Interference with University Systems Sample Clauses

Interference with University Systems. The Tenant shall not connect, use, or otherwise install any information technology device, system, hardware, or software that interferes with the University Systems. Before connecting any Non-University System to a University System, the Tenant shall consult and coordinate with the University and provide the University with information required to ensure that such Non-University System will not interfere, disrupt, effect, or otherwise erode the security, integrity, or availability of any University System. The Tenant shall be solely responsible for any and all damage, including, but not limited to down times, damage, and data loss or disruption, resulting from connecting any such information technology device to a University System without authorization under this Section 9.1 or in violation of University policy.
AutoNDA by SimpleDocs

Related to Interference with University Systems

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Conduct of Research The Parties shall use Diligent Efforts to conduct their respective tasks, as assigned under the Research Plan, throughout the Mode of Action Program and shall conduct the Mode of Action Program in good scientific manner, and in compliance in all material respects with the requirements of applicable laws, rules and regulations and all applicable good laboratory practices to attempt to achieve their objectives efficiently and expeditiously.

  • Maintenance of Intellectual Property The Company will, and will cause each of its Subsidiaries to, take all reasonable action necessary or advisable to maintain all of the Intellectual Property Rights of the Company and/or any of its Subsidiaries that are necessary or material to the conduct of its business in full force and effect.

  • Tenant’s Compliance With Landlord’s Fire and Casualty Insurance Tenant shall, at Tenant’s expense, comply with all insurance company requirements pertaining to the use of the Premises. If Tenant’s conduct or use of the Premises causes any increase in the premium for such insurance policies then Tenant shall reimburse Landlord for any such increase. Tenant, at Tenant’s expense, shall comply with all rules, orders, regulations or requirements of the American Insurance Association (formerly the National Board of Fire Underwriters) and with any similar body.

  • Maintenance of Existence and Conduct of Business Each Credit Party shall: do or cause to be done all things necessary to preserve and keep in full force and effect its corporate existence and its rights and franchises; continue to conduct its business substantially as now conducted or as otherwise permitted hereunder; at all times maintain, preserve and protect all of its assets and properties used or useful in the conduct of its business, and keep the same in good repair, working order and condition in all material respects (taking into consideration ordinary wear and tear) and from time to time make, or cause to be made, all necessary or appropriate repairs, replacements and improvements thereto consistent with industry practices; and transact business only in such corporate and trade names as are set forth in Disclosure Schedule (5.1).

  • License of Intellectual Property Each Party (a “Licensor”) grants the other Party (a “Licensee”) the non-exclusive, royalty-free, paid-up, worldwide, irrevocable, right, during the term of this Agreement, to use the Licensor’s Intellectual Property solely for the purposes of this Agreement and to carry out the Party’s functions consistent with its responsibilities and authority as set forth in the enable legislation and regulations. Such licenses shall not give the Licensee any ownership interest in or rights to the Intellectual Property of the Licensor. Each Licensee agrees to abide by all third-party license and confidentiality restrictions or obligations applicable to the Licensor’s Intellectual Property of which the Licensor has notified the Licensee in writing.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!