Mobile Application If Red Hat offers products and services through applications available on your wireless or other mobile Device (such as a mobile phone) (the "Mobile Application Services"), these Mobile Application Services are governed by the applicable additional terms governing such Mobile Application Service. Red Hat does not charge for these Mobile Application Services unless otherwise provided in the applicable additional terms. However, your wireless carrier's standard messaging rates and other messaging, data and other rates and charges will apply to certain Mobile Application Services. You should check with your carrier to find out what plans your carrier offers and how much the plans cost. In addition, the use or availability of certain Mobile Application Services may be prohibited or restricted by your wireless carrier, and not all Mobile Application Services may work with all wireless carriers or Devices. Therefore, you should check with your wireless carrier to find out if the Mobile Application Services are available for your wireless Device, and what restrictions, if any, may be applicable to your use of such Mobile Application Services.
PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.
General Application The rules set forth below in this Article VI shall apply for the purposes of determining each Member’s allocable share of the items of income, gain, loss and expense of the Company comprising Net Income or Net Loss for each Fiscal Year, determining special allocations of other items of income, gain, loss and expense, and adjusting the balance of each Member’s Capital Account to reflect the aforementioned general and special allocations. For each Fiscal Year, the special allocations in Section 6.03 hereof shall be made immediately prior to the general allocations of Section 6.02 hereof.
Rights Protection Mechanisms and Abuse Mitigation ‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.
Root-‐zone Information Publication ICANN’s publication of root-‐zone contact information for the TLD will include Registry Operator and its administrative and technical contacts. Any request to modify the contact information for the Registry Operator must be made in the format specified from time to time by ICANN at xxxx://xxx.xxxx.xxx/domains/root/.
Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.
Regulatory Applications (a) Western and PNB and their respective Subsidiaries shall cooperate and use their respective reasonable best efforts to prepare all documentation, to effect all filings and to obtain all permits, consents, approvals and authorizations of all third parties and Governmental Authorities necessary to consummate the transactions contemplated by this Agreement. Western and PNB shall use their reasonable best efforts to make all required bank regulatory filings, including the appropriate filing with the Regulatory Authorities. Each of Western and PNB shall have the right to review in advance, and to the extent practicable each will consult with the other, in each case subject to applicable laws relating to the exchange of information, with respect to all material written information submitted to any third party or any Governmental Authority in connection with the transactions contemplated by this Agreement. In exercising the foregoing right, each of the parties hereto agrees to act reasonably and as promptly as practicable. Each party hereto agrees that it will consult with the other party hereto with respect to the obtaining of all material permits, consents, approvals and authorizations of all third parties and Governmental Authorities necessary or advisable to consummate the transactions contemplated by this Agreement and each party will keep the other party appraised of the status of material matters relating to completion of the transactions contemplated hereby. (b) Each party agrees, upon request, to furnish the other party with all information concerning itself, its Subsidiaries, directors, officers and shareholders and such other matters as may be reasonably necessary or advisable in connection with any filing, notice or application made by or on behalf of such other party or any of its Subsidiaries to any third party or Governmental Authority.
Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.
Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.
Patent Applications It is understood by the parties that, pursuant to the Baylor Technology Transfer Agreement, MAS has the initial responsibility for filing, prosecution and maintenance of Patents and Patent Applications covering the Baylor Technology. The parties agree that, as between MAS and CTI, MAS shall be responsible for deciding whether and how to file, prosecute and maintain the Patents and Patent Applications, provided that: (a) all decisions of MAS (whether substantive or procedural) concerning whether and how to file, prosecute and/or maintain any Patents and Patent Applications shall be acceptable to CTI, such acceptance not to be unreasonably withheld; (b) with respect to any action permitted under Section 5.5 of the Baylor Technology Transfer Agreement or Section 5.5 of this Agreement, MAS will use legal counsel reasonably acceptable to CTI; (c) MAS will provide CTI with (i) drafts of all filings relating to the Patents and Patent Applications and (ii) drafts of all correspondence to be sent by MAS to Baylor, the Patent and Trademark Office (the “PTO”) or any third party relating to the Patents and Patent Applications. Final versions of all such filings and correspondence shall be acceptable to CTI, such acceptance not to be unreasonably withheld; (d) MAS will promptly provide CTI with copies of any notices and other correspondence received by CTI from Baylor, the PTO or any other third party relating to the Patents and Patent Applications, including, but not limited to, any notices received by MAS pursuant to Section 5.5 of the Baylor Technology Transfer Agreement; (e) MAS will, if requested by CTI, provide notice to Baylor under any of the circumstances permitting notice pursuant to Section 5.5 of the Baylor Technology Transfer Agreement; (f) MAS agrees to cooperate with CTI to whatever extent is reasonably necessary to procure patent protection of any rights regarding the Licensed Technology and agrees to execute any and all documents to give CTI the full benefit of the sublicenses and licenses granted herein; (g) MAS represents and warrants that, as of the Effective Date, it has not received any notices from Baylor pursuant to Section 5.5(c) or Section 5.5(d) of the Baylor Technology Transfer Agreement. In the event MAS receives any notices from Baylor pursuant to Section 5.5(c) or Section 5.5(d) of the Baylor Technology Transfer Agreement after the Effective Date. MAS will provide a copy of such notice to CTI within five (5) business days of receipt of such notice by MAS. MAS will then take all actions requested by CTI to allow CTI to retain its rights granted under this Agreement, including, but not limited to, promptly notifying Baylor in the event CTI wishes MAS to proceed with any actions in connection with the Patents or Patent Applications.