Compatible Use Sample Clauses

Compatible Use. Operator agrees not to make use of Facility and property in any way which will endanger human health or the environment, create a nuisance or otherwise be incompatible with the use of the Facility as it is intended and according to the terms and conditions of the Use Permit.
AutoNDA by SimpleDocs
Compatible Use. Operator agrees not to make use of Complex and property in any way which will endanger human health or the environment, create a nuisance or otherwise be incompatible with the use of the Complex as it is intended and according to the terms and conditions of this type of Complex.
Compatible Use. In any case, METC's approval shall not be unreasonably withheld. In the event installation of the Compatible Use would disrupt the ability of METC to provide electric Transmission service according to its tariffs and result in material costs to market participants for electric Transmission service, then METC may consider that factor in deciding to reasonably withhold its approval. If METC notifies the Initiating User that it has denied approval of the proposed use as being a Compatible Use: (i) METC shall together therewith specifically document the manner in which the proposed use is not a Compatible Use pursuant to the provisions of clause (iii) of the third paragraph of Section 6.1; (ii) activities in furtherance thereof shall not be undertaken by the Initiating User until METC notifies the Initiating User in writing that METC has approved such proposed use as being a Compatible Use; and (iii) METC shall promptly so approve such proposed use as being a Compatible Use upon presentation to METC of modifications of the proposed use or other appropriate measures taken or to be taken (any costs of which modifications or other measures shall be borne by the Initiating User), or other additional information or explanation, as will reasonably resolve the reasons, as so identified by METC, for which the proposed use would not be a Compatible Use or otherwise reasonably demonstrate that the proposed use will be a Compatible Use. The Initiating User shall furnish to METC such plans and specifications, surveys or other information regarding the proposed use as METC may reasonably request in order to evaluate the nature and extent of the proposed use. Wherever Consumers is not the Initiating User, METC shall, for any notices to such Initiating User pursuant to the immediately preceding paragraph, simultaneously send a copy of such notice to Consumers. METC and Initiating Users shall cooperate in good faith to accommodate Permitted Uses and Compatible Uses of Premises and Transmission Facilities to the extent reasonably feasible. If and to the extent that Transmission Facilities can be relocated or modified to accommodate proposed uses, such as to make otherwise non-Compatible Uses into Compatible Uses without materially adversely affecting the operation of such Transmission Facilities, METC shall undertake, or authorize the Initiating User to undertake, such relocation or modification provided the Initiating User is willing and agrees to pays all costs incurred in m...
Compatible Use. Tenant covenants with respect to Tenant Parties and the Premises, and Landlord covenants with respect to the Landlord Parties and the Project: (i) it will use commercially reasonable efforts to prevent the unreasonable transmission of noise or vibration to the Building resulting from the installation, operation, and maintenance of business machines and equipment in such area, (ii) it will use commercially reasonable efforts to control all occupants of such area so that the business and operations of such occupants shall not unreasonably interfere with, annoy, or disturb other occupants of the Building, and (iii) it will use commercially reasonable efforts to prevent waste on such area.

Related to Compatible Use

  • Unacceptable Use The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Year 2000 Compatibility Borrower shall take all action necessary to assure that Borrower's computer based systems are able to operate and effectively process data including dates on and after January 1, 2000. At the request of Bank, Borrower shall provide Bank assurance acceptable to Bank of Borrower's Year 2000 compatibility.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp. The origin of the angles of geometric visibility is the perimeter of the projection of the illuminating surface on a transverse plane tangent to the foremost part of the lens of the headlamp.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Functionality Customer is entitled to additional functionality previously purchased or bundled with the software if available in the version or update released on or after the start date of the Agreement. Customer acknowledges that certain functionality in current and previous software versions may not be available in future upgrades. Added functionality may require additional paid services (clinical and technical) to configure and support.

  • Visibility 12.1. Contractor shall follow any instructions given by EFI relating to visibility for the tasks and output under this Contract, including the use of specific disclaimers.

  • Vehicle Use 5.2.1 Each Lessee may use Lease Vehicles leased hereunder in connection with its car rental business, including use by such Lessee’s and its subsidiaries’ employees, directors, officers, agents, representatives and other business associates in their personal or professional capacities, subject to Sub-Clause 6.1 (

Time is Money Join Law Insider Premium to draft better contracts faster.