Software Use Verification Sample Clauses

Software Use Verification. During the Term of this Agreement and for two years afterward, You must keep complete and accurate records of all Software copying and use. During this period, Novell will have the right, at its expense and upon no fewer than 10 working days prior written notice, to audit Your use of the Software and
AutoNDA by SimpleDocs

Related to Software Use Verification

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • E-Verification The Vendor represents and warrants that it will ensure its compliance with the Mississippi Employment Protection Act of 2008, and will register and participate in the status verification system for all newly hired employees. Mississippi Code Annotated §§71-11-1 et seq. The term “employee” as used herein means any person that is hired to perform work within the State of Mississippi. As used herein, “status verification system” means the Illegal Immigration Reform and Immigration Responsibility Act of 1996 that is operated by the United States Department of Homeland Security, also known as the E-Verify Program, or any other successor electronic verification system replacing the E-Verify Program. Vendor agrees to maintain records of such compliance. Upon request of the State and after approval of the Social Security Administration or Department of Homeland Security when required, Vendor agrees to provide a copy of each such verification. Vendor further represents and warrants that any person assigned to perform services hereafter meets the employment eligibility requirements of all immigration laws. The breach of this agreement may subject Vendor to the following: termination of this contract for goods or services and ineligibility for any state or public contract in Mississippi for up to three (3) years with notice of such cancellation/termination being made public; the loss of any license, permit, certification, or other document granted to Vendor by an agency, department or governmental entity for the right to do business in Mississippi for up to one (1) year; or,

  • Third Party Verification 4.8.1 The SPD shall be further required to provide entry to the site of the Power Project free of all encumbrances at all times during the Term of the Agreement to SECI and a third Party nominated by any Indian Governmental Instrumentality for inspection and verification of the works being carried out by the SPD at the site of the Power Project. 4.8.2 The third party may verify the construction works/operation of the Power Project being carried out by the SPD and if it is found that the construction works/operation of the Power Project is not as per the Prudent Utility Practices, it may seek clarifications from SPD or require the works to be stopped or to comply with the instructions of such third party.

  • Software Updates XXXXX agrees to keep current with software licensed from Skyward and will install new versions on a timeline approved by XXXXX governance. This timeline will be communicated by NWRDC to the Districts.

  • Software Upgrades All Software Releases (including all Error corrections made available pursuant to this Agreement) that RSA in its sole discretion: (a) deems to be logical improvements to the Software; (b) make generally available to all licensees of the Software; and (c) does not separately price or market.

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • User A Person utilizing the Cable Television System, including all related facilities for purposes of production and/or transmission of electronic or other Signals as opposed to utilization solely as a Subscriber.

  • Employee Verification In accordance with Neb. Rev.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!