Use of ICT Sample Clauses

Use of ICT. Yes CHAPTER 10: Electronic commerce Mobility of business people : Yes CHAPTER 9; Article 2 Freedom of transit : No Transport and logistics : No Trade finance : No OTHER AREAS Government Procurement : Yes specifically excluded in services (Article1, Chapter 8) and Investment (Article1, Chapter 11) Investment : Yes CHAPTER 11 Competition Policy : Yes CHAPTER 14 Intellectual Property : Yes Chapter 13 Dispute Settlement : Yes CHAPTER 17 Labor Mobility : No Labor and Environmental Standards : No Technical cooperation : Yes CHAPTER 12 Institutional mechanism : Yes CHAPTER 2; Article 11 Notes : RULES OF ORIGIN Cumulation CHAPTER 3; Article 6: Partial Specific Process CHAPTER 3; Annex 2 Heading Change De Minimis CHAPTER 3; Article 8: Except HS 50-63: 10% of FOB/ HS 50-63: 10% of FOB, or 10% of the total weight Minimum Content Drawback Not mentioned HTTP Link xxxx://xxx.xxxxx.xxx.xxxx.xx/chapter-3-rules-of-origin/ Notes :
AutoNDA by SimpleDocs
Use of ICT. 2.1. While at College or a College-related activity, you must not have involvement with any material or activity which might put yourself at risk. The use of social networking sites, including but not limited to Facebook are therefore prohibited. As well, you must not at any time use ICT to upset, harass, or harm anyone else in the College community, or the College itself, even if it is meant as a ‘joke’. Unacceptable use could include acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the College may need to respond to also include the use of websites to facilitate misconduct which puts at risk the safety of the College environment.
Use of ICT. 2.1. While at College or a College‐related activity, you must not have involvement with any material or activity which might put yourself at risk. The use of social networking sites, including but not limited to MySpace and Facebook is therefore prohibited. As well, you must not at any time use ICT to upset, harass, or harm anyone else in the College community, or the College itself, even if it is meant as a ‘joke’. Unacceptable use could include acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the College may need to respond to also include the use of websites to facilitate misconduct which puts at risk the safety of the College environment. If any privately‐owned ICT equipment/device, such as a, notebook, netbook or desktop, PDA, mobile phone, camera, or recording device, portable storage (like a USB or flash memory device), is brought to College or a College‐related activity, the College cybersafety rules apply to that device. If you are not sure whether it is appropriate to have a particular device at College or at a College‐related activity, you are expected to check with the relevant teacher before bringing it to the College.
Use of ICT. No Mobility of business people : No Freedom of transit : No Transport and logistics : No Trade finance : No OTHER AREAS Government Procurement : Yes Chapter 6 Investment : Yes Chapter 4 Competition Policy : Yes Chapter 7 Intellectual Property : Yes Chapter 5 and Annex XII Dispute Settlement : Yes Chapter 10 Labor Mobility : No Labor and Environmental Standards : Yes Chapter 8 Technical cooperation : No Institutional mechanism : Yes Chapter 9 Notes : RULES OF ORIGIN Cumulation CHAPTER 2; ARTICLE 2.2; Xxxxx XX:Article 6: Allowed, Partical Specific Process APPENDIX 1 (9.1): specific processes Heading Change De Minimis Xxxxx XX:Article 4 (4): 20% of the ex-works price Minimum Content Drawback Not mentioned HTTP Link xxxx://xxx.xxxx.xxx/media/documents/legal-texts/free-trade-relations/hong-kong-china/annexes/Annex%20IV%20- %20Rules%20of%20Origin.pdf Notes :
Use of ICT. 2.1 While at school-related activity, you must not have involvement with any material or activity which might put yourself at risk. As well, you must not at any time use ICT to upset, harass, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’. Unacceptable use could include acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the school may need to respond to also includes the use of websites to facilitate misconduct which puts at risk the safety of the school environment
Use of ICT. 2.1 While at school or a school-related activity, you must not have involvement with any material or activity which might put yourself or others at risk. As well, you must not at any time use ICT to upset, bully, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’.
Use of ICT. Digital Agenda of Europe aims at contributing to the economic growth and helping individuals and businesses in the EU to make the most of the development of digital technologies. The programme is the first of the seven initiatives in the Europe 2020 Strategy for smart, sustainable and inclusive growth. Therefore, investment under ESIF to support the creation, access, and use of services based on ICT is crucial for all sectors and regions of Bulgaria and for the country objectives by the key indicators of Digital Agenda Scoreboard, and especially for rural, less developed and populated areas, and aiming at the poor and vulnerable groups of special needs people. The main planned areas of intervention are building infrastructure for next generation access, digital (electronic) access and promoting the development and widespread adoption of ICT products and services, including Internet-based ones. The introduction of ultra-high-speed open and competitive networks will stimulate a favourable cycle of development of the digital economy that will enable new and demanding broadband services to develop and meet the need for accelerated development of backward areas. In order to address the challenges identified in the analysis of the PA it is necessary that investments in ICT be focused on the following areas: solving the problem of the construction of broadband next generation access in remote, sparsely populated and rural areas; digitization of existing records and archives in the administration; building of new NGA networks and improvement of existing broadband infrastructure; providing better deployed broadband technology to ensure the successful operation of e-government in Bulgaria; creation and implementation of information systems for management, monitoring and control in key sectors; providing the necessary equipment for the operation of e-government in the state and municipal authorities, education, health and social services. In accordance with the ex-ante conditionalities, Bulgarian authorities will draw up a national plan for next generation access, aimed at achieving the objectives of the Digital Agenda of Europe, namely: 98% coverage with connectivity speed of 30 Mbps; 50% coverage with connectivity speed of 100 Mbps In the document, based on an economic analysis, a plan of investments in the infrastructure will be developed, taking into account the existing one. This process will be fully in line with the draft Regulation to reduce the cost of deplo...
AutoNDA by SimpleDocs
Use of ICT. While at school or a school-related activity, you must not have involvement with any material or activity which might put yourself or others at risk. As well, you must not at any time use ICT to upset, bully, or harm anyone else in the school community, or the school itself, even if it is meant as a ‘joke’. • Unacceptable use could include, but is not limited to, acts of a malicious or nuisance nature, invasion of privacy, harassment, bullying, hacking, altering the settings on any ICT device or equipment without authorisation, plagiarism, gaming, impersonation/identity theft, spoofing, gambling, fraud, copyright infringement, or cheating in an examination. Behaviour the school may need to respond to may also include the use of websites, applications, social networking sites, or the like, to facilitate misconduct which puts at risk the safety of the school community. • If any privately-owned ICT equipment/device, such as a Chromebook, laptop, desktop, mobile phone, camera, or recording device, portable storage (like a USB or flash memory device), is brought to school or a school-related activity, the school cybersafety rules apply to that device. If you are not sure whether it is appropriate to have a particular device at school or at a school- related activity, you are expected to check with the relevant teacher before bringing it.

