Prohibited Uses of REACH Delivery Sample Clauses

Prohibited Uses of REACH Delivery. You may not do (or permit others to do) any of the following: (a) modify, adapt, alter, translate, or create derivative works of REACH Delivery; (b) merge or otherwise integrate REACH Delivery with any external components or other software (c) reverse engineer, decompile, or disassemble REACH Delivery, or otherwise attempt to derive the source code of REACH Delivery except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation; (d) remove, alter, or obscure any confidentiality or proprietary notices (including copyright and trademark notices) of RDI or its suppliers on REACH Delivery, including any copies of REACH Delivery that You are permitted to make under this Agreement; (e) make REACH Delivery available to others on a hosted, time-sharing, ASP or other basis, (f) circumvent, or provide or use a program intended to circumvent, technological measures (including attempting to avoid payment) that control installation or use of REACH Delivery; or (g) otherwise reproduce or use REACH Delivery except as expressly permitted under this Agreement.
AutoNDA by SimpleDocs

Related to Prohibited Uses of REACH Delivery

  • RIGHT OF ALLOTTEE TO USE COMMON AREAS AND FACILITIES SUBJECT TO PAYMENT OF TOTAL MAINTENANCE CHARGES

  • Establishment of a Free Trade Area The Parties to this Agreement, consistent with Article XXIV of the General Agreement on Tariffs and Trade 1994 (GATT 1994) and Article V of the General Agreement on Trade in Services (GATS), hereby establish a free trade area.

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the

  • Right to Refuse Dangerous Work An employee shall have the right to refuse to work in dangerous situations.

  • Right to Refuse Unsafe Work Employees have the right to refuse to perform unsafe work pursuant to the Occupational Health and Safety Regulations of the Workers Compensation Act.

  • Prohibited Uses You may use the Website only for lawful purposes and in accordance with these Terms of Use. You agree not to use the Website: • In any way that violates any applicable federal, state, local, or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the US or other countries). • For the purpose of exploiting, harming, or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information, or otherwise. • To send, knowingly receive, upload, download, use, or re-use any material that does not comply with the Content Standards set out in these Terms of Use. • To transmit, or procure the sending of, any advertising or promotional material without our prior written consent, including any "junk mail," "chain letter," "spam," or any other similar solicitation. • To impersonate or attempt to impersonate the Company, a Company employee, another user, or any other person or entity (including, without limitation, by using email addresses or screen names associated with any of the foregoing). • To engage in any other conduct that restricts or inhibits anyone's use or enjoyment of the Website, or which, as determined by us, may harm the Company or users of the Website, or expose them to liability. Additionally, you agree not to: • Use the Website in any manner that could disable, overburden, damage, or impair the site or interfere with any other party's use of the Website, including their ability to engage in real time activities through the Website. • Use any robot, spider, or other automatic device, process, or means to access the Website for any purpose, including monitoring or copying any of the material on the Website. • Use any manual process to monitor or copy any of the material on the Website, or for any other purpose not expressly authorized in these Terms of Use, without our prior written consent. • Use any device, software, or routine that interferes with the proper working of the Website. • Introduce any viruses, Trojan horses, worms, logic bombs, or other material that is malicious or technologically harmful. • Attempt to gain unauthorized access to, interfere with, damage, or disrupt any parts of the Website, the server on which the Website is stored, or any server, computer, or database connected to the Website. • Attack the Website via a denial-of-service attack or a distributed denial-of-service attack. • Otherwise attempt to interfere with the proper working of the Website.

  • Prohibited Use You may not use the Website for any of the following purposes:

  • Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition. 1.2. User shall not publish, retransmit, display, redistribute, reproduce or commercially exploit the Data in any form, except that User may include limited excerpts from the Data in articles, reports and other documents describing the results of User’s linguistic education and research.

