State Material Sample Clauses

State Material. (1) State Material will remain the property of the State and the Retailer must only use that material for the purpose of complying with and enforcing this Agreement, in accordance with any conditions notified to it by the State and in accordance with any Privacy Act 1988 (Cwlth) and confidentiality requirements. (2) The State warrants that the use of any State Material by the Retailer: (a) will not infringe the intellectual property rights of any third party; and (b) no fees, royalties or other payments are payable in respect of any third party rights as a result of the Retailer’s (or its agent’s) use of any State Material. For the purpose of clause 12, “use” includes supply, reproduce, publish, perform, communicate, broadcast, adapt and copy.
AutoNDA by SimpleDocs
State Material. (a) The State owns all State Material, including Intellectual Property rights in that Material. (b) The State grants to each of the Commonwealth and the Service Provider, a royalty-free and licence fee-free, world-wide, non-exclusive licence to use, reproduce, modify, adapt, publish, perform, broadcast, communicate and exploit the State Material for the purposes of this Agreement. The Commonwealth and Service Provider each agree to ensure that all State Material is used strictly in accordance with any conditions or restrictions specified by the State.

Related to State Material

  • Course Materials The adoption of any course materials, print or electronic, after a Course Agreement is signed will require an agreed and signed addendum.

  • MATERIAL SAFETY DATA SHEETS As applicable, Contractor shall provide Purchaser with all appropriate Material Safety Data Sheets (“MSDS”) at the time of delivery of each shipment of Goods which requires such compliance and/or and for materials used by Contractor while performing Services and any updates of the same.

  • Material Safety Data Sheet Seller shall provide to Buyer with each delivery any Material Safety Data Sheet applicable to the work in conformance with and containing such information as required by the Occupational Safety and Health Act of 1970 and regulations promulgated thereunder or its State approved counterpart.

  • Compliance with Environmental Laws; Environmental Reports (a) Comply and use commercially reasonable efforts to cause all lessees and other persons occupying Real Property owned or operated by any Company to comply, in all material respects with all Environmental Laws and Environmental Permits applicable to its operations and property and obtain and renew all material Environmental Permits applicable to its operations and property and conduct any Response in accordance with Environmental Laws; provided, however, that no Company shall be required to undertake any Response to the extent that its obligation to do so is being contested in good faith and by proper proceedings and appropriate reserves are being maintained with respect to such circumstances in accordance with GAAP. (b) If a Default caused by reason of a breach of Section 3.17 or Section 5.09(a) shall have occurred and be continuing for more than 20 Business Days without the Companies commencing activities reasonably likely to cure such Default, at the written request of the Required Lenders through the Administrative Agent, provide to the Lenders within 45 days after such request, at the expense of Borrower, an environmental site assessment report regarding the matters which are the subject of such default, including where appropriate, any soil and/or groundwater sampling, prepared by an environmental consulting firm and in form and substance reasonably acceptable to the Administrative Agent and indicating the presence or absence of Hazardous Materials and the estimated cost of any compliance or Response to address them in connection with such Default.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Books, Records and Regulatory Filings (a) The Sub-Adviser agrees to maintain and to preserve for the applicable periods any such records as are required to be maintained by the Sub-Adviser with respect to the Fund by the 1940 Act and rules adopted thereunder, and by any other applicable laws, rules and regulations. The Sub-Adviser further agrees that all records that it maintains for the Fund are the property of the Fund and it will promptly surrender any of such records upon request; provided, however, that the Sub-Adviser may retain copies of such records for the applicable periods they are required by law to be retained, and thereafter shall destroy such records. (b) The Sub-Adviser agrees that it shall furnish to regulatory authorities having the requisite authority any information or reports in connection with its services hereunder that may be requested in order to determine whether the operations of the Fund are being conducted in accordance with applicable laws, rules and regulations. (c) The Sub-Adviser shall make all filings with the SEC required of it pursuant to Section 13 of the 1934 Act with respect to its duties as are set forth herein. The Sub-Adviser also shall make all required filings on Schedule 13D or 13G and Form 13F (as well as other filings triggered by ownership in securities under other applicable laws, rules and regulations) in respect of the Portfolio as may be required of the Fund due to the activities of the Sub-Adviser. The Sub-Adviser shall be the sole filer of Form 13F with respect to the Portfolio of the Fund.

  • Conformity with EXXXX Filing The Prospectus delivered to the Agent for use in connection with the sale of the Placement Shares pursuant to this Agreement will be identical to the versions of the Prospectus created to be transmitted to the Commission for filing via EXXXX, except to the extent permitted by Regulation S-T.

  • Conformity with XXXXX Filing The Prospectus delivered to the Agent for use in connection with the sale of the Placement Shares pursuant to this Agreement will be identical to the versions of the Prospectus created to be transmitted to the Commission for filing via XXXXX, except to the extent permitted by Regulation S-T.

  • Original Material The description of the material being transferred will be specified in an implementing letter.

  • COMPLIANCE WITH GOVERNMENTAL RULES AND REGULATIONS; RECORDS The Trust assumes full responsibility for its compliance with all securities, tax, commodities and other laws, rules and regulations applicable to it.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!