By Microsoft Microsoft will defend Customer against any third-party claim to the extent it alleges that a Product or Fix made available by Microsoft for a fee and used within the scope of the license granted under this agreement (unmodified from the form provided by Microsoft and not combined with anything else), misappropriates a trade secret or directly infringes a patent, copyright, trademark or other proprietary right of a third party. If Microsoft is unable to resolve a claim of infringement under commercially reasonable terms, it may, as its option, either: (1) modify or replace the Product or fix with a functional equivalent; or (2) terminate Customer’s license and refund any prepaid license fees (less depreciation on a five-year, straight-line basis) for perpetual licenses and any amount paid for Online Services for any usage period after the termination date. Microsoft will not be liable for any claims or damages due to Customer’s continued use of a Product or Fix after being notified to stop due to a third- party claim.
Query a search query initiated from the Search Box or a Hyperlink, or a request for Matched Ads initiated by the Ad Code on an Ad Page. Results: Paid Search Results, Hyperlink Results, Domain Match Results, Web Search Results and/or Matched Ads, to the extent included in this Agreement and as appropriate to the context. Search Box: a graphical area in which a user can enter a Query. SO: the Service Order.
Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.
Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Job Search The Employer should assist surplus staff to find alternative employment by allowing them a reasonable amount of time off work to attend job interviews without loss of pay. This is subject to the Employer being notified of the time and location of the interview before the employee is released to attend it.
Network Upgrades The Transmission Owner shall design, procure, construct, install, and own the Network Upgrades described in Attachment 6 of this Agreement. If the Transmission Owner and the Interconnection Customer agree, the Interconnection Customer may construct Network Upgrades that are located on land owned by the Interconnection Customer. Unless the Transmission Owner elects to pay for Network Upgrades, the actual cost of the Network Upgrades, including overheads, shall be borne initially by the Interconnection Customer.
Localization Should any Seller Affiliate and any Customer Affiliate wish to enter into an agreement for the provision of Deliverables, Products and/or Services ("Local Agreement") in Canada, the United Kingdom, the United States, Australia, Ireland, Singapore, South Africa or Hong Kong (as applicable), Local Agreement(s) can be agreed between the Parties and added as Exhibit(s) to this Agreement by way of addendum. The terms of this Agreement shall be incorporated into each such Local Agreement except to the extent that the Local Agreement expressly states that any amendments shall take precedence. By: By: {{cby_es_:signer1:signature }} Name: Name: {{cname_es_:signer1:fullname }} Title: Title: {{ctitle_es_:signer1:title }} (Authorised Signatory) Date: XX/XX/XXXX Date: {{cdate_es_:signer1:date}} Exhibit A Dated the ___ day of __________, , to the Between CDW MIDDLE EAST FZ-LLC, and ____________________ Customer Affiliates Purchase Orders may be issued and Statements of Work executed pursuant to the Agreement by the following Customer-designated parties: Affiliate Name: ______________________________ Address: ______________________________ FEIN Number: ______________________________ DUNS Number: ______________________________ Account Number: ______________________________ Affiliate Name: ______________________________ Address: ______________________________ FEIN Number: ______________________________ DUNS Number: ______________________________ Account Number: ______________________________ Affiliate Name: ______________________________ Address: ______________________________ FEIN Number: ______________________________ DUNS Number: ______________________________ Account Number: ______________________________ Exhibit B Dated the ___ day of __________, , to the Between CDW MIDDLE EAST FZ-LLC, and ____________________
IBM Credit may in its sole discretion from time to time decide the amount of credit IBM Credit extends to Customer, notwithstanding any prior course of conduct between IBM Credit and Customer. IBM Credit may combine all of its advances to make one debt owed by Customer.
Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.