Workspace Use Sample Clauses

Workspace Use. Professional educators may change the arrangement of the room, including removing or adding equipment and/or desks, so long as distancing requirements continue to be met and meeting all other safety requirements. (i.e. not upholstered furniture or any other surfaces that cannot be sanitized per standards.)
AutoNDA by SimpleDocs
Workspace Use 

Related to Workspace Use

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Exclusive Use (A) After the Occupancy Date, Lessee expressly agrees and warrants that the Leased Premises will be used exclusively as a Champps Restaurant or other casual dining sit-down restaurant. In any other such case, after obtaining Lessor's prior written consent, such consent not to be unreasonably withheld or delayed, Lessee may conduct any lawful business from the Leased Premises. Lessee acknowledges and agrees that any other use without the prior written consent of Lessor will constitute a default under and a violation and breach of this Lease. Lessee agrees: To open for business within a reasonable period of time after completion of construction of the contemplated Improvements; to operate all of the Leased Premises during the Term or Renewal Terms during regular and customary hours for businesses similar to the permitted exclusive use stated herein, unless prevented from doing so by causes beyond Lessee's control or due to remodeling; and to conduct its business in a professional and reputable manner.

  • Vehicle Use 5.2.1 Each Lessee may use Lease Vehicles leased hereunder in connection with its car rental business, including use by such Lessee’s and its subsidiaries’ employees, directors, officers, agents, representatives and other business associates in their personal or professional capacities, subject to Sub-Clause 6.1 (

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.