More stringent restrictions Sample Clauses

More stringent restrictions. The Xx- xxxxxx may impose more stringent re- strictions on a savings association’s loans to one borrower if the Director determines that such restrictions are necessary to protect the safety and soundness of the savings association. Appendix to § 560.93—Interpretations
AutoNDA by SimpleDocs

Related to More stringent restrictions

  • Employment Restrictions Executive is not currently a party to any non competition, non-solicitation, confidentiality or other work-related agreement that limits or restricts Executive’s ability to work in any particular field or in any particular geographic region, whether or not such agreement would be violated by this Agreement.

  • Age Restrictions Drivers must be 21 years of age or over.

  • Export Restrictions EXPORT OF THE SOFTWARE IS PROHIBITED BY UNITED STATES LAW. THE FUND MAY NOT UNDER ANY CIRCUMSTANCES RESELL, DIVERT, TRANSFER, TRANSSHIP OR OTHERWISE DISPOSE OF THE SOFTWARE (IN ANY FORM) IN OR TO ANY OTHER COUNTRY. IF CUSTODIAN DELIVERED THE SOFTWARE TO THE FUND OUTSIDE OF THE UNITED STATES, THE SOFTWARE WAS EXPORTED FROM THE UNITED STATES IN ACCORDANCE WITH THE EXPORTER ADMINISTRATION REGULATIONS. DIVERSION CONTRARY TO U.S. LAW IS PROHIBITED. The Fund hereby authorizes Custodian to report its name and address to government agencies to which Custodian is required to provide such information by law.

  • License Restrictions You shall not:

  • Usage Restrictions You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!