User Badges Sample Clauses

User Badges. If UiPath issues a Badge to you, we grant you a non-exclusive, non-transferable, non-sublicensable, revocable, valid for the duration of your certification, worldwide, royalty-free license to use, incorporate and display the Badge (and the UiPath names, trademarks or logos included in the Badge) on your websites and social media profiles to certify your achievements, in accordance with the UiPath Trademark & Copyright Policy and any acceptable use guidelines communicated by UiPath to you. You agree to comply such guidelines and to promptly cease any use of the Badge issued by UiPath to you if you fail to remedy any non-compliance notified to you by UiPath. You understand that your failure to comply with this section may trigger the revocation of your certification.
AutoNDA by SimpleDocs

Related to User Badges

  • Badges (A) Correctional officers and correctional probation officers shall be issued badges according to the following specifications: (1) Badges issued to correctional officers below the rank of lieutenant shall be silver metal, black lettering and pre-numbered. These badges shall be worn on the officers’ uniforms in a manner consistent with department policy and procedures. (2) Badges issued to correctional officers at the rank of lieutenant and above shall be gold metal, black lettering and pre-numbered. These badges shall be worn on the officers’ uniforms in a manner consistent with department policy and procedures. (3) Badges issued to correctional probation officers shall be police size. These badges shall be carried in badge holders and in accordance with department procedure. (B) Correctional officers are only authorized to wear issued badges with the correctional officer class “A” or “B” uniform, and only while performing official duties, or while in uniform and traveling to or returning from their official duty station. (C) The use of an issued badge as a credential for personal purposes is prohibited. (D) Issued badges are considered state property and, except for retirement under specific conditions or death in the line of duty, are to be returned upon an employee’s termination of employment with the department or removal from a position in the Security Services Unit. Only badges, which are issued by the department, shall be used to conduct officially designated duties. Employees shall be responsible for reimbursing the department for any issued badge which is lost. (E) Correctional officers and correctional probation officers who retire from the department under honorable conditions from the Florida Retirement System upon reaching the appropriate retirement age of 55 or 25 years of continuous service, including retirement under medical disability, shall be authorized to retain their issued badge. (F) The badge of a correctional officer or a correctional probation officer who is killed in the line of duty shall be presented to the employee’s next of kin. (G) Upon request, correctional officers and correctional probation officers who are promoted or transferred to other positions may retain their badge if they are in good standing with the department and pay the cost of the badge.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Escorting Visitors Visitors to areas where PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY is 5 contained shall be escorted and such PHI shall be kept out of sight while visitors are in the area.

