Protection Fence Sample Clauses

Protection Fence. Where the ortho shows a fence running along the hedge/drain which acts as a protection fence for the hedge/drain, the protection fence will not form the field boundary. The DARD field boundary will be placed on the appropriate RWF.
AutoNDA by SimpleDocs

Related to Protection Fence

  • Protection Planning Annually, sub-geographic area Unit Administrators will determine efficiencies to be gained from reciprocal assistance and acquisition of protection services. Operating plans will document decisions. Plans should be reviewed, and agreement reached concerning such items as placement of crews, engines, air tankers, helicopters, fixed and aerial detection, regulated use, closures and other joint fire suppression efforts.

  • Protection The Asset Representations Reviewer will take reasonable measures to protect the secrecy of and avoid disclosure and unauthorized use of Confidential Information, including those measures that it takes to protect its own confidential information and not less than a reasonable standard of care. The Asset Representations Reviewer acknowledges that Personally Identifiable Information is also subject to the additional requirements in Section 4.09.

  • Protection, Treatment (1) Each Contracting Party shall protect within its State territory investments made in accordance with its national laws and regulations by investors of the other Contracting Party and shall not impair by unreasonable or discriminatory measures the management, maintenance, use, enjoyment, extension, sale or liquidation of such investments. In particular, each Contracting Party or its competent authorities shall issue the necessary authorisations mentioned in Article 2, paragraph (2) of this Agreement.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Protection of Watershed PURCHASER shall take all necessary precautions to prevent damage to stream banks, any stream course, lake, reservoir, or forested wetland within or adjacent to the timber sale area. Definitions of Type F, Type D, and Type N streams contained in the Forest Practices Act apply to this contract. In addition to other protective measures required, PURCHASER shall discontinue all or part of the operations under this contract upon notice from STATE that operations will cause excessive damage to the watershed.

  • Protection of Improvements So far as practicable, Purchaser shall protect Specified Roads and other improvements (such as roads, trails, telephone lines, ditches, and fences):

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • Protection of Intellectual Property 1. The Parties shall grant and ensure adequate, effective and non-discriminatory protection of intellectual property rights, and provide for measures for the enforcement of such rights against infringement thereof, counterfeiting and piracy, in accordance with the provisions of this Article, Annex VI and the international agreements referred to therein.

  • Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.

Time is Money Join Law Insider Premium to draft better contracts faster.