Program Integrity The state must have processes in place to ensure that there is no duplication of federal funding for any aspect of the demonstration.
XXXXEAS Employer is engaged in the telephone and telecommunication installation and service, and manufacture sale and installation of highway signs and traffic control products.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Contract (Rights of Third Parties) Xxx 0000 22.1 No person who is not a party to this Grant Agreement shall have the right to enforce any of its terms.
Anti-Piracy In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditional Access System and Subscriber Management System as set out in ANNEXURE X attached herewith. If so instructed by Information (as defined below) by ZEEL, the IPTV Operator shall shut off or de-authorize the transmission to any unauthorized subscriber/ subscriber indulging in piracy, within ten minutes from the time it receives such instruction from ZEEL. Any communication under this Clause shall be considered as valid Information only if (i) the information is sent through e-mail in a format as mutually agreed by the parties and (ii) the information is sent by a person(s) who is designated to send such information. However, the “information” may even be provided by ZEEL representatives through other means of communications such as telephonic message, fax etc. and the said “information” shall later be confirmed by ZEEL through e-mail and the IPTV Operator shall be under obligation to act upon such information.
The Card (a) The Card shall be used by the Cardholder and any additional Card shall be used by the Authorized Cardholder exclusively and always within the limits of the balance available in the Card Account and/or the credit limit approved by the Bank and notified to the Cardholder and/or the holder of the Card Account from time to time in a manner the Bank deems appropriate, subject to the provisions of paragraph 15. It is understood that the initial limit will be notified to the Cardholder upon delivery of the Card. In case the Cardholder wishes to have a lower limit or a higher limit he should notify the Bank accordingly. (b) The Cardholder and, where applicable, the Authorized Cardholder is not entitled to use the Card or the additional Card, respectively, in excess of the limit which is mentioned above. If, however, for any reason the Cardholder and/or the Authorized Cardholder exceeds such limits, the Cardholder and/or the holder of the Card Account and/or the Authorized Cardholder undertakes to settle the unauthorized overdraft plus interest and/or any other charges, immediately upon the Bank's request, subject to the provisions of any applicable law and in accordance with the operating terms of the abovementioned Card Account and the Cards Terms and Conditions. (c) The Card is the property of the Bank. The Cardholder must return his Card and any additional Card to the Bank on demand. The Bank may from time to time issue new Cards of a type different to the one the Cardholder applied for, in parallel and/or to replace the existing ones. The signature of the application form and of this Agreement for the issuance of a Card shall be deemed as an application of the Cardholder for the issuance of any new Cards to the Cardholder and the Authorized Cardholder, where applicable, as explained above. If the type of Card changes, the number of the Card and, where applicable, the number of the Card Account may also change. If the Cardholder and/or the holder of the Card Account does not agree with such change, the Agreement may be terminated according to paragraph 11 below, without any charge. (d) The Cardholder and/or the Authorized Cardholder should use the Card and/or the additional Card, respectively, only during the validity period shown on it. (e) Unless otherwise provided in these Cards Terms and Conditions, the Cardholder and/or the holder of the Card Account are liable to the Bank for all Transactions that incur from the use of the Card and irrevocably authorize the Bank to settle all Transactions by debiting the Card Account. Where applicable, and in accordance to any applicable law, the Authorized Cardholder may also be liable for his acts and omissions. (f) In the context of offering a better quality of service to the Bank’s customers, the Contactless Payments service is provided, in order to render Transactions faster and easier. During the use of this service, the Card does not come into direct contact with the terminal. For Transactions below a certain amount, which remains in restricted levels for security purposes, there is no need to enter a PIN or signature. (g) The Card must not be used to obtain goods, tickets or services for resale in the course of a business or return for cash. (h) When using the Card, the Cardholder and the Authorized Cardholder must comply with all applicable laws. (i) The Card must not be used for illegal purposes.
Analytics 1.1. IFS may track and analyze the usage of the IFS Offering for purposes of determining usage made of the IFS Offering, for the purposes of security, to assist customers, and for improving the Software and Services and the user experience in using such Software and Services. For example, IFS may use this information to help customers derive more value from the Software and Services, to understand and analyze trends, or to track which features are used most often in order to improve the Software and Services. IFS may share anonymous usage data with its service providers for the purpose of helping in such tracking, analysis and improvements. Additionally, IFS may share such anonymous usage data on an aggregate basis in the normal course of operating their business; for example, IFS may share information publicly to show trends about the general use of its software and services. TERMS - SERVICES
XXXXXAS xx xxcordance xxxx Xxxx 00x-1(k) xxder the Securities Exchange Act of 1934 (the "Act"), only one statement containing the information required by Schedule 13G and any amendments thereto need be filed whenever two or more persons are required to file such a statement or any amendments thereto with respect to the same securities, provided that said persons agree in writing that such statement or any amendment thereto is filed on behalf of them.
XXXXXXS xxx xxxxxxx xxxxxo desire to modify the Pooling and Servicing Agreement as set forth in this Amendment;
Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.