Sustainability 49.1 The Contractor shall perform its obligations under the Call-off Contract in a manner so as to:
Sustainable Development 4.1 The Authority will review the Contractor’s Sustainable Development Policy Statement and Sustainable Development Plan submitted by the Contractor in accordance with the Schedule (Sustainable Development Requirements) and then at least annually thereafter.
Vehicle Use 5.2.1 Each Lessee may use Lease Vehicles leased hereunder in connection with its car rental business, including use by such Lessee’s and its subsidiaries’ employees, directors, officers, agents, representatives and other business associates in their personal or professional capacities, subject to Sub-Clause 6.1 (
Master Use The Licensor hereby grants to Licensee a non-exclusive license (this "License) to record vocal synchronization to the Composition partly or in its entirety and substantially in its original form ("Master Recording")
Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp. The origin of the angles of geometric visibility is the perimeter of the projection of the illuminating surface on a transverse plane tangent to the foremost part of the lens of the headlamp.
No Outside Advertising No outside advertisement for any vacancy shall be placed until the applications of present union members have been fully processed.
Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.
Unacceptable Use The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.
Improper Use Evidence substantiating the use of sick leave for willful injury, gross negligence, intemperance, trivial indispositions, instances of misrepresentation, or violation of the rules defined herein will result in denial of sick leave with pay and shall be construed as grounds for disciplinary action including termination.
Proper Use The performance of Covered Hardware when operated in corrosive environments, or in conditions, or in a manner, outside of the Specifications including Seller’s site requirements found in the Documentation or not in accordance with its Documentation may have their performance adversely affected, and are therefore not guaranteed hereunder. The Purchaser agrees to use the Covered Hardware in a safe and reasonable manner pursuant to the Documentation and the Original Terms.