Protection Xxx 0000 Sample Clauses

Protection Xxx 0000. If you would like a copy of the information held on you please write to xxxxxxx@xxxxxxxxxxxxxxx.xxx or contact at 000-000-0000. If you believe that any information we are holding on you is incorrect or incomplete, please write to or email us as soon as possible, at the above address. We will promptly correct any information found to be incorrect. Rights and Restrictions License to use service. Following payment for Content, you will have non-exclusive right, for the period of time selected and purchased to make copies, view, use, and display the Content viewable or accessible on your device. All rights which are not expressly granted to you in the Terms are reserved by PELICAN.
AutoNDA by SimpleDocs

Related to Protection Xxx 0000

  • Agreement Xxx 0000 Part 3 Provisions relating to Balmoral South Iron Ore Project and certain other matters Division 2 Main provisions s. 26 Subdivision 3 — Interaction between provisions of Subdivisions 1 and 2

  • Xxxxxxx Xxxxxxx/Market Abuse Laws You acknowledge that, depending on your country or broker’s country, or the country in which Common Stock is listed, you may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect your ability to accept, acquire, sell or attempt to sell, or otherwise dispose of the shares of Common Stock, rights to shares of Common Stock (e.g., RSUs) or rights linked to the value of Common Stock, during such times as you are considered to have “inside information” regarding the Company (as defined by the laws or regulations in applicable jurisdictions, including the United States and your country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders you placed before possessing inside information. Furthermore, you may be prohibited from (i) disclosing insider information to any third party, including fellow employees and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. You acknowledge that it is your responsibility to comply with any applicable restrictions, and you should speak to your personal advisor on this matter.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • xxx/Xxxxxx/XXXXX- 19_School_Manual_FINAL pdf -page 101-102 We will continue to use the guidelines reflected in the COVID-19 school manual.

  • Xxx 0000 This Lease does not create any rights in favour of third parties under the Contract (Third Party Rights) (Scotland) Xxx 0000 to enforce or otherwise invoke any provision of this Lease. Energy Performance61 The Tenant must not obtain or commission an EPC in respect of the Premises unless required to do so by the Energy Performance of Buildings (Scotland) Regulations 2008. If the Tenant is required to obtain an EPC, the Tenant must (at the Landlord's option) obtain an EPC from an assessor approved by the Landlord or pay the Landlord's costs of obtaining an EPC for the Premises. The Tenant must not obtain or commission an Action Plan in respect of the Premises. The Tenant must cooperate with the Landlord, so far as is necessary, to allow the Landlord to obtain any EPC or Action Plan for the Premises or the Estate and: provide the Landlord (at the Landlord's cost) with copies of any plans or other information held by the Tenant that would assist in obtaining that EPC or Action Plan; and allow such access to the Premises to any energy assessor appointed by the Landlord as is necessary to inspect the Premises for the purposes of preparing any EPC or Action Plan. The Tenant must give the Landlord written details on request of the unique reference number of any EPC the Tenant obtains or commissions in respect of the Premises. The Landlord must give the Tenant written details on request of the unique reference number of any EPC the Landlord obtains or commissions in respect of the Premises or the Estate. [Sustainability The Landlord and Tenant must comply with the provisions of Error: Reference source not found of the Schedule.]62 [Break Clause] [The Tenant may terminate this Lease on [any] [the] Break Date by giving the Landlord formal notice of not less than [Insert length] months [specifying the Break Date]63 following which the Term will end on that Break Date[ if:64 on the Break Date the Rent due up to and including that Break Date and any VAT payable on it has been paid in full; [and] on the Break Date the whole of the Premises are given back to the Landlord[ free of the Tenant's occupation and the occupation of any other lawful occupier and without any continuing sub-leases]65[; and the Tenant has, on or before the Break Date, paid to the Landlord an amount equal to [Insert figure/proportion of the Rent] (plus any VAT payable on that amount)]]. The Landlord may waive any of the pre-conditions in [Clauses 7.1.1 to 7.1.3] at any time before the [relevant] Break Date by notifying the Tenant. [If the Tenant gives formal notice to the Landlord under Clause 7.1, the Tenant must on or before the Break Date make the payment to the Landlord as detailed in Clause 7.1.3.] [The break right in this Clause 7. is personal to the Tenant (here meaning [ ] Limited (Registered Number [ ])) and will end on the effective date of any permitted assignation of this Lease or on the date when the said [ ] Limited ceases to exist.] If this Lease ends under this Clause 7., this will not affect the rights of any party for any prior breach of an obligation in this Lease.66 Time is of the essence for the purposes of this Clause 7..]

  • Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position:

  • Legal Protection 7.14.1 The University shall provide legal representation to any Member of the Bargaining Unit who is named a defendant in a civil action based on performance of the Member’s duties within the scope of employment. Legal representation will be at the Member’s request, subject to the approval of the Ohio Attorney General and in accordance with Ohio law. Pursuant to Ohio Revised Code Section 9.87 the University shall seek indemnification from the state for liability or judgment of any Member of the Bargaining Unit resulting from the performance of his or her duties for the University. Nothing in this Section is intended to expand or conflict with current Ohio law.

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Transparency and Freedom of Information 15.1 The Contractor acknowledges that the Authority is subject to the requirements of FOISA and the Environmental Information Regulations. The Contractor shall:

  • Xxxxxx and X Xxx, “A unified monotonic approach to generalized linear fractional programming,” Journal of Global Optimization, vol. 26, no. 3, pp. 229–259, 2003. [14] X. X. Xxxx, X. X. Xxxxx, and X. Xxxxx, “Xxxxx: Achieving global optimality for a non-convex wireless power control problem,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1553–1563, Mar 2009. [15] X. Xxxxxxxx and X. Xxxxxxx, “Common randomness in information theory and cryptography - part I: Secret sharing,” IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121–1132, Jul. 1993. [16] I. Safaka, X. X. Xxxxxxxxxx, X. Xxxxxxx, E. Atsan, C. Fragouli, X. Xxxxxxxx, and X. Xxxxxxx, “Exchanging Secrets without Using Cryptography,” arXiv:1105.4991 [cs, math], May 2011, arXiv: 1105.4991. [Online]. Available: xxxx://xxxxx.xxx/abs/1105.4991 [17] I. Safaka, C. Fragouli, X. Xxxxxxxx, and X. Xxxxxxx, “Exchanging pairwise secrets efficiently,” in 2013 Proceedings IEEE INFOCOM, Apr. 2013, pp. 2265–2273.‌ [18] E. Atsan, I. Safaka, X. Xxxxxx, and X. Xxxxxxxx, “Low cost security for sensor networks,” in 2013 International Symposium on Network Coding (NetCod), Jun. 2013, pp. 1–6. [19] X. Xxxxxxxx, X. Xxxxxxx, X. Xxxxxx, X. Xxxxxxxx, X. Xxxxxxxxx, and X. Xxxxxxxxxxx, “Creating Secrets out of Erasures,” in Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, ser. MobiCom ’13. New York, NY, USA: ACM, 2013, pp. 429–440. [Online]. Available: xxxx://xxx.xxx.xxx/10.1145/2500423.2500440 [20] X. X. Xxxx and X. Xxxxxxxxxxxx, Convex Optimization. Cambridge University Press, Mar. 2004. [21] X. X. Xxxxxxxxx, X. Xxxxx, and X. X. Xxxxxxxx, Convex Analysis and Optimization. Athena Scientific, 2003. [22] X. Xxxx, X. X. Xxxxxxxxxxx, X. Xxxxxxxx, and X. X. Xxxxxxx, “Secret communication over broadcast erasure channels with state-feedbac,” IEEE Transactions on Information Theory, vol. 61, pp. 4788–4808, Sep. 2015. [23] X. X. XxxXxxxxxxx, The Theory of Error-Correcting Codes, 2nd ed. Amsterdam; New York; New York: North Holland Publishing Co., 1978. [24] C. Fragouli and X. Xxxxxxxx, Network Coding Fundamentals. Hanover, MA: Now Publishers Inc, Jun. 2007.

Time is Money Join Law Insider Premium to draft better contracts faster.