Limited IA/S Access Sample Clauses

Limited IA/S Access. Seller’s access to AGILENT’s IA/S is limited to those specific IA/S, time periods and personnel authorized by AGILENT, and is subject to AGILENT information protection policies. Any other access is expressly prohibited. Seller warrants that it shall comply with these obligations and that access granted hereunder shall not impair the integrity and availability of AGILENT’s IA/S. AGILENT may audit Seller to verify compliance. Seller warrants that each employee, agent or subcontractor who performs work pursuant to this Order has been informed of the obligations contained herein and has agreed to be bound by them.
AutoNDA by SimpleDocs
Limited IA/S Access. Seller’s access to AGILENT’s IA/S is limited to those specific IA/S, time periods and personnel authorized by AGILENT, and is subject to AGILENT information protection policies. Any other access is
Limited IA/S Access. Seller’s access to ASTEK’s IA/S is limited to those specific IA/S, time periods and personnel authorized by ASTEK, and is subject to ASTEK information protection policies. Any other access is expressly prohibited. Seller warrants that it shall comply with these obligations and that access granted hereunder shall not impair the integrity and availability of ASTEK’s IA/S. ASTEK may audit Seller to verify compliance. Seller warrants that each employee, agent or subcontractor who performs work pursuant to this Order has been informed of the obligations contained herein and has agreed to be bound by them.
Limited IA/S Access. Seller’s access to AGILENT’s IA/S is limited to those specific IA/S, time periods and personnel authorized by AGILENT, and is subject to AGILENT information protection policies. Any other access is expressly prohibited. Seller warrants that it shall comply with these obligations and that access granted hereunder shall not impair the integrity and availability of AGILENT’s IA/S. AGILENT may audit Seller to verify compliance. Seller warrants

Related to Limited IA/S Access

  • Limited Access If necessary for the fulfillment of the Agreement, NBU may provide the Professional with non-exclusive, limited access to NBU’s information technology infrastructure. The Professional understands and agrees to abide by NBU policies, standards, regulations and restrictions regarding access and usage of NBU’s information technology infrastructure. The Professional shall reasonably enforce such policies, standards, regulations and restrictions with all the Professional’s employees, agents or any tier of subcontractor granted access in the performance of this Agreement, and shall be granted and authorize only such access as may be necessary for the purpose of fulfilling the requirements of the Agreement. The Professional’s employees, agents and subcontractors must receive prior, written approval from NBU before being granted access to NBU’s information technology infrastructure and data and NBU, in its sole determination, shall determine accessibility and limitations thereto. The Professional agrees that the requirements of this Section shall be incorporated into all subcontractor agreements entered into by the Professional. It is further agreed that a violation of this Section shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Agreement without notice.

  • Master Feeder Structure If permitted by the 1940 Act, the Board of Trustees, by vote of a majority of the Trustees, and without a Shareholder vote, may cause the Trust or any one or more Series to convert to a master feeder structure (a structure in which a feeder fund invests all of its assets in a master fund, rather than making investments in securities directly) and thereby cause existing Series of the Trust to either become feeders in a master fund, or to become master funds in which other funds are feeders.

  • Limited Consent (a) Notwithstanding any provision of the Credit Agreement and any other Loan Document to the contrary (including Sections 6.6, 6.11 and 6.14 of the Credit Agreement), the Requisite Lenders and the Administrative Agent hereby consent to the Borrower Securities Repurchase so long as: (i) at the time of any repurchase of Securities and after giving effect thereto, no Default or Event of Default has occurred and is continuing; (ii) all Securities purchased pursuant to the Borrower Securities Repurchase are acquired on or before June 30, 2016; and (iii) the aggregate amount of Securities purchased pursuant to the Borrower Securities Repurchase does not exceed the lesser of (A) $50,000,000 and (B) 1,250,000 common shares of the Borrower.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Certification Regarding Prohibition of Boycotting Israel (Tex Gov. Code 2271) If (a) Vendor is not a sole proprietorship; (b) Vendor has ten (10) or more full-time employees; and (c) this Agreement or any agreement with a TIPS Member under this procurement has value of $100,000 or more, the following certification shall apply; otherwise, this certification is not required. Vendor certifies, where applicable, that neither the Vendor, nor any affiliate, subsidiary, or parent company of Vendor, if any, boycotts Israel, and Vendor agrees that Vendor and Vendor Companies will not boycott Israel during the term of this Agreement. For purposes of this Agreement, the term “boycott” shall mean and include refusing to deal with, terminating business activities with, or otherwise taking any action that is intended to penalize, inflict economic harm on, or limit commercial relations with Israel, or with a person or entity doing business in Israel or in an Israeli-controlled territory but does not include an action made for ordinary business purposes. When applicable, does Vendor certify? Yes

  • Amendment of Limited Liability Company Agreement (a) Except as otherwise provided in this Section 8.1, this Agreement may be amended, in whole or in part, with: (i) the approval of the Board (including the vote of a majority of the Independent Directors, if required by the 0000 Xxx) without the Members approval; and (ii) if required by the 1940 Act, the approval of the Members by such vote as is required by the 0000 Xxx.

  • THE ACADEMY 2.1 The Company will establish and maintain, and carry on or provide for the carrying on of the Academy in accordance with the Master Agreement and this Agreement.

  • Formation of Limited Liability Company The Company was formed on January 13, 2017, pursuant to the Delaware Limited Liability Company Act, 6 Del. C. § 18-101, et seq., as amended from time to time (the “Delaware Act”), by the filing of a Certificate of Formation of the Company with the office of the Secretary of the State of Delaware. The rights and obligations of the Member and the administration of the Company shall be governed by this Agreement and the Delaware Act. To the extent this Agreement is inconsistent in any respect with the Delaware Act, this Agreement shall control.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

Time is Money Join Law Insider Premium to draft better contracts faster.