Permission to Use 5.1 Permission to use the Routes Network Rail grants the Train Operator permission to use the Routes. 5.2 Meaning References in this contract to permission to use the Routes shall, except where the context otherwise requires, be construed to mean permission: (a) to use the track comprised in the Routes for the provision of the Services using the Specified Equipment; (b) to use the track comprised in the Network in order to implement any plan established under Part H of the Network Code; (c) to make Ancillary Movements; (d) to Stable, which shall be treated, for the purposes of Part D of the Network Code, as the use of a Train Slot; (e) for the Train Operator and its associates to enter upon that part of the Network comprising the Routes, with or without vehicles; and (f) for the Train Operator and its associates to bring things onto that part of the Network comprising the Routes and keep them there, and such permission is subject, in each case and in all respects to: (i) the Network Code; (ii) the Applicable Engineering Access Statement; and (iii) the Applicable Timetable Planning Rules. 5.3 Permission under clauses 5.2(e) and 5.2(f) In relation to the permissions specified in clauses 5.2(e) and 5.2(f): (a) the Train Operator shall, and shall procure that its associates shall, wherever reasonably practicable, first obtain the consent of Network Rail, which consent shall not be unreasonably withheld or delayed; (b) the Train Operator shall remove any vehicle or other thing so brought onto any part of the Network when reasonably directed to do so by Network Rail; and (c) whilst exercising any rights conferred by clauses 5.2(e) and 5.2(f), the Train Operator shall, and shall procure that its associates shall, comply with such reasonable restrictions or instructions as Network Rail shall specify. 5.4 Changes to Applicable Engineering Access Statement and Applicable Timetable Planning Rules Changes to the Applicable Engineering Access Statement and the Applicable Timetable Planning Rules are subject to regulatory protection (including appeals) in accordance with Part D of the Network Code. 5.5 Engineering Access Statement, Timetable Planning Rules and Restrictions of Use Schedule 4 shall have effect. 5.6 The Services and the Specified Equipment Schedule 5 shall have effect. 5.7 Performance Schedule 8 shall have effect.
License to Use You are authorized to use the Software on one (1) single computer only. You may not use the Software on any other machines other than the said single computer.
Right to Use City shall not be limited in any way in its use or reuse of the Documents and Data or any part of them at any time for purposes of this Project or another project, provided that any such use not within the purposes intended by this Agreement or on a project other than this Project without employing the services of Consultant shall be at City’s sole risk. If City uses or reuses the Documents & Data on any project other than this Project, it shall remove the Consultant’s seal from the Documents & Data and indemnify and hold harmless Consultant and its officers, directors, agents and employees from claims arising out of the negligent use or re-use of the Documents & Data on such other project. Consultant shall be responsible and liable for its Documents & Data, pursuant to the terms of this Agreement, only with respect to the condition of the Documents & Data at the time they are provided to the City upon completion, suspension, abandonment or termination. Consultant shall not be responsible or liable for any revisions to the Documents & Data made by any party other than Consultant, a party for whom the Consultant is legally responsible or liable, or anyone approved by the Consultant.
Authority to Use Attachment B of each Approved Service Order will state whether or not the Consultant can use subconsultants to provide any part of the Work. If Attachment B does not authorize the Consultant to use subconsultants, then the Director’s prior written approval is required for the Consultant to use a subconsultant to perform any part of the Work.