  • User Content 13.1 The Site permits the submission and posting of questions and answers in connection with Evaluation Processes and may also permit the submission and posting of other text and/or other content submitted by you and other users (all of the foregoing, collectively, “User Submissions”), and the hosting, sharing, and/or publishing of such User Submissions. You understand that whether or not such User Submissions are published, the Company does not guarantee any confidentiality with respect to any User Submissions. You acknowledge that you shall not be due any remuneration in connection with your User Submissions from the Company or from any other User. 13.2 You shall be solely responsible for your own User Submissions and the consequences of posting or publishing them. In connection with your User Submissions, you affirm, represent, and/or warrant that: (i) your submission of User Submissions and the publication and use thereof by the Company does not violate the copyrights, trade secrets rights or other intellectual property rights of any third party, nor shall it constitute or result in a breach of any duty or obligation of confidentiality owed by you to any third party, and (ii) you have the written consent, release, and/or permission of each and every identifiable individual person in the User Submission to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Submissions in the manner contemplated by the Company and this Agreement. 13.3 By submitting User Submissions to the Site, you hereby grant to the Company a perpetual, irrevocable, worldwide, royalty-free, transferable, sublicensable right and license to use, reproduce, modify, distribute and exploit such User Submission in any manner and in any form of media, whether currently or hereafter existing. You represent and warrant that you have all necessary right, title and interest in and to each such User Submission to validly grant such license to the Company. 13.4 In connection with User Submissions and any other transmission of messages or material facilitated by the Site, you further agree that you will not: (i) submit or transmit material that is not authorized by the copyright owner, protected by trade secret or otherwise subject to third party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from their rightful owner to post the material and grant the rights granted to the Company in Section 13.3 above; (ii) publish or transmit falsehoods or misrepresentations that could damage the Company or any third party; (iii) submit or transmit material that is unlawful, defamatory, libelous, threatening, pornographic, harassing, hateful, racially or ethnically offensive or encourages conduct that would be considered a criminal offense, give rise to civil liability, violate any law or is otherwise inappropriate; (iv) post or transmit advertisements or solicitations of business; or (v) impersonate another person. If notified by a user or a content owner of a User Submission that allegedly does not conform to this Agreement, the Company may investigate the allegation and determine in good faith and in its sole discretion whether to remove the User Submission, which it reserves the right to do at any time. Additionally, the Company may, at any time, remove any User Submission that in the sole judgment of the Company violates this Agreement. 13.5 User Submissions may be provided by (without limitation) Users who are members of a Start-Up management team, contacts referred by Start-Ups (including without limitation customers, scientific advisors, background references, suppliers and distributors), external experts referred by the Company. The insights, recommendations, views and other content reflected in a User Submission should be taken as opinion rather than statements of facts. Investors should conduct their own diligence before making an investment. Nothing contained in a User Submission constitutes tax, legal, insurance or investment advice, or the recommendation of or an offer to sell, or the solicitation of an offer to buy or invest in, any investment product, vehicle, service or instrument. Such an offer or solicitation may only be made by delivery to a prospective investor of formal offering materials, including subscription or account documents or form, which should be reviewed carefully by any such investor before making the decision to invest in any particular company issuer listed, reviewed or discussed on the Propel(x) platform. To the maximum extent permitted under applicable law, you hereby release Propel(x) (and our officers, directors, agents, investors, subsidiaries, and employees) and each other User from any and all claims, demands, liabilities, losses or damages (whether direct, indirect, consequential, incidental or otherwise) of every kind and nature, known and unknown, suspected or unsuspected, arising out of or in any way related to User Submissions (including your reliance thereon). You acknowledge that, in connection with the foregoing release, you hereby irrevocably waive all rights granted to you under Section 1542 of the California Civil Code or any analogous applicable state or federal law or regulation. Said Section 1542 of the Civil Code of the State of California reads as follows:

  • Keys Keys with tags attached indicating number and/or description of door or room each key is intended to fit attached to each key shall be delivered to the Owner. Contractor shall prepare and furnish with the keys an itemized key schedule in quintuplicate listing the door or room number and/or description, serial number of key, and number of keys being delivered for each door or lock.

  • Cards 2.1 The Card is a prepaid payment card which may be used to pay for goods and services at participating retailers that accept prepaid Visa cards. The physical card may be used in shops and retail locations where the Cardholder is physically present or for online and other distance purchases. Your Card cannot be used to make cash withdrawals from ATMs and banks. Like any Card, We cannot guarantee that a particular retailer will accept the Card – Cardholders should check with the retailer before attempting the transaction if unsure. The Cardholder will not be able to use the Card to make any purchases from some retailers; such retailers have been blocked by Our systems in order to prevent the potential use of cards for unauthorised or unlawful activity. 2.2 The Card is an electronic money (“e-money”) product, regulated by the Financial Services Commission (“FSC”), Gibraltar. It is a prepaid card not a credit card and is not linked to Your bank account. You must ensure that You have sufficient Available Funds in the Master Wallet for the Cardholder to pay for each purchase or payment using the Card. The Card is intended for use as a means of payment, and funds loaded onto the Card do not constitute a deposit. You will not earn interest on the balance of the Card. The Card will expire on the Expiry Date and will cease to work. Please check clause 8 of this Agreement for further information. 2.3 The electronic money associated with the Card is issued by IDTFS to You. 2.4 When the Cardholder receives the Card, it will be issued in an inactive state. The Cardholder will need to activate it by logging onto Our Website, in Your personal login area (“Online Account Centre”) and then following the login and activation request for the Card prior to use. The Card will normally be ready for use one hour after activation. If the Cardholder does not activate the Card, any transactions that the Cardholder attempts to carry out may be declined.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!