Use of the Priority Services Sample Clauses

Use of the Priority Services 
AutoNDA by SimpleDocs

Related to Use of the Priority Services

  • Use of the Site You understand that, except for information, products or services clearly identified as being supplied by Penderbrook Golf Club, Penderbrook Golf Club does not operate, control or endorse any information, products or services on the Internet in any way. Except for Penderbrook Golf Club- identified information, products or services, all information, products and services offered through the Site or on the Internet generally are offered by third parties, that are not affiliated with Penderbrook Golf Club a. You also understand that Penderbrook Golf Club cannot and does not guarantee or warrant that files available for downloading through the Site will be free of infection or viruses, worms, Trojan horses or other code that manifest contaminating or destructive properties. You are responsible for implementing sufficient procedures and checkpoints to satisfy your particular requirements for accuracy of data input and output, and for maintaining a means external to the Site for the reconstruction of any lost data. YOU ASSUME TOTAL RESPONSIBILITY AND RISK FOR YOUR USE OF THE SITE AND THE INTERNET. Penderbrook Golf Club PROVIDES THE SITE AND RELATED INFORMATION “AS IS” AND DOES NOT MAKE ANY EXPRESS OR IMPLIED WARRANTIES, REPRESENTATIONS OR ENDORSEMENTS WHATSOEVER (INCLUDING WITHOUT LIMITATION WARRANTIES OF TITLE OR NONINFRINGEMENT, OR THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE) WITH REGARD TO THE SERVICE, ANY MERCHANDISE INFORMATION OR SERVICE PROVIDED THROUGH THE SERVICE OR ON THE INTERNET GENERALLY, AND Penderbrook Golf Club SHALL NOT BE LIABLE FOR ANY COST OR DAMAGE ARISING EITHER DIRECTLY OR INDIRECTLY FROM ANY SUCH TRANSACTION. IT IS SOLELY YOUR RESPONSIBILITY TO EVALUATE THE ACCURACY, COMPLETENESS AND USEFULNESS OF ALL OPINIONS, ADVICE, SERVICES, MERCHANDISE AND OTHER INFORMATION PROVIDED THROUGH THE SERVICE OR ON THE INTERNET GENERALLY. Penderbrook Golf Club DOES NOT WARRANT THAT THE SERVICE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT DEFECTS IN THE SERVICE WILL BE CORRECTED. YOU UNDERSTAND FURTHER THAT THE PURE NATURE OF THE INTERNET CONTAINS UNEDITED MATERIALS SOME OF WHICH ARE SEXUALLY EXPLICIT OR MAY BE OFFENSIVE TO YOU. YOUR ACCESS TO SUCH MATERIALS IS AT YOUR RISK. Penderbrook Golf Club HAS NO CONTROL OVER AND ACCEPTS NO RESPONSIBILITY WHATSOEVER FOR SUCH MATERIALS. LIMITATION OF LIABILITY IN NO EVENT WILL Penderbrook Golf Club BE LIABLE FOR (I) ANY INCIDENTAL, CONSEQUENTIAL, OR INDIRECT DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION, LOSS OF PROGRAMS OR INFORMATION, AND THE LIKE) ARISING OUT OF THE USE OF OR INABILITY TO USE THE SERVICE, OR ANY INFORMATION, OR TRANSACTIONS PROVIDED ON THE SERVICE, OR DOWNLOADED FROM THE SERVICE, OR ANY DELAY OF SUCH INFORMATION OR SERVICE. EVEN IF Penderbrook Golf Club OR ITS AUTHORIZED REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR (II) ANY CLAIM ATTRIBUTABLE TO ERRORS, OMISSIONS, OR OTHER INACCURACIES IN THE SERVICE AND/OR MATERIALS OR INFORMATION DOWNLOADED THROUGH THE SERVICE. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IN SUCH STATES, Penderbrook Golf Club LIABILITY IS LIMITED TO THE GREATEST EXTENT PERMITTED BY LAW. Penderbrook Golf Club makes no representations whatsoever about any other web site which you may access through this one or which may link to this Site. When you access a non-Penderbrook Golf Club web site, please understand that it is independent from Penderbrook Golf Club, and that Penderbrook Golf Club has no control over the content on that web site. In addition, a link to a Penderbrook Golf Club web site does not mean that Penderbrook Golf Club endorses or accepts any responsibility for the content, or the use, of such web site.

