Integrity of XXXX ATLANTIC Network Sample Clauses

Integrity of XXXX ATLANTIC Network. The Parties acknowledge that BA, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate Covad's ability to provide service using certain technologies. Notwithstanding any other provision of this Agreement, BA shall have the right to deploy, upgrade, migrate and maintain its network at its discretion pursuant to Section 29.15 of this Agreement.
AutoNDA by SimpleDocs
Integrity of XXXX ATLANTIC Network. The Parties acknowledge that XXXX ATLANTIC, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate GNAPS’s ability to provide service using certain technologies. Notwithstanding any other provision of this Agreement, XXXX ATLANTIC shall have the right to deploy, upgrade, migrate and maintain its network at its discretion.
Integrity of XXXX ATLANTIC Network. The Parties acknowledge that XXXX ATLANTIC, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate Covad’s ability to provide service using certain technologies. Notwithstanding any other provision of this Agreement, XXXX ATLANTIC shall have the right to deploy, upgrade, migrate and maintain its network at its discretion pursuant to Section 29.15 of this Agreement.
Integrity of XXXX ATLANTIC Network. The Parties acknowledge that XXXX ATLANTIC, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate MGC's ability to provide service using certain technologies. Notwithstanding any other provision of this Agreement, XXXX ATLANTIC shall have the right to deploy, upgrade, migrate and maintain its network at its discretion.

Related to Integrity of XXXX ATLANTIC Network

  • Xxxxxxx Xxxxxxx/Market Abuse Laws You acknowledge that, depending on your country or broker’s country, or the country in which Common Stock is listed, you may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect your ability to accept, acquire, sell or attempt to sell, or otherwise dispose of the shares of Common Stock, rights to shares of Common Stock (e.g., RSUs) or rights linked to the value of Common Stock, during such times as you are considered to have “inside information” regarding the Company (as defined by the laws or regulations in applicable jurisdictions, including the United States and your country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders you placed before possessing inside information. Furthermore, you may be prohibited from (i) disclosing insider information to any third party, including fellow employees and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. You acknowledge that it is your responsibility to comply with any applicable restrictions, and you should speak to your personal advisor on this matter.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Xxxxxxx Xxxxxxx Restrictions/Market Abuse Laws The Participant acknowledges that, depending on his or her country, the broker’s country, or the country in which the Shares are listed, the Participant may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect his or her ability to accept, acquire, sell, or attempt to sell or otherwise dispose of Shares or rights to Shares (e.g., Special Retention Awards) or rights linked to the value of Shares, during such times as the Participant is considered to have “inside information” regarding the Company (as defined by applicable laws or regulations in the applicable jurisdictions, including the United States and the Participant’s country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders the Participant placed before possessing inside information. Furthermore, the Participant may be prohibited from (i) disclosing the inside information to any third party, including fellow employees (other than on a “need to know” basis) and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. The Participant acknowledges that it is his or her responsibility to comply with any applicable restrictions, and the Participant should consult his or her personal advisor on this matter.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Xxxxxxxx-Xxxxx Compliance As soon as it is legally required to do so, the Company shall take all actions necessary to obtain and thereafter maintain material compliance with each applicable provision of the Xxxxxxxx-Xxxxx Act of 2002 and the rules and regulations promulgated thereunder and related or similar rules and regulations promulgated by any other governmental or self-regulatory entity or agency with jurisdiction over the Company.

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Healthcare Regulatory Matters (a) Each Company Group Member is currently in material compliance with and, since January 1, 2019, each Company Group Member has complied in all material respects, with all Applicable Healthcare Industry Laws. Since January 1, 2019, each Company Group Member has maintained and complied in all material respects with a corporate compliance program that includes the implementation of policies, procedures, and training programs, and other compliance activities designed for its employees and agents to comply with all Applicable Healthcare Industry Laws.

  • Information Systems Acquisition Development and Maintenance Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.

Time is Money Join Law Insider Premium to draft better contracts faster.