Transfer to third parties by recipients Sample Clauses

Transfer to third parties by recipients. MTA for supply of material from the public collection to primary recipients (the requestors or ‘mBRC customers’) should not allow third party transfer. An important reason for this is that there is a risk that the resources will be transferred by the primary recipients to such third parties without the documentation, raising the chances of non-compliant use. It is also noted that the authenticity and identity of microbial strains cannot be assured along a user chain, and such practice is therefore generally not recommended for microbial materials.
AutoNDA by SimpleDocs

Related to Transfer to third parties by recipients

  • Restricted Use By Third Parties Third parties retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: (i) Licensee gives notice to Contractor of such third party, Site of intended use of the Product, and means of access; and (ii) such third party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement, which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and (iii) such third party maintains a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non- Disclosure Agreement create or impose any liabilities on the State or Licensee.

  • TRANSFER TO A THIRD PARTY You may transfer the software directly to a third party only with the licensed computer. The transfer must include the software and the Certificate of Authenticity label. You may not keep any copies of the software or any earlier version. Before any permitted transfer, the other party must agree that this agreement applies to the transfer and use of the software.

  • Payments to Third Parties Grantee agrees to hold harmless Grantor when Grantor acts in good faith to redirect all or a portion of any Grantee payment to a third party. Grantor will be deemed to have acted in good faith if it is in possession of information that indicates Grantee authorized Grantor to intercept or redirect payments to a third party or when so ordered by a court of competent jurisdiction.

  • Information Given to Third Parties We may disclose information to third parties about you, your account, and the transactions on your account: (i) where it is necessary or helpful for completing transactions; (ii) in order to verify the existence and condition of the account for a third party (e.g., a merchant); (iii) in order to comply with government agency or court orders; (iv) if you give us your consent; (v) to service providers who administer the account or perform data processing, records management, collections, and other similar services for us, in order that they may perform those services; (vi) in order to identify, prevent, investigate or report possible suspicious or illegal activity; (vii) in order to issue authorizations for transactions on the account; (viii) to disclose the existence, history, and condition of your account to consumer reporting agencies; and (ix) as permitted by law. Please see our Privacy Policy for further details.

  • Use by Third Parties You may permit Authorized Third Parties to exercise the Usage Rights on Your behalf, provided that You are responsible for (a) ensuring that such Authorized Third Parties comply with this XXXX and (b) any breach of this XXXX by such Authorized Third Parties.

  • Agreements by Third Parties Business Associate shall enter into an agreement with any subcontractor of Business Associate that creates, receives, maintains or transmits PHI on behalf of Business Associate. Pursuant to such agreement, the subcontractor shall agree to be bound by the same or greater restrictions, conditions, and requirements that apply to Business Associate under this Addendum with respect to such PHI.

  • No Rights in Third Parties This Agreement does not create any rights in, or inure to the benefit of, any third party except as expressly provided herein.

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • Your Liability for Unauthorized Transfers Immediately following your discovery of an unauthorized Payment Instruction, you shall communicate with customer care for the Service in the manner set forth in Section 6 of the General Terms above. You acknowledge and agree that time is of the essence in such situations. If you tell us within two (2) Business Days after you discover your password or other means to access your account through which you access the Service has been lost or stolen, your liability is no more than $50.00 should someone access your account without your permission. If you do not tell us within two (2) Business Days after you learn of such loss or theft, and we can prove that we could have prevented the unauthorized use of your password or other means to access your account if you had told us, you could be liable for as much as $500.00. If your monthly financial institution statement contains payments that you did not authorize, you must tell us at once. If you do not tell us within sixty (60) days after the statement was sent to you, you may lose any amount transferred without your authorization after the sixty (60) days if we can prove that we could have stopped someone from taking the money had you told us in time. If a good reason (such as a long trip or a hospital stay) prevented you from telling us, we will extend the time periods specified above to a reasonable period.

  • Obligations Owed to Third Parties The Contractor represents and warrants that all obligations owed to third parties with respect to the activities contemplated to be undertaken by the Contractor pursuant to the Contract are or will be fully satisfied by the Contractor so that the State and the State Entity will not have any obligations with respect thereto.

Time is Money Join Law Insider Premium to draft better contracts faster.