Line of sight Sample Clauses

Line of sight. Make ongoing use of meaningful metrics, encourage systems thinking and show how the work of the team connects to regional goals.
AutoNDA by SimpleDocs
Line of sight. The teacher and/or teacher assistant must maintain a line of sight of the children during the six (6)-hour comprehensive educational program day.
Line of sight. Exhibits may not protrude into the aisle or to the sides beyond the assigned space. The back wall of exhibits cannot display branding or graphics on the backside of header. Exhibit sidewalls taller than 4 feet may not extend more than 5’ from the rear of the assigned space and/or block the view of other booths. All parts of any exhibits must remain inside the designated booth space. Exhibits, which include audio/visual or lighting equipment, must be arranged so that noise/light from the equipment will not annoy or disturb other exhibitors, attendees, or HSCF and its activities (REFER TO VISUAL AND AUDIO RULES & REGULATIONS DOCUMENT).
Line of sight. BellSouth will manage roof space on a first-come /first-served basis. BellSouth will work cooperatively with WinStar in determining suitable space for WinStar equipment. Once the parties mutually determine an initial location which provides for line of sight pursuant to 1A, and 1E above, WinStar is guaranteed a clear line of sight from the antenna mount and the edge of BellSouth’s roof line. If BellSouth requires a building enhancement modification or through the placement of additional equipment obstructs WinStar’s existing line of sight, BellSouth will work with WinStar to move the antenna mount or raise the height of the antenna mount for a clear line of sight. The costs of this modification will be borne by BellSouth. If a third party elects to place equipment on the roof that obstructs an existing line of sight, the third party application will be denied unless all three parties mutually agree to move an existing arrangement to allow for a clear line of sight. The costs of this application will be borne by the third party.
Line of sight. BellSouth shall manage the placement of all requested GPS antenna mounting brackets on its exterior central office wall space on a first-come, first-served basis. The Parties acknowledge that the functionality of GPS equipment requires an unobstructed line-of-sight to function properly. BellSouth and BSLD will work cooperatively to determine the most suitable placement of the initial GPS antenna mounting bracket on an exterior wall of a requested BellSouth Central Office to obtain an unobstructed line-of-sight. BSLD shall be responsible for determining that BSLD’s GPS antenna can receive an acceptable signal prior to BellSouth’s installation of the mounting bracket. BellSouth will reasonably attempt to locate BSLD’s requested GPS antenna mounting bracket on a first or second story exterior wall of a requested BellSouth Central Office. However, if for any reason, an unobstructed line-of-sight is unavailable on the first or second story of an exterior wall on the requested BellSouth Central Office, BellSouth will work with BSLD to determine the proper placement of the requested GPS antenna mounting bracket to obtain an unobstructed line-of-sight, which may include, but not necessarily be limited to, an exterior wall above the second floor or on the roof of the BellSouth Central Office. After the site of the GPS antenna mounting bracket has been determined and agreed upon by the Parties, it will be BSLD’s responsibility to ensure that the location of the GPS antenna is properly positioned to obtain an unobstructed line-of-sight. BellSouth will assist BSLD in making the determination of an unobstructed line-of-sight, where such is available; however, BellSouth shall make no guarantees that such unobstructed line- of-sight will be available in every BellSouth Central Office requested by BSLD. If, after BSLD has placed its GPS antenna on the GPS antenna mounting bracket installed by BellSouth and BellSouth performs a building enhancement or modification or if the placement of additional equipment on the exterior wall of the BellSouth Central Office obstructs BSLD’s existing line of sight, BellSouth shall work cooperatively with BSLD to move the existing GPS antenna mounting bracket, by raising or lowering the height of the bracket, to obtain an unobstructed line-of-sight. BellSouth will be responsible for the costs to move the existing GPS antenna mounting bracket in the event BellSouth performs a building enhancement or modification or if the placement of addit...
Line of sight. The part surface is to be evaluated at a 45-degree angle to the line of sight. The part is to be rotated 10 degrees in both directions about the axis.
Line of sight. BellSouth will manage roof space on a first-come /first-served basis. BellSouth will work cooperatively with Teligent in determining suitable space for Teligent equipment. Once the parties mutually determine an initial location which provides for line of sight pursuant to Section 1A, and Section 1D above, Teligent is guaranteed a clear line of sight from the antenna mount and the edge of BellSouth’s roof line. If BellSouth requires a building enhancement modification or through the placement of additional equipment obstructs Teligent’s existing line of sight, BellSouth will work with Teligent to move the antenna mount or raise the height of the antenna mount for a clear line of sight. The costs of this modification will be borne by BellSouth. If a third party elects to place equipment on the roof that obstructs an existing line of sight, the third party application will be denied unless all three parties mutually agree to move an existing arrangement to allow for a clear line of sight. The costs of this application will be borne by the third party.
AutoNDA by SimpleDocs
Line of sight. BellSouth will manage roof space on a first-come /first-served basis. BellSouth will work cooperatively with Fuzion in determining suitable space for Fuzion equipment. Once the parties mutually determine an initial location which provides for line of sight pursuant to 1c) above, Fuzion is guaranteed a clear line of sight from the antenna mount and the edge of BellSouth’s roof line. If BellSouth requires a building enhancement modification or through the placement of additional equipment obstructs Fuzion’s existing line of sight, BellSouth will work with Fuzion to move the antenna mount or raise the height of the antenna mount for a clear line of sight. The costs of this modification will be borne by BellSouth. If a third party elects to place equipment on the roof that obstructs an existing line of sight, the third party application will be denied unless all three parties mutually agree to move an existing arrangement to allow for a clear line of sight. The costs of this application will be borne by the third party.

Related to Line of sight

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Maintenance and Support Services As long as you are not using the Help Desk as a substitute for our training services on the Tyler Software, and you timely pay your maintenance and support fees, we will, consistent with our then-current Support Call Process:

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • BACKGROUND OF AGREEMENT 1.1 LICENSOR represents that it has certain intellectual property pertaining to services and technologies in the field of teleradiology, in respect to which it is prepared to grant a nonexclusive license to LICENSEE.

Time is Money Join Law Insider Premium to draft better contracts faster.