Independent Access Sample Clauses

Independent Access. If USER requests independent access to the Nano3 Facility, Nano3 hereby grants to USER permission to independently access the Nano3 Facility, subject to USER’s full compliance with all Nano3 Policies and Procedures, including, but not limited to, the following: (a) attendance and completion of the UC Laboratory Safety Fundamentals training and submission of a copy of USER’s certificate of completion to Nano3; (b) completion of the Nano3 Policies and Procedures examination; and (c) attendance at the Nano3 Safety Orientation.
AutoNDA by SimpleDocs
Independent Access. Each Obligor has adequate means to obtain from each other Obligor, on a continuing basis, information concerning the condition, financial and otherwise, of all other Obligors, and the Obligors are not relying on Lender to furnish such information either now or in the future. Neither Lender, nor any Affiliate of Lender, nor any of its or their employees, attorneys, accountants, appraisers or other consultants or advisers have made any representations, warranties or agreements of any kind to or with the Principals, EHI, or the other Obligors, regarding the Stock Purchase Agreement or the matters and transactions contemplated thereby, or the businesses and assets that are directly or indirectly the subject matter thereof.
Independent Access. The network is provided for students to conduct research and communicate with others. Independent access to network services is provided to students who agree to act in a considerate and responsible manner. Parent permission is required for minors. Access is a privilege, not a right. Access entails responsibility. Internet Rules and Regulations Students are responsible for good behavior on school computer networks just as they are in a classroom or a school hallway. Communications on the network are often public in nature. E-mail access may be given to students for school-related assignments. Access to chat rooms will be blocked and instant messaging will be blocked as much as possible. General school rules for behavior and communications apply. Individual users of the District computer networks are responsible for their behavior and communications over those networks. It is presumed that users will comply with District standards and will honor the agreements they have signed. Network storage areas are considered property of the School District. Network administrators may review files and communications to maintain system integrity and insure that users are using the system responsibly. Users should not expect that files stored on District servers will always be private and the District reserves the right to inspect files. The District uses a filtering system to limit student access to material that is harmful to students, obscene or disruptive to the educational or work environment, and to a lesser degree, high risk activities. The District reserves the right to block sites that do not enhance educational activities or development. The District shall be in compliance with the Children’s Internet Protection Act (CIPA). No technology measure can block 100% of inappropriate content so the District emphasizes the importance of staff supervision in monitoring student use of technology. Acceptable Use
Independent Access. The NRC will have access to DOE's facilities as ; necessary to review and monitor project scope, schedule and funding. ,

Related to Independent Access

  • Independent Activities 14.1 Except as expressly provided herein, each party shall have the free and unrestricted right to independently engage in and receive the full benefit of any and all business endeavours of any sort whatsoever, whether or not competitive with the endeavours contemplated herein without consulting the other or inviting or allowing the other to participate therein. No party shall be under any fiduciary or other duty to the other which will prevent it from engaging in or enjoying the benefits of competing endeavours within the general scope of the endeavours contemplated herein. The legal doctrines of "corporate opportunity" sometimes applied to persons engaged in a joint venture or having fiduciary status shall not apply in the case of any party. In particular, without limiting the foregoing, no party shall have any obligation to any other party as to:

  • Independent Accountant Xxxxxxxx LLP (the “Accountant”), which has expressed its opinions with respect to the audited financial statements (which term as used in this Agreement includes the related notes thereto) of the Company filed with the Commission as a part of the Registration Statement and included in the Disclosure Package and the Prospectus, is an independent registered public accounting firm as required by the Securities Act and the Exchange Act.

  • Auditor 28.2.1 The Department (in accordance with Post-16 audit code of practice - XXX.XX (xxx.xxx.xx)), the European Commission, the European Court of Auditors and/or a Crown Body may at any time conduct audits for the following purposes:-

  • Independent Accountants The accountants who certified the financial statements and supporting schedules included in the Registration Statement are independent public accountants as required by the 1933 Act and the 1933 Act Regulations.

  • Independent Auditor The Company’s independent auditor, if any, shall be an independent public accounting firm selected by the Member, which may also be the Member’s independent auditor.

  • Independent Parties This Agreement shall not be deemed to create any partnership, joint venture, or agency relationship between the Parties. Each Party shall act hereunder as an independent contractor.

