Preliminary Activities and Transfer of Material and Data Sample Clauses

Preliminary Activities and Transfer of Material and Data 
AutoNDA by SimpleDocs

Related to Preliminary Activities and Transfer of Material and Data

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Obligations and Activities of Business Associate Business Associate agrees to: a. Not use or disclose Protected Health Information other than as permitted or required by this BAA, the Agreement, or as required by law; b. Use appropriate safeguards, and comply with Subpart C of 45 CFR Part 164 with respect to electronic Protected Health Information, to prevent Use or Disclosure of Protected Health Information other than as provided for by this BAA; c. Report to Covered Entity any Use or Disclosure of Protected Health Information not provided for by this BAA of which it becomes aware, including breaches of Unsecured Protected Health Information as required at 45 CFR 164.410, and any Security Incident of which it becomes aware; d. In accordance with 45 CFR 164.502(e)(1)(ii) and 164.308(b)(2), if applicable, ensure that any Subcontractors that create, receive, maintain, or transmit Protected Health Information on behalf of the Business Associate agree to the same restrictions, conditions, and requirements that apply to Business Associate with respect to such information; e. Make available Protected Health Information in a Designated Record Set to Covered Entity or to an individual whose Protected Health Information is maintained by Business Associate, or the individual’s designee, and document and retain the documentation required by 45 CFR 164.530(j), as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.524; f. Make any amendment(s) to Protected Health Information in a Designated Record Set as directed or agreed to by the Covered Entity pursuant to 45 CFR 164.526, or take other measures as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.526; g. Maintain and make available the information required to provide an accounting of Disclosures to the Covered Entity as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.528; h. To the extent the Business Associate is to carry out one or more of Covered Entity's obligation(s) under Subpart E of 45 CFR Part 164, comply with the requirements of Subpart E that apply to the Covered Entity in the performance of such obligation(s); and i. Make its internal practices, books, and records available to the Secretary for purposes of determining Business Associate’s or Covered Entity’s compliance with HIPAA and HIPAA Regulations.

  • Confidential Information and Restricted Activities Employee has entered into the Company’s Employee Proprietary Information Agreement (“EPIA”) and acknowledges his or her obligations thereunder. The EPIA is specifically incorporated into this Agreement.

