Permission to Use 5.1 Permission to use the Routes Network Rail grants the Train Operator permission to use the Routes. 5.2 Meaning References in this contract to permission to use the Routes shall, except where the context otherwise requires, be construed to mean permission: (a) to use the track comprised in the Routes for the provision of the Services using the Specified Equipment; (b) to use the track comprised in the Network in order to implement any plan established under Part H of the Network Code; (c) to make Ancillary Movements; (d) to Stable, which shall be treated, for the purposes of Part D of the Network Code, as the use of a Train Slot; (e) for the Train Operator and its associates to enter upon that part of the Network comprising the Routes, with or without vehicles; and (f) for the Train Operator and its associates to bring things onto that part of the Network comprising the Routes and keep them there, and such permission is subject, in each case and in all respects to: (i) the Network Code; (ii) the Applicable Engineering Access Statement; and (iii) the Applicable Timetable Planning Rules. 5.3 Permission under clauses 5.2(e) and 5.2(f) In relation to the permissions specified in clauses 5.2(e) and 5.2(f): (a) the Train Operator shall, and shall procure that its associates shall, wherever reasonably practicable, first obtain the consent of Network Rail, which consent shall not be unreasonably withheld or delayed; (b) the Train Operator shall remove any vehicle or other thing so brought onto any part of the Network when reasonably directed to do so by Network Rail; and (c) whilst exercising any rights conferred by clauses 5.2(e) and 5.2(f), the Train Operator shall, and shall procure that its associates shall, comply with such reasonable restrictions or instructions as Network Rail shall specify. 5.4 Changes to Applicable Engineering Access Statement and Applicable Timetable Planning Rules Changes to the Applicable Engineering Access Statement and the Applicable Timetable Planning Rules are subject to regulatory protection (including appeals) in accordance with Part D of the Network Code. 5.5 Engineering Access Statement, Timetable Planning Rules and Restrictions of Use Schedule 4 shall have effect. 5.6 The Services and the Specified Equipment Schedule 5 shall have effect. 5.7 Performance Schedule 8 shall have effect.
License to Use You are authorized to use the Software on one (1) single computer only. You may not use the Software on any other machines other than the said single computer.
Right to Use City shall not be limited in any way in its use or reuse of the Documents and Data or any part of them at any time for purposes of this Project or another project, provided that any such use not within the purposes intended by this Agreement or on a project other than this Project without employing the services of Consultant shall be at City’s sole risk. If City uses or reuses the Documents & Data on any project other than this Project, it shall remove the Consultant’s seal from the Documents & Data and indemnify and hold harmless Consultant and its officers, directors, agents and employees from claims arising out of the negligent use or re-use of the Documents & Data on such other project. Consultant shall be responsible and liable for its Documents & Data, pursuant to the terms of this Agreement, only with respect to the condition of the Documents & Data at the time they are provided to the City upon completion, suspension, abandonment or termination. Consultant shall not be responsible or liable for any revisions to the Documents & Data made by any party other than Consultant, a party for whom the Consultant is legally responsible or liable, or anyone approved by the Consultant.
Authority to Use Attachment B of each Approved Service Order will state whether or not the Consultant can use subconsultants to provide any part of the Work. If Attachment B does not authorize the Consultant to use subconsultants, then the Director’s prior written approval is required for the Consultant to use a subconsultant to perform any part of the Work.
RIGHT TO USE NAME The Adviser warrants that each Fund’s name is not deceptive or misleading and that the Adviser has rights to any distinctive name used by a Fund. Any concern regarding copyright, trademark, or patent infringement with respect to the name used by a Fund managed by the Adviser shall be resolved by the Adviser. Each Fund acknowledges that its use of any distinctive name is derivative of its relationship with the Adviser. Each Fund may use the name connected with the Adviser or any name derived from or using the name of the Fund managed by the Adviser only for so long as this Agreement or any extension, renewal or amendment hereof remains in effect. Within sixty (60) days from such time as this Agreement shall no longer be in effect, the Trust and Fund shall cease to use such a name or any other name connected with the Adviser. It is understood and hereby agreed that the name “Advisor Managed Portfolios” is the property of the Trust for copyright and all other purposes. The Adviser undertakes and agrees that, in the event that the Adviser shall cease to act as investment adviser to the Fund, the Adviser shall promptly take all necessary and appropriate action to discontinue use of the Trust’s name and will further refrain from using the Trust’s name; provided, however, that the Adviser may continue to use the Trust’s name for the sole purpose of identifying the Trust as an account formerly managed by the Adviser or as otherwise consented to by the Trust in writing prior to such use. It is additionally understood and hereby agreed that the name or any reasonable derivation of the same, is the property of the Adviser for copyright and all other purposes. The Trust undertakes and agrees that, in the event that the Adviser shall cease to act as investment adviser to the Funds, the Trust shall promptly take all necessary and appropriate action to discontinue use of the Adviser’s name and will further refrain from using the Adviser’s name; provided, however, that the Trust may continue to use the Adviser’s name for the sole purpose of identifying the Trust as an account formerly managed by the Adviser or as otherwise consented to by the Adviser in writing prior to such use.
