Third Party Property Protection Sample Clauses

Third Party Property Protection. Buyer will indemnify and hold Siemens and its subcontractors harmless for any liability arising out of loss of or damage to property at the Site which arises out of a Nuclear Incident. In addition, Buyer shall obtain for the benefit of Siemens and its subcontractors, protection against liability for, arising out of, or resulting from damage to any property or equipment located at the Site which is used or intended for use by Buyer in connection with the operation of the nuclear power plant (including but not limited to fuel) and which is owned by parties other than Buyer.
AutoNDA by SimpleDocs
Third Party Property Protection. Buyer will indemnify and hold Flender and its subcontractors harmless for any liability arising out of loss of or damage to property at the Site which arises out of a Nuclear Incident. In addition, Buyer shall obtain for the benefit of Flender and its subcontractors, protection against liability for, arising out of, or resulting from damage to any property or equipment located at the Site which is used or intended for use by Buyer in connection with the operation of the nuclear power plant (including but not limited to fuel) and which is owned by parties other than Buyer.
Third Party Property Protection. Buyer will indemnify and hold Russelectric and its subcontractors harmless for any liability arising out of loss of or damage to property at the Site which arises out of a Nuclear Incident. In addition, Buyer shall obtain for the benefit of Russelectric and its subcontractors, protection against liability for, arising out of, or resulting from damage to any property or equipment located at the Site which is used or intended for use by Buyer in connection with the operation of the nuclear power plant (including but not limited to fuel) and which is owned by parties other than Buyer.

Related to Third Party Property Protection

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Liability Protection Whenever an action or proceeding for damages is filed against any Bargaining Unit employee arising from his/her act or omission while performing his/her official duties, such employee(s) may request that the Attorney General defend the action or proceeding at the expense of the state. If the Attorney General determines that the employee was acting in good faith and within the course of his or her official duties, the Attorney General will defend the employee. If the body presiding over the action determines that the employee was acting within the scope of his or her official duties and enters a judgment against the employee, the judgment will be satisfied by the state.

  • Access to Property, Property’s Management, Property Lender, and Property Tenants Potential Investor agrees to not seek to gain access to any non-public areas of the Property or communicate with Property’s management employees, the holder of any financing encumbering the Property, the Property’s tenants, and the Owner’s partners in the ownership of the Property, without the prior consent of Owner or HFF, which consent may be withheld in the Owner’s sole discretion.

  • City Property All original documents, drawings, electronic media, and other materials prepared by CONTRACTOR pursuant to this Agreement immediately become the exclusive property of the CITY, and shall not be used by CONTRACTOR for any other purpose without the CITY’s prior written consent.

  • Personal Property Reimbursement Employees shall, in proper cases, be reimbursed for the repair or replacement of personal property damaged in the line of duty without fault of the employee. The amount of reimbursement for articles of clothing shall be the depreciated value based on the age and condition of the article. Reimbursement for a watch shall be limited to the functional value of the watch.

  • THIRD PARTY PROGRAMS This Licensed Software may contain third party software programs (“Third Party Programs”) that are available under open source or free software licenses. This License Agreement does not alter any rights or obligations You may have under those open source or free software licenses. Notwithstanding anything to the contrary contained in such licenses, the disclaimer of warranties and the limitation of liability provisions in this License Agreement shall apply to such Third Party Programs.

  • Personal Information Protection Each party represents and warrants that procedures compatible with relevant personal information and data protection laws and regulations will be employed so that processing and transfer of such information and data identifiers will not be impeded. d.

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • Identity Protection Law Grantee must have and maintain a formal written information security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to unauthorized persons, as required by the Oregon Consumer Information Protection Act, ORS 646A.600-646A.628. If Grantee or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600 – 628, (collectively, “Breach”) with respect to Confidential Information, Grantee must promptly but in any event within one calendar day (i) notify the Agency Grant Manager of such Breach and (ii) if the applicable Confidential Information was in the possession of Grantee or its agents at the time of such Breach, Grantee must (a) investigate and remedy the technical causes and technical effects of the Breach and (b) provide Agency with a written root cause analysis of the Breach and the specific steps Grantee will take to prevent the recurrence of the Breach or to ensure the potential Breach will not recur. For the avoidance of doubt, if Agency determines notice required of any such Breach to any individual(s) or entity(ies), Agency will have sole control over the timing, content, and method of such notice, subject to Grantee’s obligations under applicable law.

  • Privacy Protection Each of the Corporation and the Subsidiaries have security measures and safeguards in place to protect personal information it collects from registered patients and customers and other parties from illegal or unauthorized access or use by its personnel or third parties or access or use by its personnel or third parties in a manner that violates the privacy rights of third parties. The Corporation and the Subsidiaries have complied, in all material respects, with all applicable privacy and consumer protection legislation and neither has collected, received, stored, disclosed, transferred, used, misused or permitted unauthorized access to any information protected by privacy laws, whether collected directly or from third parties, in an unlawful manner. The Corporation and the Subsidiaries have taken all reasonable steps to protect personal information against loss or theft and against unauthorized access, copying, use, modification, disclosure or other misuse.

Time is Money Join Law Insider Premium to draft better contracts faster.