  • Condition of Personal Property All tangible personal property, equipment, fixtures and inventories included within the assets of the Company are in good, merchantable or in reasonably repairable condition and are suitable for the purposes for which they are used. No value in excess of applicable reserves has been given to any inventory with respect to obsolete or discontinued products. To the best of the Company's knowledge, all of the inventories and equipment, including equipment leased to others, are well maintained and in good operating condition.

  • BREACH DISCOVERY AND NOTIFICATION 17 1. Following the discovery of a Breach of Unsecured PHI, CONTRACTOR shall notify 18 COUNTY of such Breach, however both parties agree to a delay in the notification if so advised by a 19 law enforcement official pursuant to 45 CFR § 164.412. 20 a. A Breach shall be treated as discovered by CONTRACTOR as of the first day on which 21 such Breach is known to CONTRACTOR or, by exercising reasonable diligence, would have been 22 known to CONTRACTOR. 23 b. CONTRACTOR shall be deemed to have knowledge of a Breach, if the Breach is 24 known, or by exercising reasonable diligence would have known, to any person who is an employee, 25 officer, or other agent of CONTRACTOR, as determined by federal common law of agency. 26 2. CONTRACTOR shall provide the notification of the Breach immediately to the COUNTY 27 Privacy Officer. CONTRACTOR’s notification may be oral, but shall be followed by written 28 notification within twenty four (24) hours of the oral notification. 29 3. CONTRACTOR’s notification shall include, to the extent possible: 30 a. The identification of each Individual whose Unsecured PHI has been, or is reasonably 31 believed by CONTRACTOR to have been, accessed, acquired, used, or disclosed during the Breach; 32 b. Any other information that COUNTY is required to include in the notification to 33 Individual under 45 CFR §164.404 (c) at the time CONTRACTOR is required to notify COUNTY or 34 promptly thereafter as this information becomes available, even after the regulatory sixty (60) day 35 period set forth in 45 CFR § 164.410 (b) has elapsed, including: 36 1) A brief description of what happened, including the date of the Breach and the date 37 of the discovery of the Breach, if known; 1 2) A description of the types of Unsecured PHI that were involved in the Breach (such 2 as whether full name, social security number, date of birth, home address, account number, diagnosis, 3 disability code, or other types of information were involved); 4 3) Any steps Individuals should take to protect themselves from potential harm 5 resulting from the Breach; 6 4) A brief description of what CONTRACTOR is doing to investigate the Breach, to 7 mitigate harm to Individuals, and to protect against any future Breaches; and 8 5) Contact procedures for Individuals to ask questions or learn additional information, 9 which shall include a toll-free telephone number, an e-mail address, Web site, or postal address. 10 4. COUNTY may require CONTRACTOR to provide notice to the Individual as required in 11 45 CFR § 164.404, if it is reasonable to do so under the circumstances, at the sole discretion of the 12 COUNTY. 13 5. In the event that CONTRACTOR is responsible for a Breach of Unsecured PHI in violation 14 of the HIPAA Privacy Rule, CONTRACTOR shall have the burden of demonstrating that 15 CONTRACTOR made all notifications to COUNTY consistent with this Subparagraph F and as 16 required by the Breach notification regulations, or, in the alternative, that the acquisition, access, use, or 17 disclosure of PHI did not constitute a Breach. 18 6. CONTRACTOR shall maintain documentation of all required notifications of a Breach or 19 its risk assessment under 45 CFR § 164.402 to demonstrate that a Breach did not occur. 20 7. CONTRACTOR shall provide to COUNTY all specific and pertinent information about the 21 Breach, including the information listed in Section E.3.b.(1)-(5) above, if not yet provided, to permit 22 COUNTY to meet its notification obligations under Subpart D of 45 CFR Part 164 as soon as 23 practicable, but in no event later than fifteen (15) calendar days after CONTRACTOR’s initial report of 24 the Breach to COUNTY pursuant to Subparagraph F.2. above. 25 8. CONTRACTOR shall continue to provide all additional pertinent information about the

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!