Challenge and use Sample Clauses

Challenge and use. The Recipient:
AutoNDA by SimpleDocs

Related to Challenge and use

  • Challenge If Executive violates or challenges the enforceability of any provisions of the Restrictive Covenants or this Release, no further payments, rights or benefits under Section 5 of the Agreement will be due to Executive (except where such provision would be prohibited by applicable law, rule or regulation).

  • License of Intellectual Property Each Party (a “Licensor”) grants the other Party (a “Licensee”) the non-exclusive, royalty-free, paid-up, worldwide, irrevocable, right, during the term of this Agreement, to use the Licensor’s Intellectual Property solely for the purposes of this Agreement and to carry out the Party’s functions consistent with its responsibilities and authority as set forth in the enable legislation and regulations. Such licenses shall not give the Licensee any ownership interest in or rights to the Intellectual Property of the Licensor. Each Licensee agrees to abide by all third-party license and confidentiality restrictions or obligations applicable to the Licensor’s Intellectual Property of which the Licensor has notified the Licensee in writing.

  • Third Party Use You may allow your agents, contractors and outsourcing service providers (each a “Permitted Third Party”) to use the Product(s) licensed to you hereunder solely for your benefit in accordance with the terms of this XXXX and you are responsible for any such Permitted Third Party’s compliance with this XXXX in such use. Any breach by any Permitted Third Party of the terms of this XXXX will be considered your breach.

  • BACKGROUND INVESTIGATION The BOARD is prohibited from knowingly employing a person who has been convicted of committing or attempting to commit certain criminal offenses. If the required criminal background investigation is not completed at the time this Contract is signed, and the subsequent investigation report reveals that there has been a prohibited conviction, this Contract shall immediately become null and void.

  • Background Investigations OSC policy requires that background investigations be conducted on Contractor Staff who will have access to OSC’s IT systems, access to OSC confidential information/data, or routine access to any OSC facility. For purposes of this policy, “routine access” is defined as access to an OSC facility for five consecutive business days or 10 business days over the annual term of the engagement. Accordingly, with the signing of this Agreement, the Contractor certifies that it has or will conduct a background investigation on Staff to whom the policy applies within the 12 months prior to the Staff commencing Services under this Agreement. The Contractor agrees to undertake a background investigation of any new/replacement Staff during the term of the Agreement. At a minimum, background investigations shall include a review/evaluation of the following: • identity verification, including Social Security Number search; • employment eligibility, including verification of U.S. citizenship or legal immigration status where appropriate; • criminal history/court records (Federal, State and local for the past five years); • work experience/history for the past five years; • pertinent skills, qualifications, and education/professional credentials; and • references. The Contractor must obtain the consent of its Staff to allow OSC, upon request: (i) to review the background investigation records, including all supporting documentation, and (ii) to conduct its own background investigation. Only Staff who have passed the background investigation, and provided such consent shall be assigned to provide Services to OSC under this Agreement. During the term of the Agreement, and in accordance with Appendix A (Section 10, Records), the Contractor must maintain records related to the background investigations performed.

  • Challenges The Experts may be challenged by either Party if circumstances exist that give rise to justifiable doubts as to any of their impartiality or independence. In such circumstances the challenge shall be brought by written notice to the ICC copied to the other Party within fourteen (14) calendar days of the appointment of the relevant Expert or within fourteen (14) calendar days of the challenging Party becoming aware of the circumstances giving rise to the challenge. Unless the challenged Expert withdraws. or whichever of the Parties that has not brought the challenge agrees to the challenge, within fourteen (14) calendar days of the challenge, the ICC shall decide the challenge and, if appropriate, shall appoint a replacement Expert in accordance with the criteria set out herein.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • Scope of Use The Fund will use the System and the Data Access Services only for the processing of securities transactions, the keeping of books of account for the Fund and accessing data for purposes of reporting and analysis. The Fund shall not, and shall cause its employees and agents not to (i) permit any unauthorized third party to use the System or the Data Access Services, (ii) sell, rent, license or otherwise use the System or the Data Access Services in the operation of a service bureau or for any purpose other than as expressly authorized under this Addendum, (iii) use the System or the Data Access Services for any fund, trust or other investment vehicle), other than as set forth herein, without the prior written consent of State Street, (iv) allow access to the System or the Data Access Services through terminals or any other computer or telecommunications facilities located outside the Designated Locations, (v) allow or cause any information (other than portfolio holdings, valuations of portfolio holdings, and other information reasonably necessary for the management or distribution of the assets of the Fund) transmitted from State Street’s databases, including data from third party sources, available through use of the System or the Data Access Services to be redistributed or retransmitted to another computer, terminal or other device for other than use for or on behalf of the Fund or (vi) modify the System in any way, including without limitation developing any software for or attaching any devices or computer programs to any equipment, system, software or database which forms a part of or is resident on the Designated Configuration.

  • Parent Right to Access and Challenge Student Data The LEA shall establish reasonable procedures pursuant to which a parent, as that term is defined in 105 ILCS 10/2(g), may inspect and/or copy Student Data and/or challenge the accuracy, relevance or propriety of Student Data, pursuant to Sections 5 and 7 of ISSRA (105 ILCS 10/5; 105 ILCS 10/7) and Section 33 of SOPPA (105 ILCS 85/33). The Provider shall respond to any request by the LEA for Student Data in the possession of the Provider when Provider cooperation is required to afford a parent an opportunity to inspect and/or copy the Student Data, no later than 5 business days from the date of the request. In the event that a parent contacts the Provider directly to inspect and/or copy Student Data, the Provider shall refer the parent to the LEA, which shall follow the necessary and proper procedures regarding the requested Student Data.

  • Conduct of the Business Each of the Company and Parent covenants and agrees that:

Time is Money Join Law Insider Premium to draft better contracts faster.