  • Obligations and Activities of Business Associates (1) Business Associate agrees not to use or disclose PHI other than as permitted or required by this Section of the Contract or as Required by Law. (2) Business Associate agrees to use and maintain appropriate safeguards and comply with applicable HIPAA Standards with respect to all PHI and to prevent use or disclosure of PHI other than as provided for in this Section of the Contract and in accordance with HIPAA Standards. (3) Business Associate agrees to use administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of electronic Protected Health Information that it creates, receives, maintains, or transmits on behalf of the Covered Entity. (4) Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to the Business Associate of a use or disclosure of PHI by Business Associate in violation of this Section of the Contract. (5) Business Associate agrees to report to Covered Entity any use or disclosure of PHI not provided for by this Section of the Contract or any Security Incident of which it becomes aware. (6) Business Associate agrees, in accordance with 45 C.F.R. 502(e)(1)(ii) and 164.308(d)(2), if applicable, to ensure that any subcontractors that create, receive, maintain or transmit PHI on behalf of the Business Associate, agree to the same restrictions, conditions, and requirements that apply to the business associate with respect to such information. (7) Business Associate agrees to provide access (including inspection, obtaining a copy or both), at the request of the Covered Entity, and in the time and manner designated by the Covered Entity, to PHI in a Designated Record Set, to Covered Entity or, as directed by Covered Entity, to an Individual in order to meet the requirements under 45 C.F.R. § 164.524. Business Associate shall not charge any fees greater than the lesser of the amount charged by the Covered Entity to an Individual for such records; the amount permitted by state law; or the Business Associate’s actual cost of postage, labor and supplies for complying with the request. (8) Business Associate agrees to make any amendments to PHI in a Designated Record Set that the Covered Entity directs or agrees to pursuant to 45 C.F.R. § 164.526 at the request of the Covered Entity, and in the time and manner designated by the Covered Entity. (9) Business Associate agrees to make internal practices, books, and records, including policies and procedures and PHI, relating to the use and disclosure of PHI received from, or created, maintained, transmitted or received by, Business Associate on behalf of Covered Entity, available to Covered Entity or to the Secretary in a time and manner agreed to by the parties or designated by the Secretary, for purposes of the Secretary investigating or determining Covered Entity’s compliance with the HIPAA Standards. (10) Business Associate agrees to document such disclosures of PHI and information related to such disclosures as would be required for Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. (11) Business Associate agrees to provide to Covered Entity, in a time and manner designated by the Covered Entity, information collected in accordance with subsection (g)(10) of this Section of the Contract, to permit Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. Business Associate agrees at the Covered Entity’s direction to provide an accounting of disclosures of PHI directly to an individual in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. (12) Business Associate agrees to comply with any State or federal law that is more stringent than the Privacy Rule. (13) Business Associate agrees to comply with the requirements of the HITECH Act relating to privacy and security that are applicable to the Covered Entity and with the requirements of 45 C.F.R. §§ 164.504(e), 164.308, 164.310, 164.312, and 164.316. (14) In the event that an Individual requests that the Business Associate (A) restrict disclosures of PHI; (B) provide an accounting of disclosures of the Individual’s PHI; (C) provide a copy of the Individual’s PHI in an Electronic Health Record; or (D) amend PHI in the Individual’s Designated Record Set the Business Associate agrees to notify the Covered Entity, in writing, within five Days of the request. (15) Business Associate agrees that it shall not, and shall ensure that its subcontractors do not, directly or indirectly, receive any remuneration in exchange for PHI of an Individual without (A) the written approval of the Covered Entity, unless receipt of remuneration in exchange for PHI is expressly authorized by this Contract and (B) the valid authorization of the Individual, except for the purposes provided under section 13405(d)(2) of the HITECH Act, (42 U.S.C. § 17935(d)(2)) and in any accompanying regulations. (16) Obligations in the Event of a Breach. (A) The Business Associate agrees that, following the discovery by the Business Associate or by a subcontractor of the Business Associate of any use or disclosure not provided for by this section of the Contract, any breach of Unsecured protected health information, or any Security Incident, it shall notify the Covered Entity of such Breach in accordance with Subpart D of Part 164 of Title 45 of the Code of Federal Regulations and this Section of the Contract. (B) Such notification shall be provided by the Business Associate to the Covered Entity without unreasonable delay, and in no case later than 30 days after the Breach is discovered by the Business Associate, or a subcontractor of the Business Associate, except as otherwise instructed in writing by a law enforcement official pursuant to 45 C.F.R. 164.412. A Breach is considered discovered as of the first day on which it is, or reasonably should have been, known to the Business Associate or its subcontractor. The notification shall include the identification and last known address, phone number and email address of each Individual (or the next of kin of the individual if the Individual is deceased) whose Unsecured protected health information has been, or is reasonably believed by the Business Associate to have been, accessed, acquired, or disclosed during such Breach. (C) The Business Associate agrees to include in the notification to the Covered Entity at least the following information: 1. A description of what happened, including the date of the Breach; the date of the discovery of the Breach; the unauthorized person, if known, who used the PHI or to whom it was disclosed; and whether the PHI was actually acquired or viewed. 2. A description of the types of Unsecured protected health information that were involved in the Breach (such as full name, Social Security number, date of birth, home address, account number, or disability code). 3. The steps the Business Associate recommends that Individual(s) take to protect themselves from potential harm resulting from the Breach. 4. A detailed description of what the Business Associate is doing or has done to investigate the Breach, to mitigate losses, and to protect against any further Breaches. 5. Whether a law enforcement official has advised the Business Associate, either verbally or in writing, that he or she has determined that notification or notice to Individuals or the posting required under 45 C.F.R.