RIGHT TO USE NAME The Adviser warrants that each Fund’s name is not deceptive or misleading and that the Adviser has rights to any distinctive name used by a Fund. Any concern regarding copyright, trademark, or patent infringement with respect to the name used by a Fund managed by the Adviser shall be resolved by the Adviser. Each Fund acknowledges that its use of any distinctive name is derivative of its relationship with the Adviser. Each Fund may use the name connected with the Adviser or any name derived from or using the name of the Fund managed by the Adviser only for so long as this Agreement or any extension, renewal or amendment hereof remains in effect. Within sixty (60) days from such time as this Agreement shall no longer be in effect, the Trust and Fund shall cease to use such a name or any other name connected with the Adviser. It is understood and hereby agreed that the name “Advisor Managed Portfolios” is the property of the Trust for copyright and all other purposes. The Adviser undertakes and agrees that, in the event that the Adviser shall cease to act as investment adviser to the Fund, the Adviser shall promptly take all necessary and appropriate action to discontinue use of the Trust’s name and will further refrain from using the Trust’s name; provided, however, that the Adviser may continue to use the Trust’s name for the sole purpose of identifying the Trust as an account formerly managed by the Adviser or as otherwise consented to by the Trust in writing prior to such use. It is additionally understood and hereby agreed that the name or any reasonable derivation of the same, is the property of the Adviser for copyright and all other purposes. The Trust undertakes and agrees that, in the event that the Adviser shall cease to act as investment adviser to the Funds, the Trust shall promptly take all necessary and appropriate action to discontinue use of the Adviser’s name and will further refrain from using the Adviser’s name; provided, however, that the Trust may continue to use the Adviser’s name for the sole purpose of identifying the Trust as an account formerly managed by the Adviser or as otherwise consented to by the Adviser in writing prior to such use.
HHS Right to Use Contractor agrees that HHS has the right to use, produce, and distribute copies of and to disclose to HHS employees, agents, and contractors and other governmental entities all or part of this Contract or any related Solicitation Response as HHS deems necessary to complete the procurement process or comply with state or federal laws.
Communication to us (a) Unless otherwise provided in this agreement, all communication, requests and instructions from you may be personally delivered to us in writing; or sent by registered post, electronic mail or SMS to us in accordance with our prescribed verification procedure prevailing at the time. (b) We may in good faith and without any liability to you, regard any communication given by you which are referable to you in accordance with our prescribed verification procedure prevailing at that time as authentic and duly authorized and shall be under no obligation to investigate the authenticity or authority of persons sending or purporting to send the communication or to verify the accuracy and completeness thereof. We may, at our discretion, provide for additional security measures or verification procedures, including but not limited to, specific electronic mail and/or SMS confirmatory authorization. The communication given by you to us shall be deemed to be irrevocable and binding on you notwithstanding that they may be given in error, lack clarity or reasonably capable of being misunderstood inaccurate or incomplete. You shall inform us immediately upon your awareness of and/or knowledge of any communication which is unauthorized, given in error, forged, fraudulent, unclear or reasonably capable of being misunderstood, garbled, inaccurate or incomplete and rectify the same promptly. (c) Unless otherwise provided in this agreement, all communication from you will take effect only after one (1) business day or such other period as determined in our reasonable discretion after the actual receipt by our relevant officers in charge of the subject matter of such communication. (d) We will not be liable for any loss or damage suffered or incurred by you howsoever or whatsoever arising from or in connection with: (i) any use of electronic mail or SMS services; or (ii) any failure to follow prevailing instructions, procedures, form and directions prescribed by us for the provision of any communication to us; or (iii) any failure to use electronic mail services and/or SMS procedures or forms which are prescribed by us; or (iv) any failure, suspension, interruption, cessation, delay, disruption, errors, defects or fault in third party equipment, software, hardware, Internet, Internet browsers, online networks, Internet service providers, telecommunication service providers or other service providers, telecommunication, computer or other electronic equipment or system; or (v) any failure, suspension, interruption, cessation, delay, disruption, errors, defects or fault in the transmission of communication to us or authorizations or acknowledgements from us or any wrongful interception of any communication through any online networks, Internet service providers, telecommunication service providers or other service providers, telecommunication, computer or other electronic equipment or system whether or not owned, operated or maintained by you, us or any other person beyond our reasonable control; or (vi) any delay or refusal by us, in our reasonable discretion, to execute any communication that may be validly be given by you or authenticated by you including for reasons due to applicable law; or (vii) any capacity inadequacies, network vulnerabilities, control weaknesses, security shortcomings, malicious attacks and hacking incidents (except in the case of our fraud, gross negligence or wilful default); or (viii) any corruption or loss of any data or communication stored in any equipment or in the course of transmission thereof through online networks, Internet service providers, telecommunication service providers or other service providers, telecommunication, computer or other electronic equipment or system including any errors generated in the transmission of any communication beyond our reasonable control; or (ix) our failure to acknowledge any communication sent by you to us; or (x) your provision of wrong or inaccurate information including your mailing address, electronic mail address or mobile phone number to us or your failure to update us of any change or proposed change in your electronic mail address or mobile phone number; or (xi) your failure to regularly check for correspondence from us in accordance with clause 14.1.