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • THIRD-PARTY CONTENT, SERVICES AND WEBSITES 10.1 The Services may enable You to link to, transfer Your Content or Third Party Content to, or otherwise access, third parties’ websites, platforms, content, products, services, and information (“Third Party Services”). Oracle does not control and is not responsible for Third Party Services. You are solely responsible for complying with the terms of access and use of Third Party Services, and if Oracle accesses or uses any Third Party Services on Your behalf to facilitate performance of the Services, You are solely responsible for ensuring that such access and use, including through passwords, credentials or tokens issued or otherwise made available to You, is authorized by the terms of access and use for such services. If You transfer or cause the transfer of Your Content or Third Party Content from the Services to a Third Party Service or other location, that transfer constitutes a distribution by You and not by Oracle. 10.2 Any Third Party Content we make accessible is provided on an “as-is” and “as available” basis without any warranty of any kind. You acknowledge and agree that we are not responsible for, and have no obligation to control, monitor, or correct, Third Party Content. We disclaim all liabilities arising from or related to Third Party Content. 10.3 You acknowledge that: (i) the nature, type, quality and availability of Third Party Content may change at any time during the Services Period, and (ii) features of the Services that interoperate with Third Party Services such as Facebook™, YouTube™ and Twitter™, etc., depend on the continuing availability of such third parties’ respective application programming interfaces (APIs). We may need to update, change or modify the Services under this Agreement as a result of a change in, or unavailability of, such Third Party Content, Third Party Services or APIs. If any third party ceases to make its Third Party Content or APIs available on reasonable terms for the Services, as determined by us in our sole discretion, we may cease providing access to the affected Third Party Content or Third Party Services without any liability to You. Any changes to Third Party Content, Third Party Services or APIs, including their unavailability, during the Services Period does not affect Your obligations under this Agreement or the applicable order, and You will not be entitled to any refund, credit or other compensation due to any such changes.

  • Preservation, Maintenance, and Protection of the Property Inspections. Borrower will not destroy, damage, or impair the Property, allow the Property to deteriorate, or commit waste on the Property. Whether or not Borrower is residing in the Property, Borrower must maintain the Property in order to prevent the Property from deteriorating or decreasing in value due to its condition. Unless Lender determines pursuant to Section 5 that repair or restoration is not economically feasible, Borrower will promptly repair the Property if damaged to avoid further deterioration or damage. If insurance or condemnation proceeds are paid to Lender in connection with damage to, or the taking of, the Property, Borrower will be responsible for repairing or restoring the Property only if Xxxxxx has released proceeds for such purposes. Lender may disburse proceeds for the repairs and restoration in a single payment or in a series of progress payments as the work is completed, depending on the size of the repair or restoration, the terms of the repair agreement, and whether Borrower is in Default on the Loan. Lender may make such disbursements directly to Borrower, to the person repairing or restoring the Property, or payable jointly to both. If the insurance or condemnation proceeds are not sufficient to repair or restore the Property, Borrower remains obligated to complete such repair or restoration. Lender may make reasonable entries upon and inspections of the Property. If Lender has reasonable cause, Xxxxxx may inspect the interior of the improvements on the Property. Lender will give Borrower notice at the time of or prior to such an interior inspection specifying such reasonable cause.

