Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords. 5.2 We may enlist outside organizations to help us manage the website and collect and analyze statistical data. These outside organizations may install and use their own cookies on our behalf.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Use of the Name BlackRock The Advisor has consented to the use by the Fund of the name or identifying word “BlackRock” in the name of the Fund. Such consent is conditioned upon the employment of the Advisor as the investment advisor to the Fund. The name or identifying word “BlackRock” may be used from time to time in other connections and for other purposes by the Advisor and any of its affiliates. The Advisor may require the Fund to cease using “BlackRock” in the name of the Fund if the Fund ceases to employ, for any reason, the Advisor, any successor thereto or any affiliate thereof as investment advisor of the Fund.
Use of websites (a) The Borrower may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Borrower and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Borrower shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Borrower and the Administrative Agent. (c) The Borrower shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Agreement is posted onto the Designated Website; (iv) any existing information which has been provided under this Agreement and posted onto the Designated Website is amended; or (v) the Borrower becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Borrower notifies the Administrative Agent under Section 5.3(c)(i) or Section 5.3(c)(v) above, all information to be provided by the Borrower under this Agreement after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.
Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.
Use of Words and Phrases Herein," "hereby," "hereunder," "hereof," "hereinbefore," "hereinafter" and other equivalent words refer to the Pooling and Servicing Agreement as a whole. All references herein to Articles, Sections or Subsections shall mean the corresponding Articles, Sections and Subsections in the Pooling and Servicing Agreement. The definitions set forth herein include both the singular and the plural.
Use of the Name “Xxxxx Xxxxx”. The Adviser hereby consents to the use by the Fund of the name “Xxxxx Xxxxx” as part of the Fund’s name; provided, however, that such consent shall be conditioned upon the employment of the Adviser or one of its affiliates as the investment adviser of the Fund. The name “Xxxxx Xxxxx” or any variation thereof may be used from time to time in other connections and for other purposes by the Adviser and its affiliates and other investment companies that have obtained consent to the use of the name “Xxxxx Xxxxx.” The Adviser shall have the right to require the Fund to cease using the name “Xxxxx Xxxxx” as part of the Fund’s name if the Fund ceases, for any reason, to employ the Adviser or one of its affiliates as the Fund’s investment adviser. Future names adopted by the Fund for itself, insofar as such names include identifying words requiring the consent of the Adviser, shall be the property of the Adviser and shall be subject to the same terms and conditions.
Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Use of Common Areas Tenant shall have the nonexclusive right (in common with other tenants and all others to whom Landlord has granted or may grant such rights) to use the Common Areas for the purposes intended, subject to such reasonable rules and regulations as Landlord may establish from time to time. Tenant shall abide by such rules and regulations and shall use its best effort to cause others who use the Common Areas with Tenant's express or implied permission to abide by Landlord's rules and regulations. At any time, Landlord may close any Common Areas to perform any acts in the Common Areas as, in Landlord's judgment, are desirable to improve the Project. Tenant shall not interfere with the rights of Landlord, other tenants or any other person entitled to use the Common Areas.
Use of the Software licensed hereunder may require third party software or hardware (including but limited to databases, operating systems and servers). Unless specifically licensed in the Master Agreement, this Agreement does not contain a license to use such additional materials.