HHS Right to Use Contractor agrees that HHS has the right to use, produce, and distribute copies of and to disclose to HHS employees, agents, and contractors and other governmental entities all or part of this Contract or any related Solicitation Response as HHS deems necessary to complete the procurement process or comply with state or federal laws.
Communication to us (a) Unless otherwise provided in this agreement, all communication, requests and instructions from you may be personally delivered to us in writing; or sent by registered post, electronic mail or SMS to us in accordance with our prescribed verification procedure prevailing at the time. (b) We may in good faith and without any liability to you, regard any communication given by you which are referable to you in accordance with our prescribed verification procedure prevailing at that time as authentic and duly authorized and shall be under no obligation to investigate the authenticity or authority of persons sending or purporting to send the communication or to verify the accuracy and completeness thereof. We may, at our discretion, provide for additional security measures or verification procedures, including but not limited to, specific electronic mail and/or SMS confirmatory authorization. The communication given by you to us shall be deemed to be irrevocable and binding on you notwithstanding that they may be given in error, lack clarity or reasonably capable of being misunderstood inaccurate or incomplete. You shall inform us immediately upon your awareness of and/or knowledge of any communication which is unauthorized, given in error, forged, fraudulent, unclear or reasonably capable of being misunderstood, garbled, inaccurate or incomplete and rectify the same promptly. (c) Unless otherwise provided in this agreement, all communication from you will take effect only after one (1) business day or such other period as determined in our reasonable discretion after the actual receipt by our relevant officers in charge of the subject matter of such communication. (d) We will not be liable for any loss or damage suffered or incurred by you howsoever or whatsoever arising from or in connection with: (i) any use of electronic mail or SMS services; or (ii) any failure to follow prevailing instructions, procedures, form and directions prescribed by us for the provision of any communication to us; or (iii) any failure to use electronic mail services and/or SMS procedures or forms which are prescribed by us; or (iv) any failure, suspension, interruption, cessation, delay, disruption, errors, defects or fault in third party equipment, software, hardware, Internet, Internet browsers, online networks, Internet service providers, telecommunication service providers or other service providers, telecommunication, computer or other electronic equipment or system; or (v) any failure, suspension, interruption, cessation, delay, disruption, errors, defects or fault in the transmission of communication to us or authorizations or acknowledgements from us or any wrongful interception of any communication through any online networks, Internet service providers, telecommunication service providers or other service providers, telecommunication, computer or other electronic equipment or system whether or not owned, operated or maintained by you, us or any other person beyond our reasonable control; or (vi) any delay or refusal by us, in our reasonable discretion, to execute any communication that may be validly be given by you or authenticated by you including for reasons due to applicable law; or (vii) any capacity inadequacies, network vulnerabilities, control weaknesses, security shortcomings, malicious attacks and hacking incidents (except in the case of our fraud, gross negligence or wilful default); or (viii) any corruption or loss of any data or communication stored in any equipment or in the course of transmission thereof through online networks, Internet service providers, telecommunication service providers or other service providers, telecommunication, computer or other electronic equipment or system including any errors generated in the transmission of any communication beyond our reasonable control; or (ix) our failure to acknowledge any communication sent by you to us; or (x) your provision of wrong or inaccurate information including your mailing address, electronic mail address or mobile phone number to us or your failure to update us of any change or proposed change in your electronic mail address or mobile phone number; or (xi) your failure to regularly check for correspondence from us in accordance with clause 14.1.
Consent to Use of Data You grant NCR Voyix a perpetual, non-exclusive, irrevocable, sub-licensable, transferrable license to use the data transmitted through the Platform: (a) to provide the NCR Voyix Product and the Platform as well as related products, software, materials and services under this Agreement or another agreement between you and NCR Voyix; (b) for product and service enhancements, as well as research and development purposes; and (c) after it has been aggregated, for analytics, commercial and benchmarking purposes.
License for Txdot Logo Use DocuSign Envelope ID: A2C96816-AFCF-4B6A-9B51-D8FCE6C6223E DocuSign Envelope ID: 81600B2C-53E9-4E39-BA73-002AB2A7A001
Grant of License to Use Intellectual Property For the purpose of enabling the Collateral Agent to exercise rights and remedies under this Article at such time as the Collateral Agent shall be lawfully entitled to exercise such rights and remedies, each Grantor hereby grants to the Collateral Agent an irrevocable, non-exclusive license (exercisable without payment of royalty or other compensation to the Grantors) to use, license or sub-license any of the Collateral consisting of Intellectual Property now owned or hereafter acquired by such Grantor, and wherever the same may be located, and including in such license reasonable access to all media in which any of the licensed items may be recorded or stored and to all computer software and programs used for the compilation or printout thereof. The use of such license by the Collateral Agent shall be exercised, at the option of the Collateral Agent, upon the occurrence and during the continuation of an Event of Default; provided that any license, sub-license or other transaction entered into by the Collateral Agent in accordance herewith shall be binding upon the Grantors notwithstanding any subsequent cure of an Event of Default.