New Use of Symphonic Recording Sample Clauses

New Use of Symphonic Recording. Notwithstanding the provisions of Article 21, at page 7, in the event that a symphonic recording is used in a television or theatrical motion picture, the Company shall pay to all persons who were covered on the original Form B session report an amount equal to 50% of the payments (including, without limitation, pension contributions, but excluding health and welfare contributions) that would be required under the television and theatrical motion picture agreements that would then apply if the recording were February 1, 2002 – January 31, 2005 originally made for a motion picture, but only if all of the following conditions are satisfied:
AutoNDA by SimpleDocs

Related to New Use of Symphonic Recording

  • Photographic/Recording Release I hereby grant and convey unto the Released Parties all right, title and interest in any and all photographs and video/audio/electronic recordings of me, including as to my name, image and voice, made by or on behalf of any of the Released Parties during my Activities with the Released Parties, including, but not limited to, the right to use such materials for any purpose and to any royalties, proceeds or other benefits derived from them. I understand that I will not have any ownership interest in or to such photographs, images and/or recordings, I have not been provided or promised any compensation to me, and I hereby waive any rights, privileges or claims based on any right of publicity, privacy, ownership or any other rights arising, relating to or resulting from the photographs, images and/or recordings. I understand and agree that this paragraph also applies to my minor child(ren) who are volunteering.

  • Electronic Record Search The Reporting Financial Institution must review electronically searchable data maintained by them for any of the following indicia:

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Electronic Records You acknowledge and agree that we may in our discretion store all records electronically; and that we will not retain and have no obligation to retain any original documents for any period of time. This applies to all documentation including but not limited to checks, transaction records, notes, mortgages, deeds of trust and other loan and/or security documentation. We will routinely destroy all original documentation. We may store records electronically via imaging, scanning, filming or other technology used in the financial services industry for the storage of documentation via internal processes or third-party processors that we approve for these services. You agree that such storage shall be secure, and further agree that such records shall for all purposes be recognized and admissible in evidence or otherwise to prove the agreements, rights and obligations of the parties pursuant to any such records.

  • Telephone Monitoring and Recording You consent to and authorize us and any of our affiliates, agents and marketing associates to monitor and/or record any of your telephone conversations with any of our or their representatives for quality control, training and other lawful purposes.

  • Accuracy and data minimisation (a) Each Party shall ensure that the personal data is accurate and, where necessary, kept up to date. The data importer shall take every reasonable step to ensure that personal data that is inaccurate, having regard to the purpose(s) of processing, is erased or rectified without delay.

  • Public Records Request (09/17) Contractor acknowledges that the City of Portland is subject to the Oregon Public Records Act and Federal law. Third persons may claim that the Confidential Information Contractor submitted to the City hereunder may be, by virtue of its possession by the City, a public record and subject to disclosure pursuant to the Oregon Public Records Act. The City’s commitments to maintain certain information confidential under this Contract are all subject to the constraints of Oregon and federal laws. All information submitted by Contractor is public record and subject to disclosure pursuant to the Oregon Public Records Act, except such portions for which Contractor requests and meets an exemption from disclosure consistent with federal or Oregon law. Within the limits and discretion allowed by those laws, the City will maintain the confidentiality of information.

  • Data Deletion As stated in the Student Data Transfer or Destruction Section of this Agreement, Provider shall ensure that all Student Data in its possession and in the possession of any subcontractors, or agents to whom Provider may have transferred Student Data, is destroyed or, as directed by the Board, transferred to the Board in a format determined by the Board within the time periods provided in the Student Data Transfer or Destruction Section of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.