Use of ICT Sample Clauses

Use of ICT. Yes CHAPTER 10: Electronic commerce Mobility of business people : Yes CHAPTER 9; Article 2 Freedom of transit : No Transport and logistics : No Trade finance : No OTHER AREAS Government Procurement : Yes specifically excluded in services (Article1, Chapter 8) and Investment (Article1, Chapter 11) Investment : Yes CHAPTER 11 Competition Policy : Yes CHAPTER 14 Intellectual Property : Yes Chapter 13 Dispute Settlement : Yes CHAPTER 17 Labor Mobility : No Labor and Environmental Standards : No Technical cooperation : Yes CHAPTER 12 Institutional mechanism : Yes CHAPTER 2; Article 11 Notes : RULES OF ORIGIN Cumulation CHAPTER 3; Article 6: Partial Specific Process CHAPTER 3; Annex 2 Heading Change De Minimis CHAPTER 3; Article 8: Except HS 50-63: 10% of FOB/ HS 50-63: 10% of FOB, or 10% of the total weight Minimum Content Drawback Not mentioned HTTP Link xxxx://xxx.xxxxx.xxx.xxxx.xx/chapter-3-rules-of-origin/ Notes :
AutoNDA by SimpleDocs
Use of ICT. 2.1. While at College or a College-related activity, you must not have involvement with any material or activity which might put yourself at risk. The use of social networking sites, including but not limited to Facebook are therefore prohibited. As well, you must not at any time use ICT to upset, harass, or harm anyone else in the College community, or the College itself, even if it is meant as a ‘joke’. Unacceptable use could include acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the College may need to respond to also include the use of websites to facilitate misconduct which puts at risk the safety of the College environment.
Use of ICT. While at school or a school-related activity, you must not have involvement with any material or activity which might put yourself or others at risk. As well, you must not at any time use ICT to upset, bully, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’. • Unacceptable use could include, but is not limited to, acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the school may need to respond to may also include the use of websites, applications, social networking sites, or the like, to facilitate misconduct which puts at risk the safety of the school community. • If any privately-owned ICT equipment/device, such as a Chromebook, laptop, desktop, mobile phone, camera, or recording device, portable storage (like a USB or flash memory device), is brought to school or a school-related activity, the school cybersafety rules apply to that device. If you are not sure whether it is appropriate to have a particular device at school or at a school- related activity, you are expected to check with the relevant teacher before bringing it.
Use of ICT. No Mobility of business people : No Freedom of transit : No Transport and logistics : No Trade finance : No OTHER AREAS Government Procurement : Yes Chapter 6 Investment : Yes Chapter 4 Competition Policy : Yes Chapter 7 Intellectual Property : Yes Chapter 5 and Annex XII Dispute Settlement : Yes Chapter 10 Labor Mobility : No Labor and Environmental Standards : Yes Chapter 8 Technical cooperation : No Institutional mechanism : Yes Chapter 9 Notes : RULES OF ORIGIN Cumulation CHAPTER 2; ARTICLE 2.2; Xxxxx XX:Article 6: Allowed, Partical Specific Process APPENDIX 1 (9.1): specific processes Heading Change De Minimis Xxxxx XX:Article 4 (4): 20% of the ex-works price Minimum Content Drawback Not mentioned HTTP Link xxxx://xxx.xxxx.xxx/media/documents/legal-texts/free-trade-relations/hong-kong-china/annexes/Annex%20IV%20- %20Rules%20of%20Origin.pdf Notes :
Use of ICT. 2.1 While at school-related activity, you must not have involvement with any material or activity which might put yourself at risk. As well, you must not at any time use ICT to upset, harass, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’. Unacceptable use could include acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the school may need to respond to also includes the use of websites to facilitate misconduct which puts at risk the safety of the school environment
Use of ICT. 2.1 While at school or a school-related activity, you must not have involvement with any material or activity which might put yourself or others at risk. As well, you must not at any time use ICT to upset, bully, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’.
Use of ICT. 2.1. While at College or a College‐related activity, you must not have involvement with any material or activity which might put yourself at risk. The use of social networking sites, including but not limited to MySpace and Facebook is therefore prohibited. As well, you must not at any time use ICT to upset, harass, or harm anyone else in the College community, or the College itself, even if it is meant as a ‘joke’. Unacceptable use could include acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the College may need to respond to also include the use of websites to facilitate misconduct which puts at risk the safety of the College environment. If any privately‐owned ICT equipment/device, such as a, notebook, netbook or desktop, PDA, mobile phone, camera, or recording device, portable storage (like a USB or flash memory device), is brought to College or a College‐related activity, the College cybersafety rules apply to that device. If you are not sure whether it is appropriate to have a particular device at College or at a College‐related activity, you are expected to check with the relevant teacher before bringing it to the College.
AutoNDA by SimpleDocs
Use of ICT. Digital Agenda of Europe aims at contributing to the economic growth and helping individuals and businesses in the EU to make the most of the development of digital technologies. The programme is the first of the seven initiatives in the Europe 2020 Strategy for smart, sustainable and inclusive growth. Therefore, investment under ESIF to support the creation, access, and use of services based on ICT is crucial for all sectors and regions of Bulgaria and for the country objectives by the key indicators of Digital Agenda Scoreboard, and especially for rural, less developed and populated areas, and aiming at the poor and vulnerable groups of special needs people. The main planned areas of intervention are building infrastructure for next generation access, digital (electronic) access and promoting the development and widespread adoption of ICT products and services, including Internet-based ones. The introduction of ultra-high-speed open and competitive networks will stimulate a favourable cycle of development of the digital economy that will enable new and demanding broadband services to develop and meet the need for accelerated development of backward areas. In order to address the challenges identified in the analysis of the PA it is necessary that investments in ICT be focused on the following areas: solving the problem of the construction of broadband next generation access in remote, sparsely populated and rural areas; digitization of existing records and archives in the administration; building of new NGA networks and improvement of existing broadband infrastructure; providing better deployed broadband technology to ensure the successful operation of e-government in Bulgaria; creation and implementation of information systems for management, monitoring and control in key sectors; providing the necessary equipment for the operation of e-government in the state and municipal authorities, education, health and social services. In accordance with the ex-ante conditionalities, Bulgarian authorities will draw up a national plan for next generation access, aimed at achieving the objectives of the Digital Agenda of Europe, namely: 98% coverage with connectivity speed of 30 Mbps; 50% coverage with connectivity speed of 100 Mbps In the document, based on an economic analysis, a plan of investments in the infrastructure will be developed, taking into account the existing one. This process will be fully in line with the draft Regulation to reduce the cost of deplo...

