Other Game Sample Clauses

Other Game. Any member serving as supervision for a sporting game other than football or basketball shall receive $20.00
AutoNDA by SimpleDocs
Other Game. Any member serving as supervision for a sporting game other than football or basketball shall receive $20.00 29.3.33 Swimming Coaches 29.3.33.1 Varsity Head Coach: Range B 29.3.33.2 Assistant Coach (1 Total): Range F

Related to Other Game

  • Other Sources Indemnitee shall not be required to exercise any rights that Indemnitee may have against any other Person (for example, under an insurance policy) before Indemnitee enforces his rights under this Agreement. However, to the extent the Company actually indemnifies Indemnitee or advances him Expenses, the Company shall be subrogated to the rights of Indemnitee and shall be entitled to enforce any such rights which Indemnitee may have against third parties. Indemnitee shall assist the Company in enforcing those rights if it pays his costs and expenses of doing so. If Indemnitee is actually indemnified or advanced Expenses by any third party, then, for so long as Indemnitee is not required to disgorge the amounts so received, to that extent the Company shall be relieved of its obligation to indemnify Indemnitee or advance Indemnitee Expenses.

  • Other Users If required by Applicable Laws and Regulations or if the Parties mutually agree, such agreement not to be unreasonably withheld or delayed, to allow one or more Parties to use the Transmission Owner’s Interconnection Facilities, or any part thereof, Interconnection Customer will be entitled to compensation for the capital expenses it incurred in connection with the Interconnection Facilities based upon the pro rata use of the Interconnection Facilities by Transmission Owner, all non-Party users, and Interconnection Customer, in accordance with Applicable Laws and Regulations or upon some other mutually-agreed upon methodology. In addition, cost responsibility for ongoing costs, including operation and maintenance costs associated with the Interconnection Facilities, will be allocated between Interconnection Customer and any non-Party users based upon the pro rata use of the Interconnection Facilities by Transmission Owner, all non-Party users, and Interconnection Customer, in accordance with Applicable Laws and Regulations or upon some other mutually agreed upon methodology. If the issue of such compensation or allocation cannot be resolved through such negotiations, it shall be submitted to Dispute Resolution pursuant to Section 12 of the Tariff.

  • Third Party Products and Services Through its Product(s), Palo Alto Networks may make available to you third-party products or services (“third-party apps”) which contain features designed to interoperate with our Products. To use such features, you must either obtain access to such third-party apps from their respective providers or permit Palo Alto Networks to obtain access on your behalf. All third-party apps are optional and if you choose to utilize such third-party apps:

  • End User An “End User” is you, an individual or entity, which receives the Models from Licensee or Authorized Licensee User pursuant to this End User Agreement to use in the regular course of your affairs, but not for resale, modification, distribution or exploitation by third parties without AnyLogic’s prior written consent.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Third Party Products 1. Third Party Hardware. We will sell, deliver, and install onsite the Third Party Hardware, if you have purchased any, for the price set forth in the Investment Summary. Those amounts are payable in accordance with our Invoicing and Payment Policy.

  • enabled This information is collected by Symantec for the purpose of providing protection and of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it. − Executable files and files that contain executable content that are identified as potential malware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Software and Service’s automatic submission function. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products. The collected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. − The name given to the Device during the initial setup of such Device. If collected, the name will be used by Symantec as an account name for the Device under which You may elect to receive additional services and/or under which You may use certain features of the Software and Services. You may change such account name at any time after installation of the Software and Services and it is recommended that You do so. − Status information regarding installation and operation of the Software and Services. This information indicates to Symantec whether installation of the Software and Services was successfully completed as well as whether the Software and Services has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encountered by the Software and Services at the time of installation or error. The status information is collected by Symantec for the purpose of evaluating and improving Symantec’s product performance and installation success rate. Symantec may also use this information to optimize its web-pages. − Information contained in email messages that You send through the Software and Services to Symantec to report as spam or as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with Your permission, and will not be sent automatically. If You send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantec’s antispam technology. Symantec will not correlate or match up these files with any other personally identifiable information. − Information contained in a report that You may choose to send through the Software and Services to Symantec when the Software and Services encounters a problem. The report includes information regarding the status of both the Software and Services and Your Device at the time that the Software and Services encountered the problem. The status information about Your Device may include the system language, country locale, and the operating system version for Your Device, as well as the processes running, their status and performance information, and data from files or folders that were open at the time the Software and Services encountered the problem. The information could contain personally identifiable information if such information is included in, or is a part of the name of the files or folders open at the time the Software and Services encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantec’s product performance. This information will not be correlated or matched up with any personally identifiable information. − The Internet Protocol (IP) address and/or Media Access Control (MAC) address and the Machine ID of the Device on which the Software and Services is installed to enable the Software and Services to function and for license administration purposes. − Other general, statistical information used for product analysis, and for improving product functionality. Unless it is expressly defined as optional, the collected information as set out above is necessary for the purpose of the functionality of Symantec’s products. Information may be transferred to the Symantec group in the United States or other countries that may have less protective data protection laws than the region in which You are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection. Subject to applicable laws, Symantec reserves the right to cooperate with any legal process and any law enforcement or other government inquiry related to Your use of this Software and Services. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software and Services, You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze such information for these purposes.

  • Other Products and Services As our customer, you have access to a suite of financial products and services availed by ourselves, our affiliates and strategic partners designed to help you address and achieve your financial needs and goals. You agree that you can obtain information about such Products and Services via our website xxx.xxxxxxxx.xxx.xx and you further agree that we can from time to time communicate information in relation to such Products or Services to you specifically or generally to all cardmembers via such communication mode as we consider appropriate.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

  • Users Licensee is responsible for each User’s compliance with this XXXX. Licensee will ensure that all use of the Software by Users is in accordance with the terms of this XXXX.

Time is Money Join Law Insider Premium to draft better contracts faster.