Consent to Use of Data You grant NCR Voyix a perpetual, non-exclusive, irrevocable, sub-licensable, transferrable license to use the data transmitted through the Platform: (a) to provide the NCR Voyix Product and the Platform as well as related products, software, materials and services under this Agreement or another agreement between you and NCR Voyix; (b) for product and service enhancements, as well as research and development purposes; and (c) after it has been aggregated, for analytics, commercial and benchmarking purposes.
License for Txdot Logo Use DocuSign Envelope ID: 08011FCF-93C2-4F54-8A05-20A33047A1D8
Grant of License to Use Intellectual Property Without limiting the provisions of Section 3.01 hereof or any other rights of the Collateral Agent as the holder of a Security Interest in any IP Collateral, for the purpose of enabling the Collateral Agent to exercise rights and remedies under this Agreement at such time as the Collateral Agent shall be lawfully entitled to exercise such rights and remedies, each Grantor hereby grants to the Collateral Agent, for the benefit of the Secured Parties, an irrevocable, nonexclusive license (exercisable without payment of royalty or other compensation to the Grantors) to use, license or sublicense any of the IP Collateral now owned or hereafter acquired by such Grantor, and wherever the same may be located (whether or not any license agreement by and between any Grantor and any other Person relating to the use of such IP Collateral may be terminated hereafter), and including in such license reasonable access to all media in which any of the licensed items may be recorded or stored and to all computer software and programs used for the compilation or printout thereof, provided, however, that any such license granted by the Collateral Agent to a third party shall include reasonable and customary terms necessary to preserve the existence, validity and value of the affected IP Collateral, including without limitation, provisions requiring the continuing confidential handling of trade secrets, requiring the use of appropriate notices and prohibiting the use of false notices, protecting and maintaining the quality standards of the Trademarks in the manner set forth below (it being understood and agreed that, without limiting any other rights and remedies of the Collateral Agent under this Agreement, any other Loan Document or applicable Law, nothing in the foregoing license grant shall be construed as granting the Collateral Agent rights in and to such IP Collateral above and beyond (x) the rights to such IP Collateral that each Grantor has reserved for itself and (y) in the case of IP Collateral that is licensed to any such Grantor by a third party, the extent to which such Grantor has the right to grant a sublicense to such IP Collateral hereunder). The use of such license by the Collateral Agent may only be exercised, at the option of the Collateral Agent, during the continuation of an Event of Default; provided that any license, sublicense or other transaction entered into by the Collateral Agent in accordance herewith shall immediately terminate at such time as the Collateral Agent is no longer lawfully entitled to exercise its rights and remedies under this Agreement. Nothing in this Section 4.01 shall require a Grantor to grant any license that is prohibited by any rule of law, statute or regulation, or is prohibited by, or constitutes a breach or default under or results in the termination of any contract, license, agreement, instrument or other document evidencing, giving rise to or theretofore granted, with respect to such property or otherwise unreasonably prejudices the value thereof to the relevant Grantor. In the event the license set forth in this Section 4.01 is exercised with regard to any Trademarks, then the following shall apply: (i) all goodwill arising from any licensed or sublicensed use of any Trademark shall inure to the benefit of the Grantor; (ii) the licensed or sublicensed Trademarks shall only be used in association with goods or services of a quality and nature consistent with the quality and reputation with which such Trademarks were associated when used by Grantor prior to the exercise of the license rights set forth herein; and (iii) at the Grantor’s request and expense, licensees and sublicensees shall provide reasonable cooperation in any effort by the Grantor to maintain the registration or otherwise secure the ongoing validity and effectiveness of such licensed Trademarks, including, without limitation the actions and conduct described in Section 4.02 below.