Related to Use of ICT

  • Use of Image I hereby consent to the use of my image by EMPOWER for any and all purposes, including, without limitation or compensation: Video, still photographs, publication and any trade or advertising purposes, providing such uses are not made as to constitute a direct endorsement of any product or service. PARTICIPANT INFORMATION (MUST BE COMPLETED FOR ALL PARTICIPANT(S) Name of Participant: (Print Clearly) Initial Date of Birth: _ Weight: Check In on Facebook Street Address: City: State: Zip: Phone Number: Email Address: Emergency Contact: Phone Number: Emergency Contact’s Relationship to Participant: By signing this document, I acknowledge that I may be found by a court of law to have waived my right to a lawsuit against the Released Parties on the basis of any claim herein from which I have released them. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE CAREFULLY READ AND UNDERSTOOD IT AND AGREE TO BE BOUND BY ITS TERMS. Participant’s Signature: (Over 18 years of age) Date: PARENT OR GUARDIAN’S ADDITIONAL INDEMNIFICATION (MUST BE COMPLETED FOR PARTICIPANTS UNDER THE AGE OF 18) I, (parent/guardian name), the parent/guardian of (Xxxxx’s name) whose date of birth is / / give permission for my child to participate in the activities and utilize the equipment and facilities provided by EMPOWER. I have reviewed the terms of the above Agreement and, as parent/guardian, accept its terms. I have discussed the terms of the above Agreement with my child and am assured by my child that he/she understands the Agreement and has also freely accepted its terms. I agree to fully release, indemnify and hold harmless the Released Parties from any claims which I may have and, to the fullest extent allowed by law, to release the Released Parties on behalf of my child for any claim(s) that my child may have. I further agree to indemnify and hold harmless the Released Parties from any and all claims which are brought by, or on behalf of the above stated minor and which are in any way connected with such use or participation by the above stated minor. I HAVE HAD THE SUFFICIENT OPPORTUNITY TO READ THIS ENTIRE DOCUMENT. I HAVE READ AND UNDERSTOOD IT AND AGREE THAT MYSELF AND MY MINOR CHILD ARE TO BE BOUND BY ITS TERMS. Parent/Guardian’s Signature: Date:

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Name (a) The Sub-Adviser hereby consents to the use of its name and the names of its affiliates in the Fund’s disclosure documents, shareholder communications, advertising, sales literature and similar communications. The Sub-Adviser shall not use the name or any tradename, trademark, trade device, service xxxx, symbol or any abbreviation, contraction or simulation thereof of the Adviser, the Trust, the Fund or any of their affiliates in its marketing materials unless it first receives prior written approval of the Trust and the Adviser.

  • Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Use of Names The Manager and the Fund agree that the Manager has a proprietary interest in the names “DFA” and “Dimensional,” and that the Fund and/or Portfolio may use such names only as permitted by the Manager, and the Fund further agrees to cease use of such names promptly after receipt of a written request to do so from the Manager.

  • Use of PTO 10.5.1 PTO may be used as soon as it is earned, up to the amount accrued in the pay period immediately preceding the time off, in accordance with the provisions of this Article. PTO may not be used in advance of its accrual, on regularly scheduled days off, or to claim pay for time lost due to tardiness.

  • Use of Marks To the extent one party’s Marks must be utilized by the other party in connection with the operation of a particular Component System or the Licensed Services related to the particular Component System: the Company hereby grants to BNYM a non-exclusive, limited license to use its Marks solely in connection with the Licensed Services provided by the Component System; BNYM hereby grants to the Company a non-exclusive, limited license to use its Marks solely in connection with the Licensed Services provided by the Component System; all use of Marks shall be in accordance with the granting party’s reasonable policies regarding the advertising and usage of its Marks as established from time to time; the Company hereby grants BNYM the right and license to display the Company’s Mark’s on applicable BNYM Web Applications and in advertising and marketing materials related to the BNYM Web Application and the Licensed Services provided by the relevant Component System; each party shall retain all right, title and interest in and to its Marks worldwide, including any goodwill associated therewith, subject to the limited license granted in this Section 4.5; use of the Marks hereunder by the grantee pursuant to this limited license shall inure to the benefit of the trademark owner and grantees shall take no action that is inconsistent with the trademark owner’s ownership thereof; each party shall exercise reasonable efforts within commercially reasonable limits, to maintain all on-screen disclaimers and copyright, trademark and service xxxx notifications, if any, provided to it by the other party in writing from time to time, and all “point and click” features relating to Authorized Persons’ acknowledgment and acceptance of such disclaimers and notifications; and a party shall immediately cease using another party’s Marks immediately upon termination of the Licensed Rights governing the relevant Component System.

  • Use of Content The content on the App is provided to you “as is” for your personal use only and may not be used, copied, distributed, transmitted, broadcast, displayed, sold, licensed, de-compiled, or otherwise exploited for any other purposes whatsoever without our prior written consent. If you download or print a copy of the content you must retain all copyright and other proprietary notices contained therein.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!