  • Authorization to Release and Transfer Necessary Personal Information The Grantee hereby explicitly and unambiguously consents to the collection, use and transfer, in electronic or other form, of the Grantee’s personal data by and among, as applicable, the Company and its Subsidiaries for the exclusive purpose of implementing, administering and managing the Grantee’s participation in the Plan. The Grantee understands that the Company may hold certain personal information about the Grantee, including, but not limited to, the Grantee’s name, home address and telephone number, date of birth, social security number (or any other social or national identification number), salary, nationality, job title, number of Award Units and/or shares of Common Stock held and the details of all Award Units or any other entitlement to shares of Common Stock awarded, cancelled, vested, unvested or outstanding for the purpose of implementing, administering and managing the Grantee’s participation in the Plan (the “Data”). The Grantee understands that the Data may be transferred to the Company or to any third parties assisting in the implementation, administration and management of the Plan, that these recipients may be located in the Grantee’s country or elsewhere, and that any recipient’s country (e.g., the United States) may have different data privacy laws and protections than the Grantee’s country. The Grantee understands that he or she may request a list with the names and addresses of any potential recipients of the Data by contacting his or her local human resources representative or the Company’s stock plan administrator. The Grantee authorizes the recipients to receive, possess, use, retain and transfer the Data, in electronic or other form, for the sole purpose of implementing, administering and managing the Grantee’s participation in the Plan, including any requisite transfer of such Data to a broker or other third party assisting with the administration of Award Units under the Plan or with whom shares of Common Stock acquired pursuant to the vesting of the Award Units or cash from the sale of such shares may be deposited. Furthermore, the Grantee acknowledges and understands that the transfer of the Data to the Company or to any third parties is necessary for the Grantee’s participation in the Plan. The Grantee understands that the Grantee may, at any time, view the Data, request additional information about the storage and processing of the Data, require any necessary amendments to the Data or refuse or withdraw the consents herein by contacting the Grantee’s local human resources representative or the Company’s stock plan administrator in writing. The Grantee further acknowledges that withdrawal of consent may affect his or her ability to vest in or realize benefits from the Award Units, and the Grantee’s ability to participate in the Plan. For more information on the consequences of refusal to consent or withdrawal of consent, the Grantee understands that he or she may contact his or her local human resources representative or the Company’s stock plan administrator.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Return of material containing or pertaining to the Confidential Information 7.1 The Disclosing Party may, at any time, and in its sole discretion request the Receiving Party to return any material and/or data in whatever form containing, pertaining to or relating to Confidential Information disclosed pursuant to the terms of this Agreement and may, in addition request the Receiving Party to furnish a written statement to the effect that, upon such return, the Receiving Party has not retained in its possession, or under its control, either directly or indirectly, any such material and/or data. 7.2 If it is not practically able to do so, the Receiving Party shall destroy or ensure the destruction of all material and/or data in whatever form relating to the Confidential Information disclosed pursuant to the terms of this Agreement and delete, remove or erase or use best efforts to ensure the deletion, erasure or removal from any computer or database or document retrieval system under its or the Representatives' possession or control, all Confidential Information and all documents or files containing or reflecting any Confidential Information, in a manner that makes the deleted, removed or erased data permanently irrecoverable.The Receiving Party shall furnish the Disclosing Party with a written statement signed by one of its directors or duly authorized senior officers to the effect that all such material has been destroyed. 7.3 The Receiving Party shall comply with any request by the Disclosing Party in terms of this clause, within 7 (seven) business days of receipt of any such request.

