitments and/or grandfathered status between Global Dialtone and BellSouth. Any change from a wholesale service/group of wholesale services to a Network Element/Combination, or from a Network Element/Combination to a wholesale service/group of wholesale services, that requires a physical rearrangement will not be considered to be a Conversion for purposes of this Agreement. BellSouth will not require physical rearrangements if the Conversion can be completed through record changes only. Orders for Conversions will be handled in accordance with the guidelines set forth in the Ordering Guidelines and Processes and CLEC Information Packages as referenced in Sections 1.13.1 and 1.13.2 below.

  • Service Descriptions Available services for Transitional and Enhanced Supervision Services a. One (1) one-to-one meeting with the Contractor per week for case management services.

  • Check Meters Developer, at its option and expense, may install and operate, on its premises and on its side of the Point of Interconnection, one or more check meters to check Connecting Transmission Owner’s meters. Such check meters shall be for check purposes only and shall not be used for the measurement of power flows for purposes of this Agreement, except as provided in Article 7.4 below. The check meters shall be subject at all reasonable times to inspection and examination by Connecting Transmission Owner or its designee. The installation, operation and maintenance thereof shall be performed entirely by Developer in accordance with Good Utility Practice.

  • NON-NETWORK PROVIDER is a provider that has not entered into a contract with us or any other Blue Cross and Blue Shield plan. For pediatric dental care services, non-network provider is a dentist that has not entered into a contract with us or does not participate in the Dental Coast to Coast Network. For pediatric vision hardware services, a non-network provider is a provider that has not entered into a contract with EyeMed, our vision care service manager.

  • Service Description The Parties will provide Common Channel Signaling (CCS) to one another via Signaling System 7 (SS7) network Interconnection, in accordance with prevailing industry standards. Use of a third party provider of SS7 trunks is permitted.

  • DESCRIPTION OF WEBSITE SERVICES OFFERED The Site is a website interface and companion mobile application which has the following description: A cloud based, website and mobile application interface for tracking events of participants in the USDA CACFP (Child and Adult Care Food Program) and/or SFSP (Summer Food Service Program) to be used by Day Care Homes and Sponsoring Organizations, Child Care Centers and Sponsoring Organizations, At-risk Afterschool Care Centers and Sponsoring Organizations, Adult Day Care Centers and Sponsoring Organizations and Emergency Shelters and Sponsoring Organizations. Any and all visitors to our site and users of the website applications and/or companion mobile application(s) shall be deemed as "users" of the herein contained Services provided for the purpose of this TOS. The user acknowledges and agrees that the Services provided and made available through our website and applications, which may include some mobile applications and that those applications may be made available on various social media networking sites and numerous other platforms and downloadable programs, are the sole property of Genius Programs. At its discretion, Genius Programs may offer additional website Services and/or products, or update, modify or revise any current content and Services, and this Agreement shall apply to any and all additional Services and/or products and any and all updated, modified or revised Services unless otherwise stipulated. Genius Programs does hereby reserve the right to cancel and cease offering any of the aforementioned Services and/or products. You, as the end user acknowledge, accept and agree that Genius Programs shall not be held liable for any such updates, modifications, revisions, suspensions or discontinuance of any of our Services and/or products. Your continued use of the Services provided, after such posting of any updates, changes, and/or modifications shall constitute your acceptance of such updates, changes and/or modifications, and as such, frequent review of this Agreement and any and all applicable terms and policies should be made by you to ensure you are aware of all terms and policies currently in effect. Should you not agree to the updated, revised or modified terms, you must stop using the provided Services forthwith. Furthermore, the user understands, acknowledges and agrees that the Services offered shall be provided "AS IS" and as such Genius Programs shall not assume any responsibility or obligation for the timeliness, missed delivery, deletion and/or any failure to store user content, communication or personalization settings.

  • Loop Provisioning Involving IDLC 2.16.1 Where TWTC has requested an Unbundled Loop and AT&T uses IDLC systems to provide the local service to the customer and AT&T has a suitable alternate facility available, AT&T will make such alternative facilities available to TWTC. If a suitable alternative facility is not available, then to the extent it is technically feasible, AT&T will implement one of the following alternative arrangements for TWTC (e.g., hairpinning):

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

Time is Money Join Law Insider Premium to draft better contracts faster.