NO LIABILITY FOR YOUR CONTENT AND APPLICATIONS Sample Clauses

NO LIABILITY FOR YOUR CONTENT AND APPLICATIONS. In addition to the foregoing, we specifically disclaim all liability, and you shall be solely responsible for the development, operation, and maintenance of your User Content and for all materials that appear on or within your User Content housed on the Service.
AutoNDA by SimpleDocs

Related to NO LIABILITY FOR YOUR CONTENT AND APPLICATIONS

  • Scope and Application This Appendix will apply to all work undertaken within the Employer’s Workshop(s) by employees mainly engaged at the Workshop.

  • Responsibility for Intellectual Property The Company assumes all liabilities and responsibility in connection with all Intellectual Property, and the obligations of the Company hereunder or under the Notes and the Warrants shall in no way be affected or diminished by reason of the loss, destruction, damage or theft of any of the Intellectual Property or its unavailability for any reason.

  • Reporting of Abuse, Neglect, or Exploitation Consistent with provisions of 33 V.S.A. §4913(a) and §6903, Party and any of its agents or employees who, in the performance of services connected with this agreement, (a) is a caregiver or has any other contact with clients and (b) has reasonable cause to believe that a child or vulnerable adult has been abused or neglected as defined in Chapter 49 or abused, neglected, or exploited as defined in Chapter 69 of Title 33 V.S.A. shall: as to children, make a report containing the information required by 33 V.S.A. §4914 to the Commissioner of the Department for Children and Families within 24 hours; or, as to a vulnerable adult, make a report containing the information required by 33 V.S.A. §6904 to the Division of Licensing and Protection at the Department of Disabilities, Aging, and Independent Living within 48 hours. Party will ensure that its agents or employees receive training on the reporting of abuse or neglect to children and abuse, neglect or exploitation of vulnerable adults.

  • Job Postings and Applications ‌ If a vacancy or a new job is created for which union personnel might reasonably be recruited, the following shall apply: (a) If the vacancy or new job has a duration of thirty (30) calendar days or more, the vacancy or new job including salary range, a summary of the job description, the required qualifications, the hours of work, including start and stop times and days off, the work area and the commencement date shall, before being filled, be posted for a minimum of seven (7) calendar days, in a manner which gives all employees access to such information, provided that no employees shall be entitled to relieve other regular employees under this clause on more than two (2) occasions in one calendar year unless the Employer and the Union otherwise agree in good faith. (b) Notwithstanding (a) above, if a temporary absence is one of less than ninety (90) calendar days, the work of the absent employee may be performed by employees working in float pool positions, where float pools exist. (c) Notwithstanding (a) above, if the vacancy is a temporary one of less than ninety (90) calendar days and the work is not being performed by a float employee, the position shall not be posted and instead shall be filled as follows: (i) where practicable by qualified regular employees who have indicated in writing their desire to work in such position consistent with the requirements of Article 14. Should a vacancy under this Article result in backfilling of more than one (1) vacancy (including the initial vacancy) the second (2nd) vacancy may be filled by an employee registered for casual work unless the Employer and the Union agree otherwise in good faith. If the application of this paragraph requires the Employer to pay overtime to the employee pursuant to Article 19, the proposed move shall not be made. An employee who accepts work under this provision is not eligible to work in another Article 16.01(c) assignment that conflicts with the accepted one. Probationary employees and employees undergoing a qualifying period shall not be considered for a 16.01(c) assignment in a different classification. (ii) by employees registered for casual work in accordance with the casual addendum. (iii) in cases of unanticipated or unplanned temporary absences, such temporary absence may first be filled under (c)(ii) for a period of up to seven (7) days. (d) A part-time employee who has accepted a casual assignment which conflicts with a temporary vacancy referred to in paragraph (c)(i) above shall be considered unavailable for such temporary vacancy. A part-time employee who has accepted a temporary vacancy referred to in paragraph (c)(i) above which conflicts with a casual assignment shall be considered unavailable for such casual assignment. Where an employee declines an offer to work under (c)(i) the Employer need not offer the work again to that employee under (c)(ii), if she/he is also registered for casual work. (e) Existing local agreements will be in force and effect (including termination clauses) unless changed by mutual agreement by the parties at the local level. (f) Where the local agreement covering access to work by part-time employees (former “15.01c”) does not contain a termination clause, the agreement may be terminated on giving of six (6) months’ notice by either party. (g) By mutual agreement, the parties may vary the job posting process set out in Article 16.01.

