Operation of Computers Sample Clauses

Operation of Computers. The contemplated transactions will not cause any license agreements as referred to in this Section 5.15(b) to be terminated or the terms varied or any rates or royalties payable to be increased.
AutoNDA by SimpleDocs
Operation of Computers. No Person is in a position, by virtue of its or his rights in, knowledge of or access to the Computers, to prevent or impair the proper and efficient functioning of the Computers or to demand any payment in excess of any current license fee or in excess of reasonable remuneration for services rendered, or to impose any onerous condition, in order to preserve the proper and efficient functioning of the Computers in the future. The employees of the Xxxxx Parties are adequately trained to enable them to use and operate the Computers to perform the functions for which they were hired. All data and records stored by electronic means are capable of ready access through the Computers. The transactions contemplated in this Agreement will not cause any license agreements as referred to in this Section 4.11 to be terminated or the terms varied or any rates or royalties payable to be increased.
Operation of Computers. All Data and Records stored by electronic means are capable of ready access through the Computers. To Seller's Knowledge, except as disclosed on Schedule 4.10(d), the transactions contemplated in this Agreement will not cause any of Seller's license agreements as referred to in this Section 4.10 to be terminated or the terms varied or any rates or royalties payable to be materially increased.
Operation of Computers. No person is in a position, by virtue of its or his rights in the Computers, to prevent or impair the proper and efficient functioning of the Computers or to demand any payment for services rendered (except for normal salaries and wages due Buildscape employees in the ordinary course of business or as otherwise disclosed pursuant hereto), or to impose any onerous condition, in order to preserve the proper and efficient functioning of the Computers in the future. Buildscape's employees are adequately trained to enable them to use and operate Buildscape's Computers to the full extent of the capabilities of the Computers without Material assistance from any other Person. All Data and Records stored by electronic means are capable of ready access through the Computers. The Contemplated Transactions will not cause any license agreements referred to in this Section 4.12 to be terminated or the terms varied or any rates or royalties payable to be increased.
Operation of Computers. The Contemplated Transactions will not cause any license agreements as referred to in this Section 5.16(b) to be terminated or the terms varied or any rates or royalties payable to be increased. The Company’s IT system is consistent with the operating capacity certified by the appraisal provided under Schedule 5.15 and the related Sellers’ warranty is given with reference to such operating capacity.
Operation of Computers. No Person is in a position, by virtue of rights in, knowledge of or access to the Computers, to prevent or impair the proper and efficient functioning of the Computers or to demand any payment in excess of reasonable remuneration for services rendered, or to impose any onerous condition, in order to preserve the proper and efficient functioning of the Computers in the future. Seller’s employees are adequately trained to enable them to use and operate the Computers to the full extent of the capabilities of the Computers without material assistance from any other Person. All Data and Records stored by electronic means are capable of ready access through the Computers. The transactions contemplated in this Agreement will not cause any license agreements as referred to in Section 4.10 to be terminated or the terms varied or any rates or royalties payable to be increased.
Operation of Computers. To the Knowledge of Seller, no Person is in a position, by virtue of rights in, knowledge of or access to the Computers, to currently prevent or impair the proper and efficient functioning of the Computers. To the Knowledge of Seller, Seller's employees are adequately trained to enable them to use and operate the Computers for the purposes for which they have been acquired by Seller. All Data and Records stored by electronic means are capable of ready access through the Computers. The transactions contemplated in this Agreement will not cause any license agreements as referred to in this SECTION 4.11 to be terminated or the terms varied or any rates or royalties payable to be materially increased.
AutoNDA by SimpleDocs

Related to Operation of Computers

  • Communications and Computer Lines Tenant may install, maintain, replace, remove or use any communications or computer wires and cables (collectively, the “Lines”) at the Project in or serving the Premises, provided that (i) Tenant shall obtain Landlord’s prior written consent to the installation of any such Lines (such consent not to be unreasonably withheld), use an experienced and qualified contractor approved in writing by Landlord (such approval not to be unreasonably withheld), and comply with all of the other provisions of Articles 7 and 8 of this Lease, (ii) an acceptable amount of space for additional Lines shall be maintained for future occupants of the Project, as determined in Landlord’s reasonable opinion, (iii) the Lines (including riser cables) shall be appropriately insulated to prevent excessive electromagnetic fields or radiation, and shall be surrounded by a protective conduit reasonably acceptable to Landlord, (iv) any Lines servicing the Premises shall comply with all Applicable Laws, (v) as a condition to permitting the installation of new Lines, Landlord may require that Tenant remove existing Lines located in or serving the Premises that will no longer be used by Tenant and repair any damage in connection with such removal, and (vi) Tenant shall pay all costs in connection therewith. Landlord reserves the right to require that Tenant remove any Lines located in or serving the Premises which are installed in violation of these provisions, or which are at any time in violation of any Applicable Laws or represent a dangerous or potentially dangerous condition. Upon the expiration of the Lease Term, or immediately following any earlier termination of this Lease, Tenant shall, at Tenant’s sole cost and expense, remove all Lines installed by Tenant, and repair any damage caused by such removal.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Records Maintenance; Access Contractor shall maintain all financial records relating to this Contract in accordance with generally accepted accounting principles. In addition, Contractor shall maintain any other records, books, documents, papers, plans, records of shipments and payments and writings of Contractor, whether in paper, electronic or other form, that are pertinent to this Contract (“Records”) in such a manner as to clearly document Contractor's performance. Contractor acknowledges and agrees that Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to such financial records and other Records that are pertinent to this Contract, whether in paper, electronic or other form, to perform examinations and audits and make excerpts and transcripts. Contractor shall retain and keep accessible all such financial records and other Records for a minimum of 6 years, or such longer period as may be required by applicable law, following final payment and termination of this Contract, or until the conclusion of any audit, controversy or litigation arising out of or related to this Contract, whichever date is later.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Records; Copies The Assuming Bank agrees to permit the Receiver and the Corporation access to all Records of which the Assuming Bank has custody, and to use, inspect, make extracts from or request copies of any such Records in the manner and to the extent requested, and to duplicate, in the discretion of the Receiver or the Corporation, any Record in the form of microfilm or microfiche pertaining to Deposit account relationships; provided, that in the event that the Failed Bank maintained one or more duplicate copies of such microfilm or microfiche Records, the Assuming Bank hereby assigns, transfers, and conveys to the Corporation one such duplicate copy of each such Record without cost to the Corporation, and agrees to deliver to the Corporation all Records assigned and transferred to the Corporation under this Article VI as soon as practicable on or after the date of this Agreement. The party requesting a copy of any Record shall bear the cost (based on standard accepted industry charges to the extent applicable, as determined by the Receiver) for providing such duplicate Records. A copy of each Record requested shall be provided as soon as practicable by the party having custody thereof.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!