Visual Identity; No Reasonable Likelihood of Confusion Sample Clauses

Visual Identity; No Reasonable Likelihood of Confusion. (a) If either Party or any of its Subsidiaries either conducts new activities or enters into a market or jurisdiction (the “Entering Party”) where the other Party or any of its Subsidiaries is already commercially active (the “Existing Party”), the Entering Party agrees (i) to evaluate the likelihood of customer confusion or brand dilution posed by such proposed Trademarks, Visual Identity in such market or jurisdiction and (ii) to take all necessary steps to distinguish itself and its branding from the Existing Party and to ensure that it is not confusingly similar with branding of the Existing Party in the view of the Existing Party’s customers. (b) Each Party acknowledges and agrees that the existing activities of the businesses of ING U.S. and Group or its Subsidiaries do not create any consumer confusion and each Party can continue to operate their respective businesses as such businesses were operated prior to Closing, provided that, each Party implements appropriate source or business identifiers and/or disclaimers on its products, advertisements or other materials to make clear to a third party which Party is providing a particular product or service. (c) The Parties acknowledge and agree that ING U.S.’s Visual Identity as shared in writing with Xxxxxxx Xxxxxxxxx (Group), Xxxxx Xxxxxxxxxx (ING Verzekeringen) and Xxx Xxxxxx (ING U.S.) on or about November 1, 2012 and Xxxxx Xxx on February 14, 2013 is not confusingly similar to Group’s Visual Identity. (d) Notwithstanding the above, nothing in this Section 2.4 shall limit the right of Group or its Subsidiaries (other than ING U.S. and its Subsidiaries) to use the color orange, the name “ING”, the “ING Lion” logo, or other elements of its worldwide corporate Visual Identity in any jurisdiction, at any time.
AutoNDA by SimpleDocs
Visual Identity; No Reasonable Likelihood of Confusion. (a) If any Party or any of its Subsidiaries either conducts new activities or enters into a market or jurisdiction (the “Entering Party”) where another Party or any of its Subsidiaries is already commercially active (the “Existing Party”), the Entering Party agrees (i) to evaluate the likelihood of customer confusion or brand dilution posed by such proposed Servicemarks on the Existing Party’s Visual Identity in such market or jurisdiction and (ii) to take all necessary steps to distinguish itself and its branding from the Existing Party and to ensure that its branding is not confusingly similar with branding of the Existing Party in the sole reasonable discretion of the Existing Party. (b) Each Party acknowledges and agrees that the existing activities of the businesses of Pubco or its Subsidiaries and the Licensors or their Subsidiaries do not create any consumer confusion and each Party and its respective Subsidiaries can continue to operate their respective businesses as such businesses were operated prior to Closing, provided that, each Party and its respective Subsidiaries implements appropriate source or business identifiers and/or disclaimers on its products, advertisements or other materials to make clear to a third party which Party or Subsidiary is providing a particular product or service. For the avoidance of doubt, each Party and its respective Subsidiaries shall have five (5) Business Days after Closing to implement all such changes on electronic products, advertisements and other materials, and shall have sixty (60) days after Closing to implement all such changes on printed products, advertisements and other materials. (c) Notwithstanding the above, (i) nothing in this Section 2.2 shall limit the right of each Licensor or its Subsidiaries to use such Licensor’s Servicemarks, or other elements of its worldwide corporate Visual Identity, in any jurisdiction, at any time and (ii) this Section 2.2 shall not apply to new Funds launched by any Licensor or its Subsidiaries except in such cases where such Licensors have previously consented to the use by Pubco, its Subsidiaries or Affiliates in connection with a Fund.
Visual Identity; No Reasonable Likelihood of Confusion. (a) Each Party acknowledges and agrees that (i) all goodwill arising from the use of the Licensed Trademarks by Holdings, and its Subsidiaries and permitted sublicensees, inures solely to AXA Group, and (ii) the existing activities of the businesses of Holdings and its Subsidiaries and of AXA Group and the AXA Group Affiliates do not create any consumer confusion and each Party can continue to operate their respective businesses as such businesses were operated prior to the Effective Date, provided that, Holdings and its Subsidiaries implement appropriate source or business identifiers and/or disclaimers on its products, advertisements or other materials, including any websites located at the Licensed Domain Names, to make clear to a third party which Party is providing a particular product or service. (b) Nothing in this Section 2.2 shall limit the right of AXA Group or any AXA Group Affiliates to use the Licensed Trademarks, the color blue, the name “AXA,” the “AXA” logo, or other elements of its worldwide corporate Visual Identity in any jurisdiction, at any time.

