Business Associate “Business Associate” shall have the same meaning as the term “business associate” at 45 C.F.R. 160.103, and shall refer to Contractor.
Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.
Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.
Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.
Anti-Piracy In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditional Access System and Subscriber Management System as set out in ANNEXURE X attached herewith. If so instructed by Information (as defined below) by ZEEL, the IPTV Operator shall shut off or de-authorize the transmission to any unauthorized subscriber/ subscriber indulging in piracy, within ten minutes from the time it receives such instruction from ZEEL. Any communication under this Clause shall be considered as valid Information only if (i) the information is sent through e-mail in a format as mutually agreed by the parties and (ii) the information is sent by a person(s) who is designated to send such information. However, the “information” may even be provided by ZEEL representatives through other means of communications such as telephonic message, fax etc. and the said “information” shall later be confirmed by ZEEL through e-mail and the IPTV Operator shall be under obligation to act upon such information.
Confidentiality; Use of Name Portfolio Manager and the Trust acknowledge and agree that during the term of this Agreement the parties may have access to certain information that is proprietary to the Trust or Portfolio Manager, respectively (or to their affiliates and/or service providers). The parties agree that their respective officers and employees shall treat all such proprietary information as confidential and will not use or disclose information contained in, or derived from such material for any purpose other than in connection with the carrying out of their responsibilities under this Agreement and the management of the Trust’s assets, provided, however, that this shall not apply in the case of: (i) information that is publicly available; and (ii) disclosures required by law or requested by any regulatory authority that may have jurisdiction over Portfolio Manager or the Trust, as the case may be, in which case such party shall request such confidential treatment of such information as may be reasonably available. In addition, each party shall use its reasonable efforts to ensure that its agents or affiliates who may gain access to such proprietary information shall be made aware of the proprietary nature and shall likewise treat such materials as confidential. It is acknowledged and agreed that the names “Xxxxxx Xxxxxxxxx,” “Xxxxxx Xxxxxxxxx Chief Investment Officers” (which is a registered trademark of Xxxxxx Xxxxxxxxx & Co., Inc. (“HCCI”)), “HC Capital” and derivatives of each, as well as any logo that is now or shall later become associated with either name (“Marks”) are valuable property of HCCI and that the use of the Marks, or any one of them, by the Trust or its agents is subject to the license granted to the Trust by HCCI. Portfolio Manager agrees that it will not use any Xxxx without the prior written consent of the Trust. Portfolio Manager consents to use of its name, performance data, biographical data and other pertinent data, and the Parametric Marks (as defined below), by the Trust for use in marketing and sales literature, provided that any such marketing and sales literature shall not be used by the Trust without the prior written consent of Portfolio Manager, which consent shall not be unreasonably withheld. The Trust shall have full responsibility for the compliance by any such marketing and sales literature with all applicable laws, rules, and regulations, and Portfolio Manager will have no responsibility or liability therefor. The provisions of this Section 8 shall survive termination of this Agreement. It is acknowledged and agreed that the names “Parametric Portfolio Associates” and “Parametric Xxxxxxx” and any portions or derivatives thereof, as well as any logo that is now or shall later become associated with such name (“Parametric Marks”), are valuable property of Portfolio Manager and that the use of the Parametric Marks by the Trust or its agents is permitted only so long as this Agreement is in place. The provisions of this Section 8 shall survive termination of this Agreement.
ANTI-PROSELYTISM PROVISION No funds provided directly to institutions or organizations to provide services and administer programs under Title 42 United States Code (USC) Section 604a(a)(1)(A) shall be expended for sectarian worship, instruction, or proselytization, except as otherwise permitted by law.
Xxxxxxx Xxxxxxx Restrictions/Market Abuse Laws The Participant acknowledges that, depending on his or her country, the broker’s country, or the country in which the Shares are listed, the Participant may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect his or her ability to accept, acquire, sell, or attempt to sell or otherwise dispose of Shares or rights to Shares (e.g., Restricted Share Units), or rights linked to the value of Shares, during such times as he or she is considered to have “inside information” regarding the Company (as defined by applicable laws or regulations in the applicable jurisdictions, including the United States and the Participant’s country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders the Participant placed before possessing inside information. Furthermore, the Participant may be prohibited from (i) disclosing the inside information to any third party, including fellow employees (other than on a “need to know” basis) and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. The Participant acknowledges that it is his or her responsibility to comply with any applicable restrictions, and the Participant should consult his or her personal advisor on this matter.
Proprietary Information of Third Parties No third party has claimed or has reason to claim that any person employed by or affiliated with the Company has (a) violated or may be violating to any material extent any of the terms or conditions of his employment, non-competition or non-disclosure agreement with such third party, (b) disclosed or may be disclosing or utilized or may be utilizing any trade secret or proprietary information or documentation of such third party, or (c) interfered or may be interfering in the employment relationship between such third party and any of its present or former employees, or has requested information from the Company that suggests that such a claim might be contemplated. To the best of the Company’s knowledge, no person employed by or affiliated with the Company has improperly utilized or proposes to improperly utilize any trade secret or any information or documentation proprietary to any former employer, and to the best of the Company’s knowledge, no person employed by or affiliated with the Company has violated any confidential relationship which such person may have had with any third party, in connection with the development, manufacture or sale of any product or proposed product or the development or sale of any service or proposed service of the Company, and the Company has no reason to believe there will be any such employment or violation. To the best of the Company’s knowledge, none of the execution or delivery of this Agreement and the other related agreements and documents executed in connection herewith, or the carrying on of the business of the Company as officers, employees or agents by any officer, director or key employee of the Company, or the conduct or proposed conduct of the business of the Company, will materially conflict with or result in a material breach of the terms, conditions or provisions of or constitute a material default under any contract, covenant or instrument under which any such person is obligated.
Use of the Name BlackRock The Advisor has consented to the use by the Trust of the name or identifying word "BlackRock" in the name of the Trust. Such consent is conditioned upon the employment of the Advisor as the investment advisor to the Trust. The name or identifying word "BlackRock" may be used from time to time in other connections and for other purposes by the Advisor and any of its affiliates. The Advisor may require the Trust to cease using "BlackRock" in the name of the Trust if the Trust ceases to employ, for any reason, the Advisor, any successor thereto or any affiliate thereof as investment advisor of the Trust.