Related to Use of ICT

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Logos The Company hereby consents to the use of its and its Subsidiaries’ logos in connection with the Debt Financing so long as such logos (i) are used solely in a manner that is not intended to or likely to harm or disparage the Company Group or the reputation or goodwill of the Company Group; (ii) are used solely in connection with a description of the Company, its business and products or the Merger; and (iii) are used in a manner consistent with the other terms and conditions that the Company reasonably imposes.

  • Use of websites (a) The Company may satisfy its obligation under this Agreement to deliver any information in relation to those Lenders (the “Website Lenders”) who accept this method of communication by posting this information onto an electronic website designated by the Company and the Agent (the “Designated Website”) if:

  • Use of Issuer PII The Issuer does not grant the Asset Representations Reviewer any rights to Issuer PII except as provided in this Agreement. The Asset Representations Reviewer will use Issuer PII only to perform its obligations under this Agreement or as specifically directed in writing by the Issuer and will only reproduce Issuer PII to the extent necessary for these purposes. The Asset Representations Reviewer must comply with all laws applicable to PII, Issuer PII and the Asset Representations Reviewer’s business, including any legally required codes of conduct, including those relating to privacy, security and data protection. The Asset Representations Reviewer will protect and secure Issuer PII. The Asset Representations Reviewer will implement privacy or data protection policies and procedures that comply with applicable law and this Agreement. The Asset Representations Reviewer will implement and maintain reasonable and appropriate practices, procedures and systems, including administrative, technical and physical safeguards to (i) protect the security, confidentiality and integrity of Issuer PII, (ii) ensure against anticipated threats or hazards to the security or integrity of Issuer PII, (iii) protect against unauthorized access to or use of Issuer PII and (iv) otherwise comply with its obligations under this Agreement. These safeguards include a written data security plan, employee training, information access controls, restricted disclosures, systems protections (e.g., intrusion protection, data storage protection and data transmission protection) and physical security measures.

  • Use of Name (a) The Sub-Adviser hereby consents to the use of its name and the names of its affiliates in the Fund’s disclosure documents, shareholder communications, advertising, sales literature and similar communications. The Sub-Adviser shall not use the name or any tradename, trademark, trade device, service xxxx, symbol or any abbreviation, contraction or simulation thereof of the Adviser, the Trust, the Fund or any of their affiliates in its marketing materials unless it first receives prior written approval of the Trust and the Adviser.

  • Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.

  • Limitation on Use of Information The Fund agrees neither to use the information received from the Intermediary for any purpose other than to comply with SEC Rule 22c-2 and other applicable laws, rules and regulations, nor to share the information with anyone other than its employees who legitimately need access to it. Neither the Fund nor any of its affiliates or subsidiaries may use any information provided pursuant to this Agreement for marketing or solicitation purposes. The Fund will take such steps as are reasonably necessary to ensure compliance with this obligation. The Fund shall indemnify and hold the Intermediaries, individually and collectively, (and any of their respective directors, officers, employees, or agents) harmless from any damages, loss, cost, or liability (including reasonable legal fees and the cost of enforcing this indemnity) arising out of or resulting from any unauthorized use of or disclosure by the Fund of the information received from the Intermediaries pursuant to this Agreement. In addition, because an award of money damages (whether pursuant to the foregoing sentence or otherwise) may be inadequate for any breach of this provision and any such breach may cause the Intermediaries irreparable harm, the Fund also agrees that, in the event of any breach or threatened breach of this provision, the Intermediaries will also be entitled, without the requirement of posting a bond or other security, to seek equitable relief, including injunctive relief and specific performance. Such remedies will not be the exclusive remedies for any breach of this provision but will be in addition to all other remedies available at law or in equity to the Intermediaries. In the event that the Fund is required by legal process, law, or regulation to disclose any information received from the Intermediaries pursuant to this Agreement, the Fund shall provide Intermediaries with prompt written notice of such requirement as far in advance of the proposed disclosure as possible so that the Intermediaries (at their expense) may either seek a protective order or other appropriate remedy which is necessary to protect their interests or waive compliance with this provision to the extent necessary.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Limitations on Use of Information The Fund agrees not to use the information received for marketing or any other similar purpose without the prior written consent of the Intermediary.

  • Use of Names The Manager and the Fund agree that the Manager has a proprietary interest in the names “DFA” and “Dimensional,” and that the Fund and/or Portfolio may use such names only as permitted by the Manager, and the Fund further agrees to cease use of such names promptly after receipt of a written request to do so from the Manager.

Time is Money Join Law Insider Premium to draft better contracts faster.