Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors. (b) If the employer decides to engage subcontractors, the employer shall ensure that these contractors and their employees receive wages, allowances and conditions equal to or better than those contained in this agreement. (c) The use of sham sub contracting arrangements is a breach of this agreement. The contractor who engages subcontractors is responsible for ensuring the employees of sub- contractors receive wages, allowances and conditions equal to or better those contained in this agreement, this obligation extends to liability for all outstanding wages conditions and entitlements under this agreement.
Use of Sub-Contractors If the Applicant requires the use of a Sub-Contractor in order to adequately complete the Project, a collaboration letter, contract or agreement between the Applicant and the Sub-Contractor must be in place prior to the Applicant proceeding with any Milestone which requires assistance from the Sub-Contractor. Applicant shall: (a) identify the Sub-Contractor to Alberta Innovates; (b) provide a copy of such Sub- Contractor agreement to Alberta Innovates upon request, and on a strictly confidential basis; and (c) ensure that dealings with the Sub-Contractor are not prohibited under any Applicable Laws Including any Anti- Bribery, Anti-Corruption and Sanctions Laws or Export Control Laws. Alberta Innovates may request the Applicant to provide evidence that it has paid the Sub-Contractor for such services. If the Applicant is using a Sub-Contractor: (aa) nothing in this Investment Agreement creates any employment, contract, agency relationship, or other direct or indirect, relationship of any kind between Alberta Innovates and such Sub-Contractor; and (bb) the Applicant shall be solely responsible for all work, acts, claims, defaults and liabilities relating to the Sub-Contractor.
Use of Subcontractors Nothing in this Appendix 2 shall prevent the Interconnection Parties from utilizing the services of subcontractors as they deem appropriate to perform their respective obligations hereunder, provided, however, that each Interconnection Party shall require its subcontractors to comply with all applicable terms and conditions of this Appendix 2 in providing such services.
Use of websites (a) The Guarantor may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Guarantor and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Guarantor shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Guarantor and the Administrative Agent. (c) The Guarantor shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Guaranty is posted onto the Designated Website; (iv) any existing information which has been provided under this Guaranty and posted onto the Designated Website is amended; or (v) the Guarantor becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Guarantor notifies the Administrative Agent under Section 8.3(c)(i) or Section 8.3(c)(v) above, all information to be provided by the Guarantor under this Guaranty after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.
Use of Logos The Company hereby consents to the use of its and its Subsidiaries’ logos in connection with the Debt Financing so long as such logos (i) are used solely in a manner that is not intended to or likely to harm or disparage the Company Group or the reputation or goodwill of the Company Group; (ii) are used solely in connection with a description of the Company, its business and products or the Merger; and (iii) are used in a manner consistent with the other terms and conditions that the Company reasonably imposes.
Use of Attachment Facilities by Third Parties Purpose of Attachment Facilities. Except as may be required by Applicable Laws and Regulations, or as otherwise agreed to among the Parties, the Attachment Facilities shall be constructed for the sole purpose of interconnecting the Large Generating Facility to the New York State Transmission System and shall be used for no other purpose.
Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.
Use of Service Areas The service areas, as located within the Project, shall be ear- marked for purposes such as parking spaces and services including but not limited to electric sub-station, transformer, DG set rooms, underground water tanks, Pump rooms, maintenance and service rooms, firefighting pumps and equipment etc. and other permitted uses as per sanctioned plans. The Allottee shall not be permitted to use the services areas in any manner whatsoever, other than those earmarked as parking spaces and the same shall be reserved for use by the Association for rendering maintenance services.
Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-‐accredited registrar.