  • Procurement of the Site (i) The Authority Representative, the Contractor and Authority’s Engineer shall, within 10 (ten) days of the date of this Agreement, inspect the Site and prepare a detailed memorandum containing an inventory of the Site including the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site (hereinafter referred to as the “Handover Memorandum”). Subject to the provisions of Clause 8.2 (iii), the Handover Memorandum shall have appended thereto an appendix (the “Appendix”) specifying in reasonable detail those parts of the Site to which vacant access and Right of Way has not been given to the Contractor along with details of hindrances in the Construction Zone. For sake of clarity the Handover Memorandum shall clearly specify the parts of Site where work can be executed. Signing of the Handover Memorandum, in three counterparts (each of which shall constitute an original), by the authorized representatives of the Authority, Contractor and Authority’s Engineer shall be deemed to constitute a valid evidence of giving the Right of Way to the Contractor for discharging its obligations under and in accordance with the provisions of this Agreement and for no other purpose whatsoever. (ii) Whenever the Authority is ready to hand over any part or parts of the Site included in the Appendix, it shall inform the Contractor, by notice, of the proposed date and time such of hand over. The Authority Representative and the Contractor shall, on the date so notified, inspect the specified parts of the Site, and prepare a memorandum containing an inventory of the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site so handed over. The signing of the memorandum, in three (3) counterparts (each of which shall constitute an original), by the authorised representatives of the Parties shall be deemed to constitute a valid evidence of giving the relevant Right of Way to the Contractor. If the contractor fails to join for site inspection or disputes the parts of the site available for work, the Authority’s Engineer shall decide the parts of the site where work can be executed and notify to both the parties within 3 days of the proposed date of inspection. The parties agree that such notification of the Authority’s Engineer as mentioned hereinabove shall be final and binding on the parties. (iii) The Authority shall provide the Right of Way to the Contractor in respect of all land included in the Appendix by the date specified in Schedule-A for those parts of the Site referred to therein, and in the event of delay for any reason other than Force Majeure or breach of this Agreement by the Contractor, it shall pay to the Contractor, Damages in a sum calculated in accordance with Clause 8.3. The Contractor agrees that it shall not be entitled to claim any other damages on account of any such delay by the Authority. (iv) Notwithstanding anything to the contrary contained in this Clause 8.2, the Authority shall specify the parts of the Site, if any, for which Right of Way shall be provided to the Contractor on the dates specified in Schedule-A. Such parts shall also be included in the Appendix prepared in pursuance of Clause 8.2 (i). (v) The Authority further acknowledges and agrees that prior to the Appointed Date, it shall have procured issuance of the statutory notification under Applicable Laws for vesting of all the land comprising the Project in the Authority and has taken possession of area for Construction Zone for at least 90% (ninety per cent) of the total length of the Project Highway. The Parties also acknowledge and agree that the conditions specified in this Clause 8.2 (iii) shall not be modified or waived by either Party. (vi) For the avoidance of doubt, the Parties expressly agree that the Appendix shall in no event contain sections of the Project Highway the cumulative length of which exceeds 10% (ten percent) of the total length of the Project Highway. (vii) Pursuant to signing of Handover Memorandum under clause 8.2 (i), Contractor shall submit to the Authority’s Engineer, a monthly land possession report till expiry of 180 (one hundred and eighty) days from Appointed Date, in respect of those parts of the site to which vacant access and right of way was not given to the contractor and included in Appendix to the memorandum signed under clause 8.2 (i), duly specifying the part of the site, if any, for which the right of way is yet to be handed over.

  • Modification of the Small Generating Facility The Interconnection Customer must receive written authorization from the NYISO and Connecting Transmission Owner before making any change to the Small Generating Facility that may have a material impact on the safety or reliability of the New York State Transmission System or the Distribution System. Such authorization shall not be unreasonably withheld. Modifications shall be done in accordance with Good Utility Practice. If the Interconnection Customer makes such modification without the prior written authorization of the NYISO and Connecting Transmission Owner, the Connecting Transmission Owner shall have the right to temporarily disconnect the Small Generating Facility. If disconnected, the Small Generating Facility will not be reconnected until the unauthorized modifications are authorized or removed.

  • Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.

  • Information and Services Required of the Owner The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

  • Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!