Use of IMMA data Sample Clauses

Use of IMMA data. One of the key components of the IWC Ship Strikes Strategic Plan is to identify high risk areas for ship strikes. Workshop participants noted that the IMMA process might allow a systematic way to identify such high risk areas. The IMMA Secretariat of the Marine Mammal Protected Areas Task Force welcomed feedback from the IWC into the IMMA process with respect to information and data needs. Participants discussed the illustrative maps compiled by Xxxx Xxxxxx that displayed the distribution of IMMAs in the Mediterranean for fin and sperm whales, as well as the potential buffer areas surrounding the IMMAs, shipping density, and marine mammal occurrence records. Participants discussed the potential biases in the underlying data that are used in IMMAs and the shipping data overlays. For example, the species data from OBIS comprise both systematic and opportunistic sightings data, which will have an effort bias. Similarly, AIS data from terrestrial receivers may have an effort bias, with a lower proportion of transmissions received from vessels further offshore. Habitat modelling (not included in the IMMA process) may be useful to identify potential habitat for depleted populations or where survey data are not available for the whole area. The workshop suggested that weighting data for effort could be a useful approach in IMMAs. As well as occurrence data, it would be good to look at how the animals use the IMMA (e.g. feeding, or breeding) to help inform management options. It would also be useful to include records of actual ship strikes. The workshop discussed the role played by existing networks in facilitating the IMMA process. In the Mediterranean, this included work done by ACCOBAMS and its member Governments, and work within the EU processes, and the Ecosystems Approach under the Barcelona Convention. The importance of input from the established network of researchers, governments, and NGOs working in the region was also recognized. The workshop agreed that both small and large cetaceans can be vulnerable to ship strikes, although large whales are more likely to be hit. The IWC Ship Strikes Strategy addresses the problem for all cetaceans. The workshop agrees that Important Marine Mammal Areas (IMMAs) represent a systematic and biocentric approach to identifying important habitats, and that as such they can be helpful in identifying potential high risk areas for ship strikes. In particular, if an IMMA contains a species or population that is vulnerable to...
AutoNDA by SimpleDocs

Related to Use of IMMA data

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • Use of websites (a) The Guarantor may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Guarantor and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Guarantor shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Guarantor and the Administrative Agent. (c) The Guarantor shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Guaranty is posted onto the Designated Website; (iv) any existing information which has been provided under this Guaranty and posted onto the Designated Website is amended; or (v) the Guarantor becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Guarantor notifies the Administrative Agent under Section 8.3(c)(i) or Section 8.3(c)(v) above, all information to be provided by the Guarantor under this Guaranty after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Materials There should be no limitations or restrictions by Union upon a Contractor's choice of materials or design, nor, regardless of source or location, upon the full use and utilization, of equipment, machinery, packaging, precast, prefabricated, prefinished, or preassembled materials, tools or other labor saving devices, subject to the application of the California Public Contract and Labor Codes. Generally, the onsite installation or application of such items shall be performed by the craft having jurisdiction over such work.

  • Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.

  • Use of Issuer PII The Issuer does not grant the Asset Representations Reviewer any rights to Issuer PII except as provided in this Agreement. The Asset Representations Reviewer will use Issuer PII only to perform its obligations under this Agreement or as specifically directed in writing by the Issuer and will only reproduce Issuer PII to the extent necessary for these purposes. The Asset Representations Reviewer must comply with all laws applicable to PII, Issuer PII and the Asset Representations Reviewer’s business, including any legally required codes of conduct, including those relating to privacy, security and data protection. The Asset Representations Reviewer will protect and secure Issuer PII. The Asset Representations Reviewer will implement privacy or data protection policies and procedures that comply with applicable law and this Agreement. The Asset Representations Reviewer will implement and maintain reasonable and appropriate practices, procedures and systems, including administrative, technical and physical safeguards to (i) protect the security, confidentiality and integrity of Issuer PII, (ii) ensure against anticipated threats or hazards to the security or integrity of Issuer PII, (iii) protect against unauthorized access to or use of Issuer PII and (iv) otherwise comply with its obligations under this Agreement. These safeguards include a written data security plan, employee training, information access controls, restricted disclosures, systems protections (e.g., intrusion protection, data storage protection and data transmission protection) and physical security measures.

  • Use of Marks To the extent one party’s Marks must be utilized by the other party in connection with the operation of a particular Component System or the Licensed Services related to the particular Component System: the Company hereby grants to BNYM a non-exclusive, limited license to use its Marks solely in connection with the Licensed Services provided by the Component System; BNYM hereby grants to the Company a non-exclusive, limited license to use its Marks solely in connection with the Licensed Services provided by the Component System; all use of Marks shall be in accordance with the granting party’s reasonable policies regarding the advertising and usage of its Marks as established from time to time; the Company hereby grants BNYM the right and license to display the Company’s Mark’s on applicable BNYM Web Applications and in advertising and marketing materials related to the BNYM Web Application and the Licensed Services provided by the relevant Component System; each party shall retain all right, title and interest in and to its Marks worldwide, including any goodwill associated therewith, subject to the limited license granted in this Section 4.5; use of the Marks hereunder by the grantee pursuant to this limited license shall inure to the benefit of the trademark owner and grantees shall take no action that is inconsistent with the trademark owner’s ownership thereof; each party shall exercise reasonable efforts within commercially reasonable limits, to maintain all on-screen disclaimers and copyright, trademark and service xxxx notifications, if any, provided to it by the other party in writing from time to time, and all “point and click” features relating to Authorized Persons’ acknowledgment and acceptance of such disclaimers and notifications; and a party shall immediately cease using another party’s Marks immediately upon termination of the Licensed Rights governing the relevant Component System.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!