  • Independent Review Contractor shall provide the Secretary of ADS/CIO an independent expert review of any Agency recommendation for any information technology activity when its total cost is $1,000,000.00 or greater or when CIO requires one. The State has identified two sub-categories for Independent Reviews, Standard and Complex. The State will identify in the SOW RFP the sub-category they are seeking. State shall not consider bids greater than the maximum value indicated below for this category. Standard Independent Review $25,000 Maximum Complex Independent Review $50,000 Maximum Per Vermont statute 3 V.S.A. 2222, The Secretary of Administration shall obtain independent expert review of any recommendation for any information technology initiated after July 1, 1996, as information technology activity is defined by subdivision (a) (10), when its total cost is $1,000,000 or greater or when required by the State Chief Information Officer. Documentation of this independent review shall be included when plans are submitted for review pursuant to subdivisions (a)(9) and (10) of this section. The independent review shall include: • An acquisition cost assessment • A technology architecture review • An implementation plan assessment • A cost analysis and model for benefit analysis • A procurement negotiation advisory services contract • An impact analysis on net operating costs for the agency carrying out the activity In addition, from time to time special reviews of the advisability and feasibility of certain types of IT strategies may be required. Following are Requirements and Capabilities for this Service: • Identify acquisition and lifecycle costs; • Assess wide area network (WAN) and/or local area network (LAN) impact; • Assess risks and/or review technical risk assessments of an IT project including security, data classification(s), subsystem designs, architectures, and computer systems in terms of their impact on costs, benefits, schedule and technical performance; • Assess, evaluate and critically review implementation plans, e.g.: • Adequacy of support for conversion and implementation activities • Adequacy of department and partner staff to provide Project Management • Adequacy of planned testing procedures • Acceptance/readiness of staff • Schedule soundness • Adequacy of training pre and post project • Assess proposed technical architecture to validate conformance to the State’s “strategic direction.” • Insure system use toolsets and strategies are consistent with State Chief Information Officer (CIO) policies, including security and digital records management; • Assess the architecture of the proposed hardware and software with regard to security and systems integration with other applications within the Department, and within the Agency, and existing or planned Enterprise Applications; • Perform cost and schedule risk assessments to support various alternatives to meet mission need, recommend alternative courses of action when one or more interdependent segment(s) or phase(s) experience a delay, and recommend opportunities for new technology insertions; • Assess the architecture of the proposed hardware and software with regard to the state of the art in this technology. • Assess a project’s backup/recovery strategy and the project’s disaster recovery plans for adequacy and conformance to State policy. • Evaluate the ability of a proposed solution to meet the needs for which the solution has been proposed, define the ability of the operational and user staff to integrate this solution into their work.

  • Independent Auditors The Company shall, until at least the Termination Date, maintain as its independent auditors an accounting firm authorized to practice before the SEC.

  • Obligation to Provide Information Each party’s obligation to provide information shall be as follows:

  • Independent Managers Of the authorized number of Managers provided in Section 7.03 hereof, the Board shall at all times have at least two individuals who are Independent Managers (as defined in Section 7.16) who are acting as Managers. So long as any Securities are outstanding, this Section shall not be amended, altered or repealed without the written consent of 100% of the Board (including Independent Managers) with notice of such amendment provided promptly to each Rating Agency. To the fullest extent permitted by law, including Section 18-1101(c) of the Act, and notwithstanding any duty otherwise existing at law or in equity, the Independent Managers shall consider only the interests of the Company, including its creditors, in acting or otherwise voting on the matters referred to in Section 5.02. Except for duties to the Company as set forth in the immediately preceding sentence (including duties to the Member and the Company’s creditors solely to the extent of their respective economic interests in the Company but excluding (i) all other interests of the Member, (ii) the interests of other Affiliates of the Company, and (iii) the interests of any group of Affiliates of which the Company is a part), the Independent Managers shall not have any fiduciary duties to the Member or any other Person bound by this Agreement; provided, however, the foregoing shall not eliminate the implied contractual covenant of good faith and fair dealing. To the fullest extent permitted by law, including Section 18-1101(e) of the Act, an Independent Manager shall not be liable to the Company, the Member or any other Person bound by this Agreement for breach of contract or breach of duties (including fiduciary duties), unless the Independent Manager acted in bad faith or engaged in willful misconduct. No resignation or removal of an Independent Manager, and no appointment of a successor Independent Manager, shall be effective until such successor shall have executed a counterpart to this Agreement. In the event of a vacancy in the position of Independent Manager, the Member shall, as soon as practicable, appoint a successor Independent Manager. All right, power and authority of the Independent Managers shall be limited to the extent necessary to exercise those rights and perform those duties specifically set forth in this Agreement and the Independent Managers shall otherwise have no authority to bind the Company. No Independent Manager shall at any time serve as trustee in bankruptcy for any Affiliate of the Company.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!