Related to Visual Identity; No Reasonable Likelihood of Confusion

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • Reasonable Suspicion Testing All Employees Performing Safety-Sensitive Functions A. Reasonable suspicion testing for alcohol or controlled substances may be directed by the Employer for any employee performing safety-sensitive functions when there is reason to suspect that alcohol or controlled substance use may be adversely affecting the employee’s job performance or that the employee may present a danger to the physical safety of the employee or another. B. Specific objective grounds must be stated in writing that support the reasonable suspicion. Examples of specific objective grounds include but are not limited to: 1. Physical symptoms consistent with alcohol and/or controlled substance use; 2. Evidence or observation of alcohol or controlled substance use, possession, sale, or delivery; or 3. The occurrence of an accident(s) where a trained manager, supervisor or lead worker suspects alcohol or other controlled substance use may have been a factor.

  • Presentation of Potential Target Businesses The Company shall cause each of the Initial Shareholders to agree that, in order to minimize potential conflicts of interest which may arise from multiple affiliations, the Initial Shareholders will present to the Company for its consideration, prior to presentation to any other person or company, any suitable opportunity to acquire an operating business, until the earlier of the consummation by the Company of a Business Combination or the liquidation of the Company, subject to any pre-existing fiduciary obligations the Initial Shareholders might have.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code. (b) Unless and until the Bank receives such written notice of disclosure, the Account Holder shall be fully liable and be bound by all transactions effected by the use of such TBS, with or without his consent or knowledge.

  • Convicted, Discriminatory, Antitrust Violator, and Suspended Vendor Lists In accordance with sections 287.133, 287.134, and 287.137, F.S., the Contractor is hereby informed of the provisions of sections 287.133(2)(a), 287.134(2)(a), and 287.137(2)(a), F.S. For purposes of this Contract, a person or affiliate who is on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List may not perform work as a contractor, supplier, subcontractor, or consultant under the Contract. The Contractor must notify the Department if it or any of its suppliers, subcontractors, or consultants have been placed on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List during the term of the Contract. In accordance with section 287.1351, F.S., a vendor placed on the Suspended Vendor List may not enter into or renew a contract to provide any goods or services to an agency after its placement on the Suspended Vendor List. A firm or individual placed on the Suspended Vendor List pursuant to section 287.1351, F.S., the Convicted Vendor List pursuant to section 287.133, F.S., the Antitrust Violator Vendor List pursuant to section 287.137, F.S., or the Discriminatory Vendor List pursuant to section 287.134, F.S., is immediately disqualified from Contract eligibility.

  • Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? No

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 0-000-000-0000 or submit Form 14039. For more information, see Pub. 5027, Identity Theft Information for Taxpayers. Victims of identity theft who are experiencing economic harm or a systemic problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 0-000-000-0000 or TTY/TDD 0-000-000-0000. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 0-000-000-0000. You can forward suspicious emails to the Federal Trade Commission at xxxx@xxx.xxx or report them at xxx.xxx.xxx/xxxxxxxxx. You can contact the FTC at xxx.xxx.xxx/xxxxxxx or 877-IDTHEFT (877-438-4338). If you have been the victim of identity theft, see xxx.XxxxxxxxXxxxx.xxx and Pub. 5027. Visit xxx.xxx.xxx/XxxxxxxxXxxxx to learn more about identity theft and how to reduce your risk.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Destruction of Confidential Information Upon the written request of the disclosing Party, the receiving Party shall cease using and arrange for the destruction of all copies of any Confidential Information then in the receiving Party’s possession or under such Party’s control. The receiving Party agrees to dispose of the Confidential Information in such a manner that the information cannot be read or reconstructed after destruction. Upon the written request of the disclosing Party, the receiving Party shall certify in writing that it has complied with the obligations set forth in this paragraph.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!