Excessive Unauthorized Attachments Sample Clauses

Excessive Unauthorized Attachments. If COA determines that Licensee has made more than fifty (50) Unauthorized Attachments cumulatively during any Contract Year, Licensee shall be considered to be in material breach of this Agreement and COA will have the right to terminate this Agreement and require removal of Licensee’s Attachments in accordance with Article 6 of this Agreement.
AutoNDA by SimpleDocs
Excessive Unauthorized Attachments. If SMEU determines that Licensee has made more than fifty (50) Unauthorized Attachments cumulatively during any Agreement Year, Licensee shall be considered to be in material breach of this Agreement and SMEU will have the right to terminate this Agreement and require removal of Licensee’s Attachments in accordance with Article 12 of this Agreement.
Excessive Unauthorized Attachments. If AE determines that Licensee has made more than fifty (50) Unauthorized Attachments of cable cumulatively during any Contract Year, or five (5) Unauthorized Attachments of Network Nodes, Licensee shall be considered to be in material breach of this Agreement and AE will have the right to terminate this Agreement and require removal of Licensee’s Attachments in accordance with Article 6 of this Agreement.

Related to Excessive Unauthorized Attachments

  • Requested                           Attachments Vendor Agreement 210205 Vendor Agreement JOC.pdf The vendor must download the Vendor Agreement from the attachment tab, fill in the requested information and upload the completed agreement. DO NOT UPLOAD encrypted or password protected files. Agreement Signature Form 210205 Agreement Signature Form.pdf If you have not taken exception or deviation to the agreement language in the solicitation attributes, download the AGREEMENT SIGNATURE FORM from the "ATTACHMENTS" tab. This PDF document is a fillable form. Download the document to your computer, fill in the requested company information, print the file, SIGN the form, SCAN the completed and signed AGREEMENT SIGNATURE FORM, and upload here. If you have taken exception to any of the agreement language and noted the exception in the deviations section of the attributes for the agreement, complete the AGREEMENT SIGNATURE FORM, but DO NOT SIGN until those deviations have been negotiated and resolved with TIPS management. Upload the unsigned form here, because this is a required document. OPTIONAL - JOC Pricing of Itemized List of RS Means Non-Prepriced Items No response The Vendor may download the optional Pricing of Itemized List of RS Means Non-Prepriced Items form from the attachment tab, fill in the requested information, and upload the completed spreadsheet. DO NOT UPLOAD encrypted or password protected files. Reference Form Reference_Form.xls Valid Reference Email addresses are REQUIRED on the spreadsheet. The vendor must download the References spreadsheet from the attachment tab, fill in the requested information and upload the completed spreadsheet. DO NOT UPLOAD encrypted or password protected files.

  • Alterations and Attachments Student and Parent may not make any alterations in or add attachments, hardware, or software to the mobile device computer absent express permission from M-DCPS, which permission is at the sole option of M-DCPS.

  • CERTIFICATION OF NO ASBESTOS CONTAINING MATERIALS OR WORK 8.1 The Contractor shall be responsible for ensuring that no asbestos containing materials or work is included within the scope of the Work. The Contractor shall take whatever measures it deems necessary to insure that all employees, suppliers, fabricators, material men, subcontractors, or their assigns, comply with this requirement.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Review of legality and data minimisation (a) The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e).

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Use of Attachment Facilities by Third Parties Purpose of Attachment Facilities.‌‌ Except as may be required by Applicable Laws and Regulations, or as otherwise agreed to among the Parties, the Attachment Facilities shall be constructed for the sole purpose of interconnecting the Large Generating Facility to the New York State Transmission System and shall be used for no other purpose.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Overstandard Tenant Use If Tenant uses water, electricity, heat or air conditioning in excess of that supplied by Landlord pursuant to Section 6.1 of this Lease, Tenant shall pay to Landlord, upon billing, the cost of such excess utility consumption, the cost of the installation, operation, and maintenance of equipment which is required to be installed in order to supply such excess consumption; and, to the extent no previously installed, Landlord may install devices to separately sub-meter any increased use and in such event Tenant shall pay the increased cost directly to Landlord, on demand, at the rates charged by the public utility company furnishing the same, including the cost of such additional metering (or sub-metering) devices. Tenant’s use of electricity shall never exceed the capacity of the feeders to the Property or the risers or wiring installation; provided, however, Tenant shall have the right, subject to the terms of Article 8, to increase such capacity. Notwithstanding anything to the contrary in this Lease, Tenant may operate the HVAC within the Premises at its discretion; provided, however, if Tenant desires to use heat, ventilation or air conditioning during hours other than those for which Landlord is obligated to supply such utilities pursuant to the terms of Section 6.1 of this Lease, Tenant shall reimburse Landlord for the actual cost of supplying chilled water and gas to the Premises during non-Building Hours at the actual rates charged by the utilities, which cost shall be equitably prorated among all Building occupants (other than the Bank) operating HVAC during the same non-Building Hours. For purposes of an example, Exhibit K, attached hereto, sets forth the calculation of such actual utilities costs, with the actual calculation being subject to the actual rates charged by the utilities. Landlord shall, at its sole cost, as part of the Core and Shell Work, provide a cloud-based software system (Workspeed) to allow Tenant to control Tenant’s after-hours HVAC.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

Time is Money Join Law Insider Premium to draft better contracts faster.