Where the User Sample Clauses

Where the User is not the Controller*
AutoNDA by SimpleDocs

Related to Where the User

  • Vehicle Use 5.2.1 Each Lessee may use Lease Vehicles leased hereunder in connection with its car rental business, including use by such Lessee’s and its subsidiaries’ employees, directors, officers, agents, representatives and other business associates in their personal or professional capacities, subject to Sub-Clause 6.1 (

  • OFFICE USE ONLY Unit Size Requested Unit Number Targeted Move-In Date Date Received Time Received _C__o__k_a__t_o__P__a__r_k_v__i_e_w____________________________ _2__6_0___T__h_i_r_d__S__t_r_e__e_t__S__o__u_t_h__w__e__s_t_____________ _C__o__k_a__t_o_,__M___N___5_5__3_2__1_________________________ _P__h__:_(_3__2__0_)__9__0_5__-_2__8_7__4________________________ APPLICATION FOR OCCUPANCY Incomplete applications will be returned APPLICANT INFORMATION Applicant Name (Head of Household): First Middle Last Address: Street Address City State Zip Social Security Number: Date of Birth: [ ] Male [ ] Female [ ] Decline Applicant Phone #: Applicant Email: Alternate Phone #: Alternate Email: Emergency Contact: Name (Someone outside your household) Phone Email List All Other Household Members First MI Last Relationship to Head Date of Birth Male/Female/ Decline to Answer Social Security Number [ ]M [ ]F [ ]Decline [ ]M [ ]F [ ]Decline [ ]M [ ]F [ ]Decline [ ]M [ ]F [ ]Decline [ ]M [ ]F [ ]Decline [ ]M [ ]F [ ]Decline Primary Language: Do you require an interpreter? [ ] Yes [ ] No How did you hear about this housing? [ ] Online [ ] Newspaper [ ] Local Agency [ ] Drive By [ ] Resident Referral [ ] Other What is the combined gross monthly income of all household members? $ ADDITIONAL HOUSEHOLD MEMBERS CURRENT HOUSING STATUS How long have you lived at your current address? From: To: Is this family or a friend? [ ] Yes [ ] No Name of Owner/Manager: Phone #: Email: Address: Do all adult household members live at this address?........................................................................................................................ [ ] Yes [ ] No If NO, include additional adult household’s current address and contact information on a separate piece of paper. PREVIOUS HOUSING STATUS Your previous address: How long did you live at your previous address? From: To: Is this family or a friend? [ ] Yes [ ] No Name of Owner/Manager: Phone #: Email: Address: List every state in which each household member has lived: ELIGIBILITY INFORMATION The following questions pertain to yourself and every member of your household who will occupy the unit. Check either Yes or No in response to each question. All questions must be answered; for those questions that do not apply, you are required to indicate so by answering “not applicable” or “n/a”.

  • Service Use 5.1 For the avoidance of doubt, the Customer acknowledges that:

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Approved User A user approved by the relevant Data Access Committee(s) to access one or more datasets for a specified period of time and only for the purposes outlined in the Principal Investigator (PI)’s approved Research Use Statement. The Information Technology (IT) Director indicated on the Data Access Request, as well as any staff members and trainees under the direct supervision of the PI are also Approved Users and must abide by the terms laid out in the Data Use Certification Agreement.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Your Billing Rights: Keep This Document For Future Use This notice tells you about your rights and our responsibilities under the Fair Credit Billing Act.

  • Unacceptable Use The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!