Use Restrictions on Use End User Responsibilities Sample Clauses

Use Restrictions on Use End User Responsibilities 
AutoNDA by SimpleDocs

Related to Use Restrictions on Use End User Responsibilities

  • General Restrictions on Use Advisor agrees to hold all Proprietary Information in confidence and not to, directly or indirectly, disclose, use, copy, publish, summarize, or remove from Company's premises any Proprietary Information (or remove from the premises any other property of Company), except (i) during the consulting relationship to the extent authorized and necessary to carry out Advisor's responsibilities under this Agreement, and (ii) after termination of the consulting relationship, only as specifically authorized in writing by Company. Notwithstanding the foregoing, such restrictions shall not apply to: (x) information which Advisor can show was rightfully in Advisor's possession at the time of disclosure by Company; (y) information which Advisor can show was received from a third party who lawfully developed the information independently of Company or obtained such information from Company under conditions which did not require that it be held in confidence; or (z) information which, at the time of disclosure, is generally available to the public.

  • Restrictions on Use Tenant shall use the Premises and Landlord’s Equipment in a careful, safe and proper manner, shall not commit or suffer any waste on or about Landlord’s Property or with respect to Landlord’s Equipment, and shall not make any use of Landlord’s Property and/or Landlord’s Equipment which is prohibited by or contrary to any laws, rules, regulations, orders or requirements of public authorities, or which would cause a public or private nuisance. Tenant shall comply with and obey all laws, rules, regulations, orders and requirements of public authorities which in any way affect the use or operation of Landlord’s Equipment and the use, operation or occupancy of Landlord’s Property. Tenant, at its own expense, shall obtain any and all permits, approvals and licenses necessary for use of the Landlord’s Equipment and the Premises (copies of which shall be provided to the Landlord), provided that Landlord shall be responsible for obtaining a certificate of occupancy for the Building generally (i.e., as opposed to a certificate of occupancy for the Premises after the performance of any work by Tenant, which shall be Tenant’s responsibility) and any other permits, approvals and licenses necessary generally for the use of Landlord’s Equipment and Landlord’s Property. Tenant shall not overload the floors or other structural parts of the Building; and shall not commit or suffer any act or thing on Landlord’s Property which is illegal, unreasonably offensive, unreasonably dangerous, or which unreasonably disturbs other tenants. Tenant shall not knowingly do or permit to be done any act or thing on Landlord’s Property or with Landlord’s Equipment which will invalidate or be in conflict with any insurance policies, or which will increase the rate of any insurance, covering the Building. If, because of Tenant’s failure to comply with the provisions of this Section or due to any use of the Premises or activity of Tenant in or about Landlord’s Property, the Insurance Costs are increased, Tenant shall pay Landlord the amount of such increase caused by the failure of Tenant to comply with the provisions of this Section or by the nature of Tenant’s use of the Premises. Tenant shall cause any fire lanes in the front, sides and rear of the Building to be kept free of all parking associated with its business or occupancy and in compliance with all applicable regulations. Tenant shall conduct its business at all times so as not to annoy or be offensive to other tenants and occupants in Landlord’s Property. Tenant shall not permit the emission of any objectionable noise or odor from the Premises and shall at its own cost install such extra sound proofing or noise control systems and odor control systems, as may be needed to eliminate unreasonable noise, vibrations and odors, if any, emanating from the Premises being heard, felt or smelled outside the Premises. Tenant shall not place any file cabinets bookcases, partitions, shelves or other furnishings or equipment in a location which abuts or blocks any windows.

  • User Responsibilities i. Users are required to follow good security practices in the selection and use of passwords; ii. Users shall ensure that unattended equipment is protected; and iii. Users shall adopt a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities.

  • Customer Responsibilities Notwithstanding the above, Customer agrees that except as provided by this DPA, Customer is responsible for its secure use of the Services, including securing its account authentication credentials, protecting the security of Customer Data when in transit to and from the Services and taking any appropriate steps to securely encrypt or backup any Customer Data uploaded to the Services.

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

  • Customer Responsibility You agree that you are responsible for all access to and use of the Service through your account or password(s) and for any fees incurred for the Service, or for software or other merchandise purchased through the Service, or any other expenses incurred in accordance with the terms of this Agreement. You agree that you are responsible for backing up (a) any data you submit, receive or transfer over the Service, including, without limitation, your email; and (b) any data, files, programs, or applications on any device you connect to the Service. You acknowledge that you are aware that content accessible on or through the Service may contain material that is unsuitable for minors (persons under 18 years of age). You agree to supervise usage of your account by minors. You ratify and confirm any obligations incurred by a minor using your account.

  • Limitations on Use No part of the moneys delivered to the Recipient pursuant to Section II hereof is being or will be used to refinance, retire, redeem, or otherwise pay debt service on all or any part of any part of any governmental obligations regardless of whether the interest on such obligations is or was excluded from gross income for federal income tax purposes unless prior approval by the Director is given.

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Limitations on Services (a) The Parties recognize that certain responsibilities and obligations are imposed by federal and state securities laws and by the applicable rules and regulations of stock exchanges, the National Association of Securities Dealers, Inc., in-house "due diligence" or "compliance" departments of Licensed Securities Firms, etc.; accordingly, the Employee agrees that he will not: (1) Release any financial or other material information or data about XStream without the prior written consent and approval of XStream's General Counsel or Securities Counsel; (2) Conduct any meetings with financial analysts without informing XStream's General Counsel and board of directors in advance of the proposed meeting and the format or agenda of such meeting. (b) In any circumstances where the Employee is describing the securities of XStream to a third party, the Employee shall disclose to such person any compensation received from XStream to the extent required under any applicable laws, including, without limitation, Section 17(b) of the Securities Act of 1933, as amended. (c) In rendering his services, the Employee shall not disclose to any third party any confidential non-public information furnished by XStream or otherwise obtained by it with respect to XStream, except on a need to know basis, and in such case, subject to appropriate assurances that such information shall not be used, directly or indirectly, in any manner that would violate state or federal prohibitions on insider trading of XStream's securities. (d) The Employee shall not xxxx xxx xxxxxx which would in any way adversely affect the reputation, standing or prospects of XStream or which would cause XStream to be in violation of applicable laws. ARTICLE THREE ------------- COMPENSATION ------------

  • Owner Responsibilities The project owner or the engineer or architect of record acting as the owner’s agent shall fund special inspection services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!