Removal of Unauthorized Animal Sample Clauses

Removal of Unauthorized Animal. We may remove an unauthorized animal by (1) leaving, in a conspicuous 12. Animals. No living creatures of any kind are allowed, even tempo- rarily, anywhere in the apartment or apartment community un- less we’ve given written permission. If we allow an animal, you must sign a separate Animal Addendum and, except as set forth in the ad- Not for use photo identification or refuses to identify himself or herself as a resident, an authorized occupant, or a guest of a specific resident in the community. Anyone not listed in this Lease cannot stay in the apartment for more than days in one week without our prior written consent, and no more than twice that many days in any one month. If the previous space isn’t filled in, 2 days total per week will be the limit.
AutoNDA by SimpleDocs
Removal of Unauthorized Animal. We may remove an unauthorized animal by (1) leaving, in a conspicuous place in the apartment, a written notice of our intent to remove the animal within 24 hours; and (2) following the procedures of Par. 14. We may: keep or kennel the animal;
Removal of Unauthorized Animal. We may remove an unauthorized animal by (1) leaving, in a conspicuous Not for use isn’t filled in, 2 days total per week will be the limit.
Removal of Unauthorized Animal. We may remove an unauthorized animal by (1) leaving, in a conspicuous place in the apartment, a written notice of our intent to remove the animal within 24 hours; and (2) following the procedures of Par. 14. We may: keep or kennel the animal; turn the animal over to a humane society, local authority or rescue organization; or return the animal to you if we consent to your request to keep the animal and you have completed and signed an Animal Addendum and paid all fees. When keeping or kenneling an animal, we won’t be liable for loss, harm, sickness, or death of the animal unless due to our negligence. You must pay for the animal’s reasonable care and kenneling charges.

Related to Removal of Unauthorized Animal

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act (8 U.S.C.A. & 1101, et seq.), as amended; and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this contract, and should the Federal Government impose sanctions against the City for such use of unauthorized aliens, Consultant hereby agrees to, and shall, reimburse City for the cost of all such sanctions imposed, together with any and all costs, including attorneys' fees, incurred by the City in connection therewith.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.

  • Contact in Event of Unauthorized Transfer If you believe your Card or PIN has been lost or stolen or that someone has transferred or may transfer money from your Account without your permission, please contact us via calling or writing using the contact number(s) or addresses listed at the end of this Agreement and Disclosure.

  • Unauthorized Acts Each Party agrees to:

  • Removal of Improvements Except as otherwise expressly agreed to by Lessor and Lessee, Lessee shall have the right to remove all Tank Farm Assets and other improvements, fixtures, equipment, materials, supplies and personal property installed by Lessee from the Premises upon the termination or expiration of this Lease, but in no event later than the date that is 120 days following the expiration or termination of this Lease (the “Removal Date”) and Lessor shall provide Lessee with access to the Premises at reasonable times until expiration of the Removal Date for the purpose of removing such items. Lessee shall provide Lessor with written notice of its election to remove the Tank Farm Assets and other improvements, fixtures, equipment, materials, supplies and personal property from the Premises at least 60 days prior to the expiration of the Lease. If Lessee elects to remove the Tank Farm Assets and Improvements from the Premises after such removal Lessee shall restore any damage to the Premises and clean the Premises so as to eliminate therefrom any accumulation (other than any de minimis and non-hazardous accumulation) of foreign substances, materials, or debris, in addition to any Environmental Cleanup that may be required under Article 10. Lessee shall pay Lessor pro rata Rent (based on the amount of Rent applicable during the last month prior to the termination or expiration) through the date of Lessee’s complete removal of all such items. During the period of such removal and clean-up, all terms and conditions of this Lease, including, the indemnity and insurance provisions shall continue in full force and effect. If Lessee elects not to remove all of the Tank Farm Assets and Improvements from the Premises on or before the Removal Date, and provided that such facilities are in good working condition at the expiration of the Term (ordinary wear and tear excepted) then, such Tank Farm Assets and Improvements shall be deemed permanently abandoned to Lessor’s sole ownership, and Lessor may remove and dispose of such facilities in any manner which Lessor may deem appropriate, without any liability whatsoever to Lessee. If Lessee elects not to remove all of the Tank Farm Assets and Improvements from the Premises on or before the Removal Date and such facilities are not in good working condition at the expiration of the term (ordinary wear and tear excepted), or Lessee fails to so remove any or all of the Tank Farm Assets and Improvements from the Premises before the Removal Date, then, in addition to all rights and remedies available at law or in equity, without any prior notice, Lessor may (but shall be under no obligation), at Lessor’s option, deem such Tank Farm Assets and Improvements to be permanently abandoned to Lessor’s sole ownership, and Lessor may remove and dispose of such facilities in any manner which Lessor may deem appropriate, without any liability whatsoever to Lessee, and Lessee shall reimburse Lessor for all costs of such removal and disposal upon demand from Lessor. If requested by Lessor, Lessee shall execute any and all documents necessary to evidence that title to the Tank Farm Assets and Improvements that Lessee does not remove by the Removal Date is in Lessor and to extinguish and remove any cloud or potential cloud on the title to the Premises and/or such facilities created by Lessee.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • LIABILITY FOR UNAUTHORIZED USE-LOST/STOLEN CARD NOTIFICATION You agree to notify Credit Union immediately, orally or in writing at Florida Credit Union, X.X. Xxx 0000, Xxxxxxxxxxx, XX 00000 or telephone (000) 000-0000 twenty four

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

Time is Money Join Law Insider Premium to draft better contracts faster.