Use of the foreground Sample Clauses

Use of the foreground. 1. The beneficiary that owns the foreground shall have the right to use such foreground subject to the relevant provisions of this grant agreement. 2. In the case of nuclear applications, the beneficiary may only grant non-exclusive licenses or sub-license: (a) to third parties established in the territory of the members of Fusion for Energy provided that it informs Fusion for Energy prior to such intended use; (b) to third parties established outside the territories of the members of Fusion for Energy, provided that Fusion for Energy, following a consultation with the Commission, does not object in writing within 45 days from the receipt of a written request. 3. In the case of non-nuclear applications, the beneficiary shall inform Fusion for Energy prior to the use of that foreground including the grant of licenses inside or outside the territories of the members of Fusion for Energy. 4. Fusion for Energy may object to the granting of a license regarding the foreground to third parties established in the territory of the Members of Fusion for Energy or in a third country if it considers that this is not in accordance with tasks and activities of Fusion for Energy or where the European Commission considers that such use is not in accordance with the interests of developing the competitiveness of the European economy, with ethical principles, with the defence interests of the Member States within the meaning of Article 24 of the Euratom Treaty or with the implementation of the Euratom Treaty including international agreements concluded by Euratom. In such cases, the transfer of ownership or grant of licence shall not take place unless appropriate safeguards are agreed upon by the Parties.

Related to Use of the foreground

  • Use of Materials There should be no limitations or restrictions by Union upon a Contractor's choice of materials or design, nor, regardless of source or location, upon the full use and utilization, of equipment, machinery, packaging, precast, prefabricated, prefinished, or preassembled materials, tools or other labor saving devices, subject to the application of the California Public Contract and Labor Codes. Generally, the onsite installation or application of such items shall be performed by the craft having jurisdiction over such work.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/aupdetail.html • The UC Policy on Copyright Ownership: ▇▇▇▇://▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND