Authorized Users Authorized Users" are:
Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.
Use of the Name “Xxxxx Xxxxx”. The Adviser hereby consents to the use by the Fund of the name “Xxxxx Xxxxx” as part of the Fund’s name; provided, however, that such consent shall be conditioned upon the employment of the Adviser or one of its affiliates as the investment adviser of the Fund. The name “Xxxxx Xxxxx” or any variation thereof may be used from time to time in other connections and for other purposes by the Adviser and its affiliates and other investment companies that have obtained consent to the use of the name “Xxxxx Xxxxx.” The Adviser shall have the right to require the Fund to cease using the name “Xxxxx Xxxxx” as part of the Fund’s name if the Fund ceases, for any reason, to employ the Adviser or one of its affiliates as the Fund’s investment adviser. Future names adopted by the Fund for itself, insofar as such names include identifying words requiring the consent of the Adviser, shall be the property of the Adviser and shall be subject to the same terms and conditions.
Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.
Information and Services Required of the Owner The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.
Use of the Name BlackRock The Advisor has consented to the use by the Trust of the name or identifying word "BlackRock" in the name of the Trust. Such consent is conditioned upon the employment of the Advisor as the investment advisor to the Trust. The name or identifying word "BlackRock" may be used from time to time in other connections and for other purposes by the Advisor and any of its affiliates. The Advisor may require the Trust to cease using "BlackRock" in the name of the Trust if the Trust ceases to employ, for any reason, the Advisor, any successor thereto or any affiliate thereof as investment advisor of the Trust.
XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.
Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.
Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Product and Service Warranties 21- SECTION 3.30