By ICANN Sample Clauses

By ICANN. ICANN will indemnify, defend and hold harmless the IETF Trust, its Affiliates, employees and trustees (“Trust Indemnitees”) from and against any and all Third Party Claims and associated Liability to the extent arising directly or indirectly from (a) ICANN’s material breach of any of its representations, warranties or agreements set forth herein, or (b) ICANN’s or any of its licensee’s use of the Assigned Intellectual Property, and the conduct of any business or other activity by ICANN or its licensees under or using the Assigned Intellectual Property, prior to the Effective Date, or (c) the IETF Trust’s or any of its licensees’ (other than ICANN or any of its Affiliates or sublicensees) use of the Assigned Intellectual Property, and the conduct of any business or other activity by the IETF Trust or such licensees under or using the Assigned Intellectual Property, after the Effective Date, which use is of the same scope and nature as ICANN’s or its Affiliates’ or licensees’ use prior to the Effective Date (including location and class of service). Notwithstanding the forgoing, ICANN’s indemnity obligation with respect to clause 6.1(c) above shall have a duration of only three (3) years from the Effective Date.
AutoNDA by SimpleDocs
By ICANN. ICANN MAY TERMINATE THIS AGREEMENT IF AND ONLY IF: (I) REGISTRY OPERATOR FAILS TO CURE ANY FUNDAMENTAL AND MATERIAL BREACH OF REGISTRY OPERATOR’S OBLIGATIONS SET FORTH IN SECTIONS 3.1(A), (B), (D) OR (E); SECTION 5.2 OR SECTION 7.3 WITHIN THIRTY CALENDAR DAYS AFTER ICANN GIVES REGISTRY OPERATOR WRITTEN NOTICE OF THE BREACH, WHICH NOTICE SHALL INCLUDE WITH SPECIFICITY THE DETAILS OF THE ALLEGED BREACH; AND (II) (A) AN ARBITRATOR OR COURT HAS FINALLY DETERMINED THAT REGISTRY OPERATOR IS, OR WAS, IN FUNDAMENTAL AND MATERIAL BREACH AND FAILED TO CURE SUCH BREACH WITHIN THE PRESCRIBED TIME PERIOD AND

Related to By ICANN

  • By Client Client agrees to indemnify, defend and hold Agency, its officers, directors, employees, agents, attorneys, subsidiaries, affiliated companies, parent companies, representatives, and successors and assigns, harmless from and against all Losses to the extent such Losses arise out of or are primarily related to (i) the negligent or wrongful acts, errors, or omissions of Client or its employees, agents affiliates, assigns or any creditor or prior account holder, or the employees or agents of any of them, in connection with this Agreement, including but not limited to errors or omissions in connection with information furnished by Client to Agency concerning a Referred Account, or (ii) any collection effort by Client or any other collection agency as to a Referred Account.

  • By Microsoft Microsoft will defend Customer against any third-party claim to the extent it alleges that a Product or Fix made available by Microsoft for a fee and used within the scope of the license granted under this agreement (unmodified from the form provided by Microsoft and not combined with anything else), misappropriates a trade secret or directly infringes a patent, copyright, trademark or other proprietary right of a third party. If Microsoft is unable to resolve a claim of infringement under commercially reasonable terms, it may, as its option, either: (1) modify or replace the Product or fix with a functional equivalent; or (2) terminate Customer’s license and refund any prepaid license fees (less depreciation on a five-year, straight-line basis) for perpetual licenses and any amount paid for Online Services for any usage period after the termination date. Microsoft will not be liable for any claims or damages due to Customer’s continued use of a Product or Fix after being notified to stop due to a third- party claim.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • By Licensee Except for claims for which Oracle is obligated to indemnify Licensee under Section 7.2, Licensee shall defend, at Licensee's expense, any and all claims brought against Oracle, and shall pay all damages awarded by a court of competent jurisdiction, or such settlement amount negotiated by Licensee, arising out of or in connection with Licensee's reproduction, development or distribution of product(s) developed using the TCK. Licensee's obligation to provide a defense under this Section 7.5 shall arise provided that Oracle: (a) provides notice of the claim promptly to Licensee; (b) gives Licensee sole control of the defense and settlement of the claim; (c) provides to Licensee, at Licensee's expense, all available information, assistance and authority to defend; and (d) has not compromised or settled such proceeding without Licensee's prior written consent.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Supplier Diversity Seller shall comply with Xxxxx’s Supplier Diversity Program in accordance with Appendix V.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Procurement of Recovered Materials (1) In the performance of this contract, the Contractor shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired

Time is Money Join Law Insider Premium to draft better contracts faster.