Customer Responsibilities Notwithstanding the above, Customer agrees that except as provided by this DPA, Customer is responsible for its secure use of the Services, including securing its account authentication credentials, protecting the security of Customer Data when in transit to and from the Services and taking any appropriate steps to securely encrypt or backup any Customer Data uploaded to the Services.
Contractor Responsibility for System Agency’s Termination Costs If the System Agency terminates the Contract for cause, the Contractor shall be responsible to the System Agency for all costs incurred by the System Agency and the State of Texas to replace the Contractor. These costs include, but are not limited to, the costs of procuring a substitute vendor and the cost of any claim or litigation attributable to Contractor’s failure to perform any Work in accordance with the terms of the Contract.
Customer’s Responsibilities 9.1 If and to the extent applicable or under the control of the Customer, Customer shall provide complete and accurate information regarding requirements for the Project and the Site(s), including, without limitation, constraints, space requirements, underground or hidden facilities and structures, and all applicable drawings and specifications. 9.2 Customer shall prepare, file for, and use commercially reasonable efforts to obtain all Required Approvals necessary to perform its obligations under this Agreement. 9.3 Customer shall reasonably cooperate with Company as required to facilitate Company’s performance of the Work.
Sellers Engagement of Servicer to Perform Servicing Responsibilities Section 2.01. Contract for Servicing; Possession of Servicing Files. The Seller, by execution and delivery of this Agreement, does hereby contract with the Servicer as an independent contractor, subject to the terms of this Agreement, for the servicing of the Mortgage Loans. On or before the Servicing Transfer Date the Seller shall cause the Prior Servicer to deliver to the Servicer the Servicing Files with respect to the Mortgage Loans listed on the Mortgage Loan Schedule. The Servicer shall maintain a Servicing File with respect to each Mortgage Loan in order to service such Mortgage Loans pursuant to this Agreement and each Servicing File delivered to the Servicer shall be held in trust by the Servicer for the benefit of the Trustee; provided, however, that the Servicer shall have no liability for any Servicing Files (or portions thereof) not delivered by the Seller. The Servicer’s possession of any portion of the Mortgage Loan documents shall be at the will of the Trustee for the sole purpose of facilitating servicing of the related Mortgage Loan pursuant to this Agreement, and such retention and possession by the Servicer shall be in a custodial capacity only. The ownership of each Mortgage Note, Mortgage, and the contents of the Servicing File shall be vested in the Trustee and the ownership of all records and documents with respect to the related Mortgage Loan prepared by or which come into the possession of the Servicer shall immediately vest in the Trustee and shall be retained and maintained, in trust, by the Servicer at the will of the Trustee in such custodial capacity only. The portion of each Servicing File retained by the Servicer pursuant to this Agreement shall be appropriately marked to clearly reflect the ownership of the related Mortgage Loan by the Trustee. The Servicer shall release from its custody the contents of any Servicing File retained by it only in accordance with this Agreement.
Compliance Control Services (1) Support reporting to regulatory bodies and support financial statement preparation by making the Fund's accounting records available to the Trust, the Securities and Exchange Commission (the “SEC”), and the independent accountants. (2) Maintain accounting records according to the 1940 Act and regulations provided thereunder. (3) Perform its duties hereunder in compliance with all applicable laws and regulations and provide any sub-certifications reasonably requested by the Trust in connection with any certification required of the Trust pursuant to the Xxxxxxxx-Xxxxx Act of 2002 (the “SOX Act”) or any rules or regulations promulgated by the SEC thereunder, provided the same shall not be deemed to change USBFS’s standard of care as set forth herein. (4) Cooperate with the Trust’s independent accountants and take all reasonable action in the performance of its obligations under this Agreement to ensure that the necessary information is made available to such accountants for the expression of their opinion on the Fund’s financial statements without any qualification as to the scope of their examination.
Client Responsibilities You are responsible for (a) assessing each participants’ suitability for the Training, (b) enrollment in the appropriate course(s) and (c) your participants’ attendance at scheduled courses.
Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.
Licensee Responsibilities Licensee is responsible for Licensee’s Users’ compliance with this Agreement. Licensee is responsible for all of Licensee’s uses and accounts. Licensee will be responsible for maintaining the security of Licensee’s accounts, passwords and files. Licensee and Users cannot share Licensee’s accounts or passwords or allow any third party to use Licensee’s accounts or passwords. Licensee will exercise reasonable precautions to prevent unauthorized use of the Software.
Grantee Responsibility for System Agency’s Termination Costs If the System Agency terminates the Grant Agreement for cause, the Grantee shall be responsible to the System Agency for all costs incurred by the System Agency and the State of Texas to replace the Grantee. These costs include, but are not limited to, the costs of procuring a substitute grantee and the cost of any claim or litigation attributable to Xxxxxxx’s failure to perform any work in accordance with the terms of the Grant Agreement.
User Responsibilities i. Users are required to follow good security practices in the selection and use of passwords; ii. Users shall ensure that unattended equipment is protected; and iii. Users shall adopt a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities.