The User must Sample Clauses

The User must a. pay the entire Fee for Hire upon demand; b. produce evidence of insurance as detailed in the Schedule; c. ensure that all of the information stated by the User in the Schedule is entirely true and accurate; and d. use the property only for the purpose described under “Purpose of Hire”. If the User fails to do any of those things listed above, or if the Church considers, on a reasonable basis, that there is a risk of damage (of any kind) to the property, to some person, or to the Church, as a result of the use of the Property by the User, then the Church may revoke the Licence immediately, without prior notice to the User.
AutoNDA by SimpleDocs
The User must. 5.1 Pay the Office Facilities Charge monthly via BACs to: Account Name : Grange Park Centre Bank : Lloyds Bank, 00-00 Xxxx Xx, Xxxxxxxxxxxx, XX00 0XX. Sort code : 30-65-85 Account : 00000000 5.2 Pay interest on any late payment at 4% per annum above the base rate of the Grange Park Centre’s Bankers for the time being 5.3 Ensure the entrance door to the business hub room is secured at all times using the digi-lock. Keep the digi-lock code confidential. If you are the last person to leave for the day, ensure that the key is used to lock the door. 5.4 Secure the main entrance door to the building on entry/exit 5.5 Ensure external windows are secured when exiting the business hub room
The User must. 7.4.1. not copy, transmit, display, perform, distribute (for compensation or otherwise), license, alter, store or otherwise use the Platform or any of its components; 7.4.2. not delete or modify any content of the Platform, including but not limited to, legal notices, disclaimers or proprietary notices such as copyright or trademark symbols, logos, that You do not own or have express permission to modify; 7.4.3. not make false or malicious statements against the Platform, allied services or Ayekart; 7.4.4. not use the Platform in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with these Terms of Use, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the Platform or any operating system; 7.4.5. not engage in any form of antisocial, disrupting, or destructive acts, including ‘flaming’, ‘Spamming’, ‘flooding’, ‘trolling’, ‘phishing’ and ‘griefing’ as those terms are commonly understood and used on the internet; 7.4.6. not use the Platform or any allied services in a way that could damage, disable, overburden, impair or compromise the Platform, our systems or security or interfere with other Users; 7.4.7. not carry out reverse engineering in respect of the hardware orsoftware underlying the Platform or any part thereof; and 7.4.8. comply with any applicable law and regulation relating to downloading, using or otherwise exporting the technology used orsupported by the Platform or allied services, which may include but is not limited to not using the Platform in a country where the use of the Platform or any allied service is unlawful.
The User must a. keep its Credentials in strict confidence and not share them with third parties for any purposes related to the Account. In addition, the User must not disclose its Credentials so that they can be recognized by third parties on any device (for example, by writing or writing them down without encryption); b. make all reasonable efforts to protect all records relating to its Credentials, including, but not limited to, storing such records in a secure or physical location accessible or known only to the User, as well as storing them in a location unlikely to be accessed by third parties; c. take all reasonable steps to comply with the security instructions provided by the Company, otherwise protect the security, prevent forgery or use by any other person of the User Credentials, the Website or the Platform, including the security measures prescribed in our Privacy Policy; d. immediately notify the Company through any channel indicated by the Company in the event of: - loss of your User Credentials; - disclosure of your Credentials to third parties or if they have otherwise been compromised; - if you have a reasonable suspicion of any unauthorized use of your Credentials; e. create strong passwords to access the Platform (for example, using a combination of letters, numbers and special characters and not using easily accessible personal information).
The User must i. keep intact all and any copyright and proprietary notices accompanying or attached to the materials on the Website or App the User may lawfully download, copy, store or print; ii. acknowledge Smartly as the owners of the content of the Website and App; iii. erase any pages of the Website or App or materials on those pages downloaded other than in accordance with this clause; and iv. destroy any pages of the Website or App downloads or materials on those pages printed other than in accordance with this clause.
The User must. A. Comply with all directions and conditions given by CUPF and the County; B. Ensure that the activity conforms to the use described in the Application; C. Remain at the site during the Activity and possess the CUPF reservation approval document during the Activity; X. Xxxxxxxxxx supervise and maintain orderly conduct among the persons attending the Activity covered by the reservation; E. Obtain and pay for any necessary licenses and permits, including licenses and permits required to distribute food, serve alcohol, sell goods, conduct fundraisers, sponsor a performance or other large public gathering. The User is liable for any applicable taxes, fees, and similar costs related to obtaining theses permits. User is responsible for ensuring that any company or service providers in their employ such as caterer, event supplier, or photographer/videographer are in compliance with state and local laws and regulations; F. Comply with all applicable federal, state, and local laws, rules, regulations, and guidelines. This includes compliance with all applicable federal, state, and local nondiscrimination laws, including Title VII of the 1964 Civil Rights Act and the Americans with Disabilities Act of 1990. The User must keep the program or activity open to the public as required by State law, and must not discriminate on the basis of race, color, creed, religion, ancestry, national origin, age, sex, marital status, disability, or sexual orientation.
The User must. (a) comply at all times with the Code of Conduct made available to the User by ACMI; (b) comply with any reasonable requirements or directions provided by ACMI in relation to the use and occupation of the Studio; (c) comply with ACMI’s Policies; (d) at the end of the Period of Use (or sooner termination of this Agreement): i. ensure that the Studio is left in a clean and tidy condition and any damage caused by the User has been repaired to ACMI’s satisfaction; and ii. deliver to ACMI all keys, passes and security codes giving access to any parts of the Studio or Building which are held by the User or any of the User's members, agents, guests or invitees, whether or not they were supplied by ACMI; and (e) otherwise act in accordance with the terms of this Agreement.
AutoNDA by SimpleDocs
The User must. (a) carry out the Acceptable Use in a business-like and reputable manner; (b) observe and obey all fire or emergency drills; (c) make sure that it is fully aware of and complies with all occupational health and safety and emergency procedures; and (d) inform ACMI immediately if the User is aware of a risk or a danger (for example: a bomb threat or a fire) in any part of the Studio or the Building.

Related to The User must

  • Help Desk A help desk for Product support issues (the “Help Desk”) will be available to Customer. Unless specified in an Order, Customer should contact 000.000.0000 to receive a telephone number for the applicable supporting Solutions & Support Center. Customer will appoint one Product administrator and one backup administrator to serve as the primary point of contact regarding maintenance services.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Query a search query initiated from the Search Box or a Hyperlink, or a request for Matched Ads initiated by the Ad Code on an Ad Page. Results: Paid Search Results, Hyperlink Results, Domain Match Results, Web Search Results and/or Matched Ads, to the extent included in this Agreement and as appropriate to the context. Search Box: a graphical area in which a user can enter a Query. SO: the Service Order.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • The Supplier must 12.1.1 comply with the Buyer’s written instructions and this Call-Off Contract when Processing Buyer Personal Data 12.1.2 only Process the Buyer Personal Data as necessary for the provision of the G-Cloud Services or as required by Law or any Regulatory Body 12.1.3 take reasonable steps to ensure that any Supplier Staff who have access to Buyer Personal Data act in compliance with Supplier's security processes

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!