Use of the Covered Solutions Sample Clauses

Use of the Covered Solutions. Subject to the terms and conditions of this Agreement, and any Iternal Credit limitations on the applicable Order Form, Iternal hereby grants to Customer and Customer hereby accepts from Iternal a limited, non-exclusive, revocable, non-transferable (except as permitted in Section 14.3 (Assignability)), non-sublicensable right during the applicable Subscription Term to access and use the Covered Solutions and the Provided Content solely in connection with its own business operations.
AutoNDA by SimpleDocs

Related to Use of the Covered Solutions

  • Use of Third Parties Except as may be expressly agreed to in writing by the State Entity, Contractor shall not subcontract, assign, delegate or otherwise permit anyone other than Contractor or Contractor's personnel to perform any of Contractor's obligations under this Contract or any of the work subsequently assigned under this Contract. No subcontract which Contractor enters into with respect to performance of obligations or work assigned under the Contract shall in any way relieve Contractor of any responsibility, obligation or liability under this Contract and for the acts and omissions of all subcontractors, agents, and employees. All restrictions, obligations and responsibilities of the Contractor under the Contract shall also apply to the subcontractors. Any contract with a subcontractor must also preserve the rights of the State Entity. The State Entity shall have the right to request the removal of a subcontractor from the Contract for good cause.

  • Use of the Card 1. The Cardmember must sign the Card in ink, using a ball point pen, as soon as he or she receives it; the Cardmember must also safeguard the Card and preserve any PIN in extreme secrecy and keep it separate from his or her Card. The Cardmember must not use the Card after the expiration of the validity period embossed on it, and not use the Card after it has been damaged, withdrawn or cancelled.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors.

  • Use of Attachment Facilities by Third Parties Purpose of Attachment Facilities.‌‌ Except as may be required by Applicable Laws and Regulations, or as otherwise agreed to among the Parties, the Attachment Facilities shall be constructed for the sole purpose of interconnecting the Large Generating Facility to the New York State Transmission System and shall be used for no other purpose.

  • Insurance, Subcontractor's Public Liability and Property Damage The Contractor shall require each of its subcontractors to secure and maintain during the life of the subcontract, insurance of the type specified in this Contract, or, the Contractor may insure the activities of its subcontractors in the Contractor’s policy, as specified in this Contract.

  • Exclusions and Limitations for Third Party Software SUBJECT TO THE EXCLUSION OF DAMAGES STATED IN SECTION 9.2 AND WITH RESPECT TO THIRD PARTY SOFTWARE, UNDER NO CIRCUMSTANCES AND REGARDLESS OF THE NATURE OF ANY CLAIM SHALL SAP OR ITS LICENSORS’ BE LIABLE FOR AN AMOUNT IN EXCESS OF THE PAID LICENSE FEES FOR THE THIRD PARTY SOFTWARE DIRECTLY CAUSING THE DAMAGES.

  • Use of Services and Content 3.1 Sage Services are only available to bona fide end-users with a requirement for services of the nature of those that we provide. We reserve the right to terminate this Agreement without further liability to you where we have reasonable grounds to suspect that your use of the Sage Services is for competitive purposes (including competitive monitoring, assessment or otherwise).

  • Claims-made limitations The following provisions shall apply if the professional liability coverage is written on a claims-made form:

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

Time is Money Join Law Insider Premium to draft better contracts faster.