Law Library Sample Clauses

Law Library. The Service Provider shall provide secure space within the secure perimeter, either a dedicated room or a multipurpose room for books and materials to provide a reading area - "Law Library" - in accordance with the 2008 PBNDS on the Access to Legal Materials. It will also provide space for recreational reading material within the Library.
AutoNDA by SimpleDocs
Law Library. SERVICE AREA INFORMATION Area to be serviced: Law Library 000 X. Xxxxxx Xx. Xxxxx Xxx,, CA 92703 Type of facility: Reception Area Staff Offices Staff Break Room Book Shelves and Reading Areas Public Restrooms Staff Restrooms Conference Room Volume of Usage: Reception Area/Heavy Staff Offices/Moderate Staff Break Room/Moderate Public Restrooms/Heavy Staff Restrooms/Moderate Conference Room/Moderately Heavy
Law Library. Company agrees to provide access to a law library.
Law Library. Section 1. All Law Library employees involved in legal research and reference work shall be given access in whatever form it is available to a copy of their final work product.
Law Library. Esquire Suites may, but is not required provide to Sublessee a law library. If Esquire Suites provides electronic research, Xxxxxxxxx agrees to pay all charges incurred by Xxxxxxxxx’s use thereof. Currently, the Suite law library is limited to California Reports, 4th and 5th, series, and California Appellate Reports, 4th and 5th series.
Law Library. Monday-Thursday,

Related to Law Library

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.

  • LICENSE TO USE WEBSITE The Company may provide You with certain information as a result of Your use of the Website or Services. Such information may include, but is not limited to, documentation, data, or information developed by the Company, and other materials which may assist in Your use of the Website or Services ("Company Materials"). Subject to this Agreement, the Company grants You a non-exclusive, limited, non-transferable and revocable license to use the Company Materials solely in connection with Your use of the Website and Services. The Company Materials may not be used for any other purpose, and this license terminates upon Your cessation of use of the Website or Services or at the termination of this Agreement.

  • Customer Materials 12.1 The Supplier including any of its employees, agents, consultants, contractors and any third party shall:

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • Return of Materials Pertaining to Work Product Upon the request of Customer, but in any event upon termination or expiration of this Contract or a Statement of Work, Vendor shall surrender to Customer all documents and things pertaining to the Work Product, including but not limited to drafts, memoranda, notes, records, drawings, manuals, computer software, reports, data, and all other documents or materials (and copies of same) generated or developed by Vendor or furnished by Customer to Vendor, including all materials embodying the Work Product, any Customer confidential information, or Intellectual Property Rights in such Work Product, regardless of whether complete or incomplete. This section is intended to apply to all Work Product as well as to all documents and things furnished to Vendor by Customer or by anyone else that pertain to the Work Product.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • License for Txdot Logo Use DocuSign Envelope ID: A2C96816-AFCF-4B6A-9B51-D8FCE6C6223E DocuSign Envelope ID: 81600B2C-53E9-4E39-BA73-002AB2A7A001

Time is Money Join Law Insider Premium to draft better contracts faster.