ADEQUATE WORKSPACE Sample Clauses

ADEQUATE WORKSPACE. The District shall provide each employee an adequate workspace, desk, supplies, storage and necessary equipment needed to perform their job duties.
AutoNDA by SimpleDocs

Related to ADEQUATE WORKSPACE

  • Adequate Information Such Company Stockholder is a sophisticated stockholder and has adequate information concerning the business and financial condition of Acquiror and the Company to make an informed decision regarding this Agreement and the transactions contemplated by the Merger Agreement and has independently and without reliance upon Acquiror or the Company and based on such information as such Company Stockholder has deemed appropriate, made its own analysis and decision to enter into this Agreement. Such Company Stockholder acknowledges that Acquiror and the Company have not made and do not make any representation or warranty, whether express or implied, of any kind or character except as expressly set forth in this Agreement. Such Company Stockholder acknowledges that the agreements contained herein with respect to the Subject Shares held by such Company Stockholder are irrevocable.

  • Proprietary Materials Each of the Parties shall own its own intellectual property including without limitation all trade secrets, know-how, proprietary data, documents, and written materials in any format. Any materials created exclusively by IPS for the School shall be owned by IPS, and any materials created exclusively by Operator for the School shall be Operator’s proprietary material. The Parties acknowledge and agree that neither has any intellectual property interest or claims in the other Party’s proprietary materials. Notwithstanding the foregoing, materials and work product jointly created by the Parties shall be jointly owned by the Parties and may be used by the individual Party as may be agreed upon by both Parties from time to time.

  • Proprietary Information The Software, any data base and any proprietary data, processes, information and documentation made available to the Fund (other than which are or become part of the public domain or are legally required to be made available to the public) (collectively, the “Information”), are the exclusive and confidential property of Custodian or its suppliers. The Fund shall keep the Information confidential by using the same care and discretion that the Fund uses with respect to its own confidential property and trade secrets, but not less than reasonable care. Upon termination of the Agreement or the Software license granted herein for any reason, the Fund shall return to Custodian any and all copies of the Information which are in its possession or under its control.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • CONFIDENTIAL & PROPRIETARY INFORMATION The parties may provide technical information, documentation and expertise to each other that is either (1) marked as being confidential or, (2) if delivered in oral form is summarized in writing within 10 working days and identified as being confidential (“Confidential Information”). The receiving party shall for a period of five (5) years from the date of disclosure (i) hold the disclosing party’s Confidential Information in strict confidence, and (ii), except as previously authorized in writing by the disclosing party, not publish or disclose the disclosing party’s Confidential Information to anyone other than the receiving party’s employees on a need-to-know basis, and (iii) use the disclosing party’s Confidential Information solely for performance of this Contract. The foregoing requirement shall not apply to any portion of a party’s Confidential Information which (a) becomes publicly known through no wrongful act or omission on the part of the receiving party; (b) is already known to the receiving party at the time of the disclosure without similar nondisclosure obligations; (c) is rightfully received by the receiving party from a third party without similar nondisclosure obligations; (d) is approved for release by written authorization of the disclosing party; (e) is clearly demonstrated by the receiving party to have been independently developed by the receiving party without access to the disclosing party’s Confidential Information; or (f) is required to be disclosed by order of a court or governmental body or by applicable law, provided that the party intending to make such required disclosure shall promptly notify the other party of such intended disclosure in order to allow such party to seek a protective order or other remedy.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Laboratory Services Covered Services include prescribed diagnostic clinical and anatomic pathological laboratory services and materials when authorized by a Member's PCP and HPN’s Managed Care Program.

  • Diagnostic Services Procedures ordered by a recognized Provider because of specific symptoms to diagnose a specific condition or disease. Some examples include, but are not limited to:

Time is Money Join Law Insider Premium to draft better contracts faster.