Party Wall Sample Clauses

Party Wall. The central common wall dividing the Medical Center from the Facility, the center of said wall being a portion of the common boundary dividing the Land from the CMC Land, is hereby established as a party wall. Neither the Lessor nor the Lessee shall use such party wall in any manner that will interfere with the equal use of the other half of the party wall. The Lessee shall maintain, repair and replace such party wall in accordance with the provisions of Section 8.1.1.
AutoNDA by SimpleDocs
Party Wall. The parties agree that one or more of the walls of the Premises may be party walls which may be used, as to the portion adjacent to the Premises, by an adjoining tenant, or by the Landlord, and as to any repairs to such party walls as may be required pursuant to the provisions of section 9.1 or pursuant to any other provision of this Lease, the Tenant shall bear one-half of the cost of such repairs, unless such repairs are necessitated wholly by reason of the negligence of the Tenant, in which event the Tenant shall be responsible for the entire costs of such repairs, but if such repairs are made necessary by reason of the gross negligence of the Landlord, or of adjoining tenants, then the costs of such repairs shall not be borne by the Tenant.
Party Wall. If at any time during or as a result of demolition or construction of the Project Improvements, Mortgage Borrowers shall damage the portion of that certain party wall shared by Lot 59 of the Property and the adjacent Lot 60, Borrowers shall cause Mortgage Borrowers to promptly, at their sole cost and expense, repair and restore such damage.
Party Wall. The central common wall shall be of masonry construction, and noted on the plan of subdivision as a party wall, in order to create cross-easements for support upon registration of the plan under Section 88BB of the Conveyancing Act, 1919.
Party Wall. The Owners of the Residential Units which have a Party Wall in their Residential Units shall not use any portion of the Party Wall so as to interfere with the use and enjoyment of the other Owner. Neither Owner shall erect any fence or any structure (including but not limited to spikes or wires) or put or place any plants (whether portable or not) on top of the Party Wall. Neither Owner shall put structures of any kind (including but not limited to fish ponds) so near to the wall as to cause leakage of water to the other side of the Party Wall or likely to cause the Party Wall to collapse. If the Party Wall or any portion thereof, except the interior surface of the one side, is damaged or injured from any cause, other than the act of negligence of either party, it shall be repaired or rebuilt at their joint cost and expense.
Party Wall. Any portion of a wall or roof of the duplex building placed on the dividing line between the parties’ respective properties shall constitute a party wall ad the general rules of law regarding party walls and of liability for property damage due to negligent or willful acts or omissions shall apply thereto. Both parties shall be responsible for continued maintenance of the party wall in a manner that meets fire code requirements and continues the extension of such wall from the basement floor to the top of the roof.
Party Wall. In the event any restoration is required pursuant to this Section 20, Landlord and Tenant shall each be responsible for one-half of the cost of restoring any common wall between the Building and the remainder of the Shopping Center.
AutoNDA by SimpleDocs
Party Wall 

Related to Party Wall

  • Links to Third Party Sites/Third Party Services xxx.xxxxxxxxxxxxxxxxxx.xxx may contain links to other websites ("Linked Sites"). The Linked Sites are not under the control of Company and Company is not responsible for the contents of any Linked Site, including without limitation any link contained in a Linked Site, or any changes or updates to a Linked Site. Company is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by Company of the site or any association with its operators. Certain services made available via xxx.xxxxxxxxxxxxxxxxxx.xxx are delivered by third party sites and organizations. By using any product, service or functionality originating from the xxx.xxxxxxxxxxxxxxxxxx.xxx domain, you hereby acknowledge and consent that Company may share such information and data with any third party with whom Company has a contractual relationship to provide the requested product, service or functionality on behalf of xxx.xxxxxxxxxxxxxxxxxx.xxx users and customers.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Links to Third Party Sites The Bank website may contain links to other websites ("Linked Sites"). Such links are provided solely as a convenience for you. While the Bank will attempt to select and provide links to Linked Sites that it believes may be of interest to its customers, the Bank does not screen, approve, review or otherwise endorse any content or information contained in any Linked Sites. You acknowledge and agree that the Bank, its affiliates and partners are not responsible for the contents of any Linked Sites, including the accuracy or availability of information provided by Linked Sites, and make no representations or warranties regarding the Linked Sites or your use of them.

  • Third Party Sites The Platform may provide links to third-party web sites. Third parties and third party web sites may have different privacy policies, terms and conditions and business practices than we do. Your dealings or communications with any party other than the Company are solely between you and that third party. Reference on the Site to any product, process, publication or service of any third party by trade name, domain name, trademark, trade identity, service xxxx, logo, and manufacturer or otherwise does not constitute or imply its endorsement or recommendation by the Company.

  • Bilateral Safeguard Measures 1. Where, as a result of the reduction or elimination of a customs duty under this Agreement, any product originating in a Party is being imported into the territory of another Party in such increased quantities, in absolute terms or relative to domestic production, and under such conditions as to constitute a substantial cause of serious injury or threat thereof to the domestic industry of like or directly competitive products in the territory of the importing Party, the importing Party may take bilateral safeguard measures to the minimum extent necessary to remedy or prevent the injury, subject to the provisions of paragraphs 2 to 10.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.

  • HIV/AIDS Model Workplace Guidelines Grantee will:

Time is Money Join Law Insider Premium to draft better contracts faster.