For Sole Hirer Sample Clauses

For Sole Hirer. 9.1.1 In the event of the death of the Hirer, the legal personal representative on producing the Grant of Probate or Letters of Administration and the original key(s) to the Box, may have access to and open the Box and remove all of the contents, and this act shall automatically terminate the Agreement.
AutoNDA by SimpleDocs

Related to For Sole Hirer

  • NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.

  • Access Rights for Affiliated Entities Affiliated Entities have Access Rights under the conditions of the Grant Agreement Articles 25.4 and 31.4., if they are identified in Attachment 4 (Identified Affiliated Entities) to this Consortium Agreement. Such Access Rights must be requested by the Affiliated Entity from the Party that holds the Background or Results. Alternatively, the Party granting the Access Rights may individually agree with the Party requesting the Access Rights to have the Access Rights include the right to sublicense to the latter's Affiliated Entities listed in Attachment 4. Access Rights to Affiliated Entities shall be granted on Fair and Reasonable conditions and upon written bilateral agreement. Affiliated Entities which obtain Access Rights in return fulfil all confidentiality and other obligations accepted by the Parties under the Grant Agreement or this Consortium Agreement as if such Affiliated Entities were Parties. Access Rights may be refused to Affiliated Entities if such granting is contrary to the legitimate interests of the Party which owns the Background or the Results. Access Rights granted to any Affiliated Entity are subject to the continuation of the Access Rights of the Party to which it is affiliated, and shall automatically terminate upon termination of the Access Rights granted to such Party. Upon cessation of the status as an Affiliated Entity, any Access Rights granted to such former Affiliated Entity shall lapse. Further arrangements with Affiliated Entities may be negotiated in separate agreements.

  • LICENSE ONLY This Agreement creates a non-exclusive license only and the Licensee acknowledges that the Licensee does not and shall not claim any interest or estate of any kind or extent whatsoever in the Building, Communications Spaces, or Equipment Room by virtue of this Agreement or the Licensee’s use of the Building, Communications Spaces or Equipment Room. The relationship between the Licensor and the Licensee shall not be deemed to be a "landlord-tenant" relationship and the Licensee shall not be entitled to avail itself of any rights afforded to tenants at law.

  • wire HDSL-Compatible Loop This is a designed Loop that meets Carrier Serving Area (CSA) specifications, may be up to 12,000 feet long and may have up to 2,500 feet of bridged tap (inclusive of Loop length). It may be a 2-wire or 4-wire circuit and will come standard with a test point, OC, and a DLR.

  • Generelt A. Apple Inc. (“Apple”) giver hermed licenstager licens til at bruge Apples software samt tredjeparters software, dokumentation, grænseflader, indhold, skrifter og evt. data, som følger med denne licens, uanset om de forefindes som ROM (Read Only Memory) eller på andet medie (under et kaldet “Apple- software”) i henhold til betingelserne i denne licensaftale. Apple og/eller Apples licensgivere bevarer ejendomsretten til selve Apple-softwaren og forbeholder sig alle de rettigheder, som ikke udtrykkeligt er givet til licenstager.

  • Enterprise License The large corporations with revenue more than $500 million and large government entities must purchase an Enterprise License. An Enterprise license is also applicable if any target customer of your product using the Software have revenue more than $500 million. Please contact us at xxxx@xxxxxxxxxx.xxx for a quote for an Enterprise License.

  • License Key 2.5. The Application Software may include an embedded security system which if provided must be used together with a license key. The license key may limit the use of the Application Software to the applicable Use Level and prevent a single User from using more than one workstation at the same time and is valid for a certain period of time following which the license key must be renewed. Customer is solely responsible for any cost or loss arising out of Customer’s failure or delay to renew the license key.

  • Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.

  • License Keys The Software, when used in production, requires a License Key to install or access it. You are responsible for the use of any License Key(s) assigned to you and must not share the License Key(s) with any third party. If your License Key is stolen, or if you suspect any improper or illegal usage of your License Key, you should promptly notify Acumatica of such occurrence. A replacement License Key will be issued to you and the compromised License Key will be disabled.

  • Licensee Licensee represents and warrants that:

Time is Money Join Law Insider Premium to draft better contracts faster.