Manners of Use Sample Clauses

Manners of Use. Personal information shall be used / processed by automatic machines or non-automatic measures in compliance with the relevant personal information protection laws and regulations. 四、依據個資法第三條規定,立約人就銀行保有立約人之個人資料得行使下列權利:
AutoNDA by SimpleDocs
Manners of Use. As a condition for the provision of the above services, the Insurance Company will require to be immediately advised by a telephone call indicating: − The Name of the Policy Holder / Insured Person; − The Number of the Policy; − The address, the phone number and the service requested. Except in respect of the guarantees expressly identified herein as being free, the Insured will be required to settle the invoice for the requested intervention. This contract will not guarantee the provision of services not previously requested from the Assistance Service or which are provided without the agreement thereof, except in cases of force majeure or of proven material impossibility to make such request.

Related to Manners of Use

  • Manner of Use Tenant shall not cause or permit the Property to be used in any way which constitutes a violation of any law, ordinance, or governmental regulation or order, which annoys or interferes with the rights of tenants of the Project, or which constitutes a nuisance or waste. Tenant shall obtain and pay for all permits, including a Certificate of Occupancy, required for Tenant's occupancy of the Property and shall promptly take all actions necessary to comply with all applicable statutes, ordinances, rules, regulations, orders and requirements regulating the use by Tenant of the Property, including the Occupational Safety and Health Act.

  • Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.

  • Users Licensee is responsible for each User’s compliance with this XXXX. Licensee will ensure that all use of the Software by Users is in accordance with the terms of this XXXX.

  • Rosters 8.1 As far as practically possible, the Employer will draw up a roster 1 week in advance. Changes to rosters may occur with 24 hours notice or, subject to the availability of the Employee, with less notice if by mutual consent.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Terms of Use 1. The Contribution will be made Open Access under the terms of the Creative Commons Attribution License which permits use, distribution and reproduction in any medium, provided that the Contribution is properly cited.

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • Authorized User Overview and Mini-Bid Process Project Based IT Consulting Services Contracts enable Authorized Users to use a competitive Mini-bid Process to acquire Services on an as-needed basis, for qualified IT Projects. Project Based IT Consulting Services may include, but will not be limited to projects requiring: analysis, data classification, design, development, testing, quality assurance, security and associated training for Information Technology based applications. See section 1.3 Out of Scope Work for a listing of projects expressly excluded from the scope of this Contract. An Authorized User Agreement for Project Based IT Consulting Services will be governed first by the terms and conditions specified in the OGS Centralized Contract and second by terms and conditions added to the Authorized User Statement of Work. Additional terms and conditions shall not conflict with or modify the terms and conditions of the OGS Centralized Contract. NYS Executive Agencies must adhere to all internal processes and approvals including, as required, approval from NYS Office of Information Technology Services. Other Authorized Users must adhere to their own internal processes and approvals. In accordance with Appendix B, section 28, Modification of Contract Terms, an Authorized User may add additional required terms and conditions to this Mini-Bid and resultant Authorized User Agreement only if such terms and conditions (1) are more favorable to the Authorized User and (2) do not conflict with or supersede the OGS Centralized Contract terms and conditions. Examples of additional terms and conditions include: • Expedited delivery timeframe; • Additional incentives, such as discount for expedited payment/Procurement Card use; and • Any additional requirements imposed by the funding source or Federal law.

  • Scope of Use The Fund will use the System and the Data Access Services only for the processing of securities transactions, the keeping of books of account for the Fund and accessing data for purposes of reporting and analysis. The Fund shall not, and shall cause its employees and agents not to (i) permit any unauthorized third party to use the System or the Data Access Services, (ii) sell, rent, license or otherwise use the System or the Data Access Services in the operation of a service bureau or for any purpose other than as expressly authorized under this Addendum, (iii) use the System or the Data Access Services for any fund, trust or other investment vehicle), other than as set forth herein, without the prior written consent of State Street, (iv) allow access to the System or the Data Access Services through terminals or any other computer or telecommunications facilities located outside the Designated Locations, (v) allow or cause any information (other than portfolio holdings, valuations of portfolio holdings, and other information reasonably necessary for the management or distribution of the assets of the Fund) transmitted from State Street’s databases, including data from third party sources, available through use of the System or the Data Access Services to be redistributed or retransmitted to another computer, terminal or other device for other than use for or on behalf of the Fund or (vi) modify the System in any way, including without limitation developing any software for or attaching any devices or computer programs to any equipment, system, software or database which forms a part of or is resident on the Designated Configuration.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

Time is Money Join Law Insider Premium to draft better contracts faster.