  • Intellectual Property Rights and Indemnification Any intellectual property which originates from or is developed by a Party shall remain in the exclusive ownership of that Party. No license in patent, copyright, trademark or trade secret, or other proprietary or intellectual property right now or hereafter owned, controlled or licensable to a Party, is granted to the other Party or shall be implied or arise by estoppel. It is the responsibility of each Party to ensure at its own cost that it has obtained any necessary licenses in relation to intellectual property of third Parties used by it to receive any service or to perform its respective obligations under this Agreement.

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Monopolies and Exclusive Service Suppliers 1. Each Party shall ensure that any monopoly supplier of a service in its territory does not, in the supply of the monopoly service in the relevant market, act in a manner inconsistent with that Party's Schedule of specific commitments. 2. Where a Party's monopoly supplier competes, either directly or through an affiliated company, in the supply of a service outside the scope of its monopoly rights and which is subject to that Party's Schedule of specific commitments, the Party shall ensure that such a supplier does not abuse its monopoly position to act in its territory in a manner inconsistent with such commitments. 3. If a Party has reason to believe that a monopoly supplier of a service of the other Party is acting in a manner inconsistent with paragraphs 1 or 2 above, it may request that Party establishing, maintaining or authorising such supplier to provide specific information concerning the relevant operations. 4. The provisions of this Article shall also apply to cases of exclusive service suppliers, where a Party, formally or in effect: (a) authorises or establishes a small number of service suppliers; and (b) substantially prevents competition among those suppliers in its territory.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Purpose and Application This document (“DPA”) is incorporated into the Agreement and forms part of a written (including in electronic form) contract between SAP and Customer. This DPA applies to Personal Data processed by SAP and its Subprocessors in connection with its provision of the Cloud Service. This DPA does not apply to non-production environments of the Cloud Service if such environments are made available by SAP, and Customer shall not store Personal Data in such environments.

  • Protection and Registration of Intellectual Property Rights (a) Each Co-Borrower shall (i) protect, defend and maintain the validity and enforceability of its Intellectual Property material to Borrower’s business; (ii) promptly advise Bank in writing of material infringements or any other event that could reasonably be expected to materially and adversely affect the value of its Intellectual Property material to Borrower’s business; and (iii) not allow any Intellectual Property material to a Co-Borrower’s business to be abandoned, forfeited or dedicated to the public without Bank’s written consent. (b) If a Co-Borrower (i) obtains any Patent, registered Trademark, registered Copyright, registered mask work, or any pending application for any of the foregoing, whether as owner, licensee or otherwise, or (ii) applies for any Patent or the registration of any Trademark, then such Co-Borrower shall, within the later of (A) fifteen (15) days from the date of such application or (B) on the next Compliance Certificate delivered in accordance with the terms of Section 6.2 hereof, provide written notice thereof to Bank and shall execute such intellectual property security agreements and other documents and take such other actions as Bank may request in its good faith business judgment to perfect and maintain a first priority perfected security interest in favor of Bank in such property. If a Co-Borrower decides to register any Copyrights or mask works in the United States Copyright Office, such Co-Borrower shall: (x) provide Bank with at least fifteen (15) days prior written notice of such Co-Borrower’s intent to register such Copyrights or mask works together with a copy of the application it intends to file with the United States Copyright Office (excluding exhibits thereto); (y) execute an intellectual property security agreement and such other documents and take such other actions as Bank may request in its good faith business judgment to perfect and maintain a first priority perfected security interest in favor of Bank in the Copyrights or mask works intended to be registered with the United States Copyright Office; and (z) record such intellectual property security agreement with the United States Copyright Office contemporaneously with filing the Copyright or mask work application(s) with the United States Copyright Office. Each Co-Borrower shall promptly provide to Bank copies of all applications that it files for Patents or for the registration of Trademarks, Copyrights or mask works, together with evidence of the recording of the intellectual property security agreement required for Bank to perfect and maintain a first priority perfected security interest in such property.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!