Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Use of websites (a) The Guarantor may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Guarantor and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Guarantor shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Guarantor and the Administrative Agent. (c) The Guarantor shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Guaranty is posted onto the Designated Website; (iv) any existing information which has been provided under this Guaranty and posted onto the Designated Website is amended; or (v) the Guarantor becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Guarantor notifies the Administrative Agent under Section 8.3(c)(i) or Section 8.3(c)(v) above, all information to be provided by the Guarantor under this Guaranty after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.
Use of Marks To the extent one party’s Marks must be utilized by the other party in connection with the operation of a particular Component System or the Licensed Services related to the particular Component System: the Company hereby grants to BNYM a non-exclusive, limited license to use its Marks solely in connection with the Licensed Services provided by the Component System; BNYM hereby grants to the Company a non-exclusive, limited license to use its Marks solely in connection with the Licensed Services provided by the Component System; all use of Marks shall be in accordance with the granting party’s reasonable policies regarding the advertising and usage of its Marks as established from time to time; the Company hereby grants BNYM the right and license to display the Company’s Mark’s on applicable BNYM Web Applications and in advertising and marketing materials related to the BNYM Web Application and the Licensed Services provided by the relevant Component System; each party shall retain all right, title and interest in and to its Marks worldwide, including any goodwill associated therewith, subject to the limited license granted in this Section 4.5; use of the Marks hereunder by the grantee pursuant to this limited license shall inure to the benefit of the trademark owner and grantees shall take no action that is inconsistent with the trademark owner’s ownership thereof; each party shall exercise reasonable efforts within commercially reasonable limits, to maintain all on-screen disclaimers and copyright, trademark and service xxxx notifications, if any, provided to it by the other party in writing from time to time, and all “point and click” features relating to Authorized Persons’ acknowledgment and acceptance of such disclaimers and notifications; and a party shall immediately cease using another party’s Marks immediately upon termination of the Licensed Rights governing the relevant Component System.
Use of Materials There should be no limitations or restrictions by Union upon a Contractor's choice of materials or design, nor, regardless of source or location, upon the full use and utilization, of equipment, machinery, packaging, precast, prefabricated, prefinished, or preassembled materials, tools or other labor saving devices, subject to the application of the California Public Contract and Labor Codes. Generally, the onsite installation or application of such items shall be performed by the craft having jurisdiction over such work.
Use of Material The Employer intends using the information provided by the Consultant for purposes including: • professional advice regarding decisions to be made in connection with the subject matter of the services; • inputs into the work of others and the administration of contracts; and • professional inputs into the delivery process Task specific use of information provided by the Consultant is set out in the Task Order.
Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.
Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-‐accredited registrar.
Use of FIIOC’s and FSC's Name The Trust shall not use the name of FIIOC and FSC in any Prospectus, sales literature or other material relating to the Trust or any Fund of the Trust in a manner not consented to by FIIOC and FSC prior to use; provided, however, that FIIOC and FSC shall approve all uses of its name which merely refer in accurate terms to its appointments, duties or fees hereunder or which are required by the Securities and Exchange Commission ("SEC" or “Commission”) or a state securities commission; and further, provided that in no event shall such approval be unreasonably withheld.
Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.
Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords. 5.2 We may enlist outside organizations to help us manage the website and collect and analyze statistical data. These outside organizations may install and use their own cookies on our behalf.