Permitted Uses Tenant may use the Property only for the Permitted Uses set forth in Section 1.06 above.
Permitted Use Tenant shall use the Premises solely for the Permitted Use set forth in Section 7 of the Summary and Tenant shall not use or permit the Premises or the Project to be used for any other purpose or purposes whatsoever without the prior written consent of Landlord, which may be withheld in Landlord’s sole discretion.
Compliance with Accessibility Standards All parties to this Agreement shall ensure that the plans for and the construction of all projects subject to this Agreement are in compliance with standards issued or approved by the Texas Department of Licensing and Regulation (TDLR) as meeting or consistent with minimum accessibility requirements of the Americans with Disabilities Act (P.L. 101-336) (ADA).
Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.
Reliability Standard Seller agrees to abide by (i) CPUC General Order No. 167, “Enforcement of Maintenance and Operation Standards for Electric Generating Facilities”, and (ii) all applicable requirements regarding interconnection of the Project, including the requirements of the interconnected Participating Transmission Owner.
Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition.
Standards Compliance DNS. Registry Operator shall comply with relevant existing RFCs and those published in the future by the Internet Engineering Task Force (IETF), including all successor standards, modifications or additions thereto relating to the DNS and name server operations including without limitation RFCs 1034, 1035, 1123, 1982, 2181, 2182, 2671, 3226, 3596, 3597, 4343, and 5966. DNS labels may only include hyphens in the third and fourth position if they represent valid IDNs (as specified above) in their ASCII encoding (e.g., “xn--ndk061n”).
Additional Permitted Uses In addition to those purposes set forth in the Agreement, Business Associate may use PHI for the following additional purposes:
Permitted Users Client may access and use only the Course Materials to which Client has subscribed, and such access and use is limited to the number of users identified in the Order Form and any subsequent Orders placed under an Order Form, and for the Contract Term. Orders for additional Subscriptions may be agreed by the parties from time to time under a particular Order Form, and shall set forth the number of additional Subscriptions, the total Subscription Fees payable therefore, and any other terms and conditions relating to such Order (each, an “Order”). Each Order Form and each Order, upon execution by both parties, shall form a part of this Agreement, and shall be subject to all of the terms and conditions hereof. An Order may take the form of a supplementary document signed by each party or acknowledged by each party electronically (whether by facsimile transmission, email or by other similar reliable means evidencing the intent of the parties). Each Order shall be subject to the terms of this Agreement and shall be incorporated herein by reference. A Subscription is limited to use by one individual user and may not be transferred to another user.
Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.