Liability for Unauthorized Use If any Card is lost or stolen or otherwise may be used without your permission (express or implied), you must immediately notify us orally or in writing at the following phone number or address: 0-000-000-0000 or at TIB, National Association, P.O Box 569120, Dallas, Texas 75356-9120. If unauthorized use of a Card occurs before you notify us of the loss, theft or unauthorized use, you may be liable up to a maximum amount of $50. If unauthorized use of a Credit Device occurs, you may be liable for all of the unauthorized use.
Use Tenant shall use the Premises only for the purposes stated in Item 3 of the Basic Lease Provisions, all in accordance with applicable laws and restrictions and pursuant to approvals to be obtained by Tenant from all relevant and required governmental agencies and authorities. The parties agree that any contrary use shall be deemed to cause material and irreparable harm to Landlord and shall entitle Landlord to injunctive relief in addition to any other available remedy. Tenant, at its expense, shall procure, maintain and make available for Landlord’s inspection throughout the Term, all governmental approvals, licenses and permits required for the proper and lawful conduct of Tenant’s permitted use of the Premises. Tenant shall not do or permit anything to be done in or about the Premises which will in any way interfere with the rights of other occupants of the Building or the Project, or use or allow the Premises to be used for any unlawful purpose, nor shall Tenant permit any nuisance or commit any waste in the Premises or the Project. Tenant shall not perform any work or conduct any business whatsoever in the Project other than inside the Premises. Tenant shall not do or permit to be done anything which will invalidate or increase the cost of any insurance policy(ies) covering the Building, the Project and/or their contents, and shall comply with all applicable insurance underwriters rules. Tenant shall comply at its expense with all present and future laws, ordinances, restrictions, regulations, orders, rules and requirements of all governmental authorities that pertain to Tenant or its use of the Premises, including without limitation all federal and state occupational health and safety requirements, whether or not Tenant’s compliance will necessitate expenditures or interfere with its use and enjoyment of the Premises. Tenant shall comply at its expense with all present and future covenants, conditions, easements or restrictions now or hereafter affecting or encumbering the Building and/or Project, and any amendments or modifications thereto, including without limitation the payment by Tenant of any periodic or special dues or assessments charged against the Premises or Tenant which may be allocated to the Premises or Tenant in accordance with the provisions thereof. Tenant shall promptly upon demand reimburse Landlord for any additional insurance premium charged by reason of Tenant’s failure to comply with the provisions of this Section, and shall indemnify Landlord from any liability and/or expense resulting from Tenant’s noncompliance.
No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.
Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.
Collaboration on Compliance and Enforcement A Competent Authority will notify the other Competent Authority when the first-mentioned Competent Authority has reason to believe that an error may have led to incorrect or incomplete information reporting or there is non-compliance by a Reporting Financial Institution with the applicable reporting requirements and due diligence procedures consistent with the Common Reporting Standard. The notified Competent Authority will take all appropriate measures available under its domestic law to address the errors or non-compliance described in the notice.
No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.
Cooperation of the Parties The Seller undertakes to notify the Buyer of any obstacles on his part, which may negatively influence proper and timely delivery of the Equipment.
Familiarity with Work By executing this Agreement, Consultant warrants that Consultant (i) has thoroughly investigated and considered the scope of services to be performed, (ii) has carefully considered how the services should be performed, and (iii) fully understands the facilities, difficulties and restrictions attending performance of the services under this Agreement. If the services involve work upon any site, Consultant warrants that Consultant has or will investigate the site and is or will be fully acquainted with the conditions there existing, prior to commencement of services hereunder. Should the Consultant discover any latent or unknown conditions, which will materially affect the performance of the services hereunder, Consultant shall immediately inform the City of such fact and shall not proceed except at Consultant’s risk until written instructions are received from the Contract Officer.
Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.
Responsibility For Use (a) The Company alone will be responsible for furnishing, or arranging for a third party to furnish, all data and information required by the Documentation and the specifications therein for the Licensed System to function and perform in accordance with the Documentation, other than the data and information residing in the Licensed System in connection with BNYM’s performance of the Core Services. BNYM shall have no liability or responsibility for any Loss caused in whole or in part by the Company’s or a Permitted User’s exercise of the Licensed Rights or use of the Licensed System or by data or information of any nature inputted into the Licensed System by or under the direction or authorization of Company or a Permitted User; provided, however, this Section 2.5 shall not relieve BNYM of its obligation to act in accordance with its obligations under the Main Agreement. Company shall be responsible and solely liable for the cost or expense of regenerating any output or other remedial action if the Company, a Permitted User or an agent of either shall have failed to transmit properly and in the correct format any data or information, shall have transmitted erroneous or incorrect information or data, or shall have failed to timely verify or reconcile any such data or information when it is generated by the Licensed System (“Data Faults”).