  • Responsibility for Environmental Contamination 5.20.1 Neither Party shall be liable to the other for any costs whatsoever resulting from the presence or release of any Environmental Hazard that either Party did not introduce to the affected Work Location. Both Parties shall defend and hold harmless the other, its officers, directors and employees from and against any losses, damages, claims, demands, suits, liabilities, fines, penalties and expenses (including reasonable attorneys' fees) that arise out of or result from (i) any Environmental Hazard that the Indemnifying Party, its contractors or agents introduce to the Work Locations or (ii) the presence or release of any Environmental Hazard for which the Indemnifying Party is responsible under Applicable Law. 5.20.2 In the event any suspect materials within Qwest-owned, operated or leased facilities are identified to be asbestos containing, CLEC will ensure that to the extent any activities which it undertakes in the facility disturb such suspect materials, such CLEC activities will be in accordance with applicable local, state and federal environmental and health and safety statutes and regulations. Except for abatement activities undertaken by CLEC or equipment placement activities that result in the generation of asbestos-containing material, CLEC does not have any responsibility for managing, nor is it the owner of, nor does it have any liability for, or in connection with, any asbestos-containing material. Qwest agrees to immediately notify CLEC if Qwest undertakes any asbestos control or asbestos abatement activities that potentially could affect CLEC personnel, equipment or operations, including, but not limited to, contamination of equipment.

  • Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.

