Prohibition on Child Abuse Images and Conduct or Content Designed to Suggest the Presence of Child Abuse Images Sample Clauses

Prohibition on Child Abuse Images and Conduct or Content Designed to Suggest the Presence of Child Abuse Images. The termchild abuse images” is defined as any photograph, film, video, picture, or computer or computer-­‐generated image or picture, whether made or produced by electronic, mechanical, or other means, depicting child sexual abuse as stated in the United Nations Convention on the Rights of the Child. Registrant’s sites in the TLD shall not display any child abuse images. Registrant’s sites in the TLD shall not engage in practices that are designed to suggest the presence of child abuse images, including, without limitation, the use of meta-­‐tags for that purpose. Registry Operator will refer any sites in the TLD that are reported to the Registry Operator to be in violation of this policy to child safety hotlines like the National Center for Missing and Exploited Children (NCMEC), the Internet Watch Foundation (IWF), or the International Association of Internet Hotlines (INHOPE).
AutoNDA by SimpleDocs
Prohibition on Child Abuse Images and Conduct or Content Designed to Suggest the Presence of Child Abuse Images. The termchild abuse images” is defined as any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, depicting child sexual abuse as stated in the United Nations Convention on the Rights of the Child. Registrant’s sites in the TLD shall not display any child abuse images. Registrant’s sites in the TLD shall not engage in practices that are designed to suggest the presence of child abuse images, including, without limitation, the use of meta-tags for that purpose. Registry Operator will refer any sites in the TLD that are reported to the Registry Operator to be in violation of this policy to child safety hotlines like the National Center for Missing and Exploited Children (NCMEC), the Internet Watch Foundation (IWF), or the International Association of Internet Hotlines (INHOPE). Prohibition on Abusive Registrations. No registrant may register an abusive second-level domain name in the TLD including, without limitation, domain names that infringe the intellectual property rights of a third party, including common law trademark rights; domain names that are obvious variants of well-known trademarks not belonging to the registrant; or domain names that suggest the presence of child abuse images.

Related to Prohibition on Child Abuse Images and Conduct or Content Designed to Suggest the Presence of Child Abuse Images

  • CFR Part 200 or Federal Provision - Xxxx Anti-Lobbying Amendment - Continued If you answered "No, Vendor does not certify - Lobbying to Report" to the above attribute question, you must download, read, execute, and upload the attachment entitled "Disclosure of Lobbying Activities - Standard Form - LLL", as instructed, to report the lobbying activities you performed or paid others to perform. 2 CFR Part 200 or Federal Provision - Federal Rule Compliance with all applicable standards, orders, or requirements issued under section 306 of the Clean Air Act (42 U.S.C. 1857(h)), section 508 of the Clean Water Act (33 U.S.C. 1368), Executive Order 11738, and Environmental Protection Agency regulations (40 CFR part 15). (Contracts, subcontracts, and subgrants of amounts in excess of $100,000) Pursuant to the above, when federal funds are expended by ESC Region 8 and TIPS Members, ESC Region 8 and TIPS Members requires the proposer certify that in performance of the contracts, subcontracts, and subgrants of amounts in excess of $250,000, the vendor will be in compliance with all applicable standards, orders, or requirements issued under section 306 of the Clean Air Act (42 U.S.C. 1857(h)), section 508 of the Clean Water Act (33 U.S.C. 1368), Executive Order 11738, and Environmental Protection Agency regulations (40 CFR part 15). Does vendor certify compliance? Yes 2 CFR Part 200 or Federal Provision - Procurement of Recovered Materials A non-Federal entity that is a state agency or agency of a political subdivision of a state and its contractors must comply with section 6002 of the Solid Waste Disposal Act, as amended by the Resource Conservation and Recovery Act. The requirements of Section 6002 include: (1) procuring only items designated in guidelines of the Environmental Protection Agency (EPA) at 40 CFR part 247 that contain the highest percentage of recovered materials practicable, consistent with maintaining a satisfactory level of competition, where the purchase price of the item exceeds $10,000 or the value of the quantity acquired during the preceding fiscal year exceeded $10,000; (2) procuring solid waste management services in a manner that maximizes energy and resource recovery; and establishing an affirmative procurement program for procurement of recovered materials identified in the EPA guidelines. Does vendor certify that it is in compliance with these provisions? Yes 2 CFR Part 200 or Federal Provision - Rights to Inventions If the Federal award meets the definition of “funding agreement” under 37 CFR §401.2 (a) and the recipient or subrecipient wishes to enter into a contract with a small business firm or nonprofit organization regarding the substitution of parties, assignment or performance of experimental, developmental, or research work under that “funding agreement,” the recipient or subrecipient must comply with the requirements of 37 CFR Part 401, “Rights to Inventions Made by Nonprofit Organizations and Small Business Firms Under Government Grants, Contracts and Cooperative Agreements,” and any implementing regulations issued by the awarding agency. Pursuant to the above, when the foregoing applies to ESC Region 8 and TIPS Members, Vendor certifies that during the term of an award resulting from this procurement process, Vendor agrees to comply with all applicable requirements as referenced in the Federal rule above. Does vendor certify? Yes

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Certification Regarding Prohibition of Boycotting Israel (Tex Gov. Code 2271) If (a) Vendor is not a sole proprietorship; (b) Vendor has ten (10) or more full-time employees; and (c) this Agreement or any agreement with a TIPS Member under this procurement has value of $100,000 or more, the following certification shall apply; otherwise, this certification is not required. Vendor certifies, where applicable, that neither the Vendor, nor any affiliate, subsidiary, or parent company of Vendor, if any, boycotts Israel, and Vendor agrees that Vendor and Vendor Companies will not boycott Israel during the term of this Agreement. For purposes of this Agreement, the term “boycott” shall mean and include refusing to deal with, terminating business activities with, or otherwise taking any action that is intended to penalize, inflict economic harm on, or limit commercial relations with Israel, or with a person or entity doing business in Israel or in an Israeli-controlled territory but does not include an action made for ordinary business purposes. When applicable, does Vendor certify? Yes

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code.

  • Prohibition on Use of Public Funds for Political Activity In performing the Services, Contractor shall comply with San Francisco Administrative Code Chapter 12G, which prohibits funds appropriated by the City for this Agreement from being expended to participate in, support, or attempt to influence any political campaign for a candidate or for a ballot measure. Contractor is subject to the enforcement and penalty provisions in Chapter 12G.

  • INFORMATION OF LOCKHEED XXXXXX (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. XXXXXX agrees to comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and to comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. XXXXXX agrees not to use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and agrees not to disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information.

Time is Money Join Law Insider Premium to draft better contracts faster.