Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.
Liability Protection Whenever an action or proceeding for damages is filed against any Bargaining Unit employee arising from his/her act or omission while performing his/her official duties, such employee(s) may request that the Attorney General defend the action or proceeding at the expense of the state. If the Attorney General determines that the employee was acting in good faith and within the course of his or her official duties, the Attorney General will defend the employee. If the body presiding over the action determines that the employee was acting within the scope of his or her official duties and enters a judgment against the employee, the judgment will be satisfied by the state.
Third Party Programs This Licensed Software may contain third party software programs (“Third Party Programs”) that are available under open source or free software licenses. This License Agreement does not alter any rights or obligations You may have under those open source or free software licenses. Notwithstanding anything to the contrary contained in such licenses, the disclaimer of warranties and the limitation of liability provisions in this License Agreement shall apply to such Third Party Programs.
Third Party Providers Except for those terms and conditions that specifically apply to Third Party Providers, under no circumstances shall any other person be considered a third party beneficiary of this Agreement or otherwise entitled to any rights or remedies under this Agreement. Except as may be provided in Third Party Agreements, Company shall have no rights or remedies against Third Party Providers, Third Party Providers shall have no liability of any nature to the Company, and the aggregate cumulative liability of all Third Party Providers to the Company shall be $1.
Privacy Protection The Grantee shall comply with all applicable federal and state privacy laws, including Section 631 of the Cable Act and regulations adopted pursuant thereto.
Whistle Blowing Protection The Employer agrees to adhere to the whistle blowing protection pursuant to the
Third Party Users If required by Applicable Laws and Regulations or if the Parties mutually agree, such agreement not to be unreasonably withheld, to allow one or more third parties to use the Connecting Transmission Owner’s Attachment Facilities, or any part thereof, Developer will be entitled to compensation for the capital expenses it incurred in connection with the Attachment Facilities based upon the pro rata use of the Attachment Facilities by Connecting Transmission Owner, all third party users, and Developer, in accordance with Applicable Laws and Regulations or upon some other mutually-agreed upon methodology. In addition, cost responsibility for ongoing costs, including operation and maintenance costs associated with the Attachment Facilities, will be allocated between Developer and any third party users based upon the pro rata use of the Attachment Facilities by Connecting Transmission Owner, all third party users, and Developer, in accordance with Applicable Laws and Regulations or upon some other mutually agreed upon methodology. If the issue of such compensation or allocation cannot be resolved through such negotiations, it shall be submitted to FERC for resolution.
Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.
Child Protection The Contractor acknowledges that it (and its personnel) are aware of the requirements of the Child Protection (Working with Children) Act 2012 (NSW) and all related laws concerning child protection (Child Protection Laws). The Contractor will ensure that it (and its personnel) comply with the requirements of the Child Protection Laws and policies of the DoE relating to child protection as notified to the Contractor from time to time. The Contractor must, at the Contractor’s expense, certify that the Contractor and the Contractor’s personnel are not a prohibited person under any Child Protection Laws and undergo any other screening, such as the ‘Working with Children Check’, as required under Child Protection Laws or by the School (or DoE). Any of the Contractor’s personnel that is a prohibited person under any Child Protection Laws must not be engaged in providing any Services. The Contractor is to immediately advise the Department if it becomes aware that it (or its personnel) are the subject of a reportable allegation involving children.
Third Party Use You may allow your agents, contractors and outsourcing service providers (each a “Permitted Third Party”) to use the Product(s) licensed to you hereunder solely for your benefit in accordance with the terms of this XXXX and you are responsible for any such Permitted Third Party’s compliance with this XXXX in such use. Any breach by any Permitted Third Party of the terms of this XXXX will be considered your breach.