  • Sales Material, Information and Trademarks 6.1 For purposes of this Section 6, “Sales literature or other Promotional material” includes, but is not limited to, portions of the following that use any logo or other trademark related to the Trust, or Underwriter or its affiliates, or refer to the Trust: advertisements (such as material published or designed for use in a newspaper, magazine or other periodical, radio, television, telephone or tape recording, videotape display, signs or billboards, motion pictures, electronic communication or other public media), sales literature (i.e., any written communication distributed or made generally available to customers or the public, including brochures, circulars, research reports, market letters, form letters, seminar texts, reprints or excerpts or any other advertisement, sales literature or published article or electronic communication), educational or training materials or other communications distributed or made generally available to some or all agents or employees in any media, and disclosure documents, shareholder reports and proxy materials. 6.2 You shall furnish, or cause to be furnished to us or our designee, at least one complete copy of each registration statement, prospectus, statement of additional information, private placement memorandum, retirement plan disclosure information or other disclosure documents or similar information, as applicable (collectively “Disclosure Documents”), as well as any report, solicitation for voting instructions, Sales literature or other Promotional materials, and all amendments to any of the above that relate to the Contracts or the Accounts prior to its first use. You shall furnish, or shall cause to be furnished, to us or our designee each piece of Sales literature or other Promotional material in which the Trust or an Adviser is named, at least fifteen (15) Business Days prior to its proposed use. No such material shall be used unless we or our designee approve such material and its proposed use. 6.3 You and your agents shall not give any information or make any representations or statements on behalf of the Trust or concerning the Trust, the Underwriter or an Adviser, other than information or representations contained in and accurately derived from the registration statement or prospectus for the Trust shares (as such registration statement and prospectus may be amended or supplemented from time to time), annual and semi-annual reports of the Trust, Trust-sponsored proxy statements, or in Sales literature or other Promotional material approved by the Trust or its designee, except as required by legal process or regulatory authorities or with the written permission of the Trust or its designee. You shall send us a complete copy of each Disclosure Document and item of Sales literature or other Promotional materials in its final form within twenty (20) days of its first use. 6.4 We shall not give any information or make any representations or statements on behalf of you or concerning you, the Accounts or the Contracts other than information or representations, including naming you as a Trust shareholder, contained in and accurately derived from Disclosure Documents for the Contracts (as such Disclosure Documents may be amended or supplemented from time to time), or in materials approved by you for distribution, including Sales literature or other Promotional materials, except as required by legal process or regulatory authorities or with your written permission. 6.5 Except as provided in Section 6.2, you shall not use any designation comprised in whole or part of the names or marks “Franklin” or “Xxxxxxxxx” or any logo or other trademark relating to the Trust or the Underwriter without prior written consent, and upon termination of this Agreement for any reason, you shall cease all use of any such name or xxxx as soon as reasonably practicable. 6.6 You shall furnish to us ten (10) Business Days prior to its first submission to the SEC or its staff, any request or filing for no-action assurance or exemptive relief naming, pertaining to, or affecting, the Trust, the Underwriter or any of the Portfolios. 6.7 You agree that any posting of Portfolio prospectuses on your website will result in the Portfolio prospectuses: (i) appearing identical to the hard copy printed version or .pdf format file provided to you by us (except that you may reformat .pdf format prospectus files in order to delete blank pages and to insert .pdf format prospectus supplement files provided by us to you); (ii) being clearly associated with the particular Contracts in which they are available and posted in close proximity to the applicable Contract prospectuses; (iii) having no less prominence than prospectuses of any other underlying funds available under the Contracts; and (iv) being used in an authorized manner. Notwithstanding the above, you understand and agree that you are responsible for ensuring that participation in the Portfolios, and any website posting, or other use, of the Portfolio prospectuses is in compliance with this Agreement and applicable state and federal securities and insurance laws and regulations, including as they relate to paper or electronic use of fund prospectuses. The format of such presentation, the script and layout for any website that mentions the Trust, the Underwriter, an Adviser or the Portfolios shall be routed to us as sales literature or other promotional materials, pursuant to Section 6 of this Agreement. In addition, you agree to be solely responsible for maintaining and updating the Portfolio prospectuses’ PDF files (including prospectus supplements) and removing and/or replacing promptly any outdated prospectuses, as necessary, ensuring that any accompanying instructions by us, for using or stopping use are followed. You agree to designate and make available to us a person to act as a single point of communication contact for these purposes. We are not responsible for any additional costs or additional liabilities that may be incurred as a result of your election to place the Portfolio prospectuses on your website. We reserve the right to revoke this authorization, at any time and for any reason, although we may instead make our authorization subject to new procedures. 6.8 Each of your and your distributor’s registered representatives, agents, independent contractors and employees, as applicable, will have access to our websites at xxxxxxxxxxxxxxxxx.xxx, and such other URLs through which we may permit you to conduct business concerning the Portfolios from time to time (referred to collectively as the “Site”) as provided herein: (i) upon registration by such individual on a Site, (ii) if you cause a Site Access Request Form (an “Access Form”) to be signed by your authorized supervisory personnel and submitted to us, as a Schedule to, and legally a part of, this Agreement, or (iii) if you provide such individual with the necessary access codes or other information necessary to access the Site through any generic or firm-wide authorization we may grant you from time to time. Upon receipt by us of a completed registration submitted by an individual through the Site or a signed Access Form referencing such individual, we shall be entitled to rely upon the representations contained therein as if you had made them directly hereunder and we will issue a user identification, express number and/or password (collectively, “Access Code”). Any person to whom we issue an Access Code or to whom you provide the necessary Access Codes or other information necessary to access the Site through any generic or firm-wide authorization we may grant you from time to time shall be an “Authorized User.” We shall be entitled to assume that such person validly represents you and that all instructions received from such person are authorized, in which case such person will have access to the Site, including all services and information to which you are authorized to access on the Site. All inquiries and actions initiated by you (including your Authorized Users) are your responsibility, are at your risk and are subject to our review and approval (which could cause a delay in processing). You agree that we do not have a duty to question information or instructions you (including Authorized Users) give to us under this Agreement, and that we are entitled to treat as authorized, and act upon, any such instructions and information you submit to us. You agree to take all reasonable measures to prevent any individual other than an Authorized User from obtaining access to the Site. You agree to inform us if you wish to restrict or revoke the access of any individual Access Code. If you become aware of any loss or theft or unauthorized use of any Access Code, you agree to contact us immediately. You also agree to monitor your (including Authorized Users’) use of the Site to ensure the terms of this Agreement are followed. You also agree that you will comply with all policies and agreements concerning Site usage, including without limitation the Terms of Use Agreement(s) posted on the Site (“Site Terms”), as may be revised and reposted on the Site from time to time, and those Site Terms (as in effect from time to time) are a part of this Agreement. Your duties under this section are considered “services” required under the terms of this Agreement. You acknowledge that the Site is transmitted over the Internet on a reasonable efforts basis and we do not warrant or guarantee their accuracy, timeliness, completeness, reliability or non-infringement. Moreover, you acknowledge that the Site is provided for informational purposes only, and is not intended to comply with any requirements established by any regulatory or governmental agency.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!