Restraint systems Sample Clauses

Restraint systems. 3.2.3.1. The restraint systems (the complete seats, the safety-belt assemblies and the load limiter devices) shall be mounted on the vehicle structure according to the series production vehicle specifications. The vehicle environment facing the tested seat (dashboard, seat, etc., depending on the tested seat) can be mounted on the test sled. If there were a frontal airbag, it has to be deactivated. 3.2.3.2. At the request of the car manufacturer and in agreement with the technical service in charge of the tests, some components of the restraint systems other than the complete seats, the safety-belt assemblies and the load limiter devices, may not be mounted on the test sled or may be replaced by components having equivalent or lower stiffness and whose dimensions are comprised in the vehicle interior fittings dimensions, provided that the tested configuration is at least as unfavourable as the series configuration regarding the forces applying to the seat and safety-belt anchorages. 3.2.3.3. The seats shall be adjusted as required in paragraph 6.1.2. of this Regulation, in the position for use chosen by the technical service in charge of the tests as the one giving the most adverse conditions regarding the anchorages strength and compatible with the installation of the dummies in the vehicle.
AutoNDA by SimpleDocs
Restraint systems. SAFETY AND HEALTH All employees are required to utilize seat belts or occupant restraint system provided when driving or riding as a passenger in City vehicles or in a personal vehicle on City business, except in cases of operational necessity. Violations of this provision will result in disciplinary action as follows: First offense: oral reprimand Second offense: written reprimand Third offense: one-day suspension without pay Fourth offense: five-day suspension without pay Fifth offense: dismissal

Related to Restraint systems

  • Enforcement of Intellectual Property Rights and Assistance During and after the period of my employment, I will assist Company in every proper way to obtain and enforce United States and foreign Intellectual Property Rights relating to Company Inventions in all countries. If the Company is unable to secure my signature on any document needed in connection with such purposes, I hereby irrevocably designate and appoint Company and its duly authorized officers and agents as my agent and attorney in fact, which appointment is coupled with an interest, to act on my behalf to execute and file any such documents and to do all other lawfully permitted acts to further such purposes with the same legal force and effect as if executed by me.

  • Enforcement of Intellectual Property Rights I will cooperate fully with the Company, both during and after my employment with the Company, with respect to the procurement, maintenance and enforcement of Intellectual Property Rights in Company-Related Developments. I will sign, both during and after the term of this Agreement, all papers, including without limitation copyright applications, patent applications, declarations, oaths, assignments of priority rights, and powers of attorney, which the Company may deem necessary or desirable in order to protect its rights and interests in any Company-Related Development. If the Company is unable, after reasonable effort, to secure my signature on any such papers, I hereby irrevocably designate and appoint each officer of the Company as my agent and attorney-in-fact to execute any such papers on my behalf, and to take any and all actions as the Company may deem necessary or desirable in order to protect its rights and interests in any Company-Related Development.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

  • IT Systems Except as would not, individually or in the aggregate, have a Material Adverse Effect, the Company reasonably believes that (i) the Company and the Subsidiaries own or have a valid right to access and use all computer systems, networks, hardware, software, databases, websites, and equipment used to process, store, maintain and operate data, information, and functions used in connection with the business of the Company and the Subsidiaries (the “Company IT Systems”), (ii) the Company IT Systems are adequate for, and operate and perform as required in connection with, the operation of the business of the Company and the Subsidiaries as currently conducted and (iii) the Company and the Subsidiaries have implemented reasonable backup, security and disaster recovery technology consistent with applicable regulatory standards;

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • EXTERNAL SERVICES The Platform may enable access to third-party services and websites and Applications (collectively and individually, "External Services"). You agree to use the External Services at your sole risk. NCR Voyix is not responsible for examining or evaluating the content or accuracy of any third-party External Services and shall not be liable for any such third-party External Services. Data displayed by any External Service, including but not limited to financial, and location information, is for general informational purposes only and is not guaranteed by NCR Voyix or its agents. You will not use the External Services in any manner that is inconsistent with the terms of this Agreement or that infringes the intellectual property rights of any third party. You agree not to use the External Services to harass, abuse, stalk, threaten or defame any person or entity, and that NCR Voyix is not responsible for any such use. External Services may not be available in all languages or in your home country and may not be appropriate or available for use in any particular location. To the extent you choose to use such External Services, you are solely responsible for compliance with any applicable laws. NCR Voyix reserves the right to change, suspend, remove, disable or impose access restrictions or limits on any External Services at any time without notice or liability to you.

  • Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Protection and Registration of Intellectual Property Rights (a) Each Co-Borrower shall (i) protect, defend and maintain the validity and enforceability of its Intellectual Property material to Borrower’s business; (ii) promptly advise Bank in writing of material infringements or any other event that could reasonably be expected to materially and adversely affect the value of its Intellectual Property material to Borrower’s business; and (iii) not allow any Intellectual Property material to a Co-Borrower’s business to be abandoned, forfeited or dedicated to the public without Bank’s written consent. (b) If a Co-Borrower (i) obtains any Patent, registered Trademark, registered Copyright, registered mask work, or any pending application for any of the foregoing, whether as owner, licensee or otherwise, or (ii) applies for any Patent or the registration of any Trademark, then such Co-Borrower shall, within the later of (A) fifteen (15) days from the date of such application or (B) on the next Compliance Certificate delivered in accordance with the terms of Section 6.2 hereof, provide written notice thereof to Bank and shall execute such intellectual property security agreements and other documents and take such other actions as Bank may request in its good faith business judgment to perfect and maintain a first priority perfected security interest in favor of Bank in such property. If a Co-Borrower decides to register any Copyrights or mask works in the United States Copyright Office, such Co-Borrower shall: (x) provide Bank with at least fifteen (15) days prior written notice of such Co-Borrower’s intent to register such Copyrights or mask works together with a copy of the application it intends to file with the United States Copyright Office (excluding exhibits thereto); (y) execute an intellectual property security agreement and such other documents and take such other actions as Bank may request in its good faith business judgment to perfect and maintain a first priority perfected security interest in favor of Bank in the Copyrights or mask works intended to be registered with the United States Copyright Office; and (z) record such intellectual property security agreement with the United States Copyright Office contemporaneously with filing the Copyright or mask work application(s) with the United States Copyright Office. Each Co-Borrower shall promptly provide to Bank copies of all applications that it files for Patents or for the registration of Trademarks, Copyrights or mask works, together with evidence of the recording of the intellectual property security agreement required for Bank to perfect and maintain a first priority perfected security interest in such property.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!