Rights Management Sample Clauses

Rights Management. You may not remove, disable, circumvent, or otherwise create or implement any workaround to any copy protection, rights management or security features in or protecting the Software.
AutoNDA by SimpleDocs
Rights Management. HathiTrust strives to provide as much reasonable access as is lawful and practical to materials stored in the repository. For public domain materials and for materials where a rights holder has granted sufficient permission, HathiTrust strives to provide a level of access that makes it possible for any user in the world to read these works online. For other materials, HathiTrust will, where lawful and practical, provide reasonable search capabilities so that these works can serve as an index to the printed text. To facilitate only lawful access to digitized content, HathiTrust employs a rights management mechanism that sets default rights based on information such as the publication place and date found in the bibliographic records provided by Supporting Institutions. HathiTrust stores other rights information as a result of specific overrides. This additional overriding information is typically the result of copyright determination work, but may also include the results of collaboration with rights holders. As between the Parties, Michigan assumes liability for the parameters for general access, as outlined here. As between the Parties, Supporting Institution assumes liability for errors in the bibliographic data it makes available to Michigan.
Rights Management. Authorized Users assign access rights and permissions for each ASQ Family Access Authorized User via a direct or indirect Invitation. It is understood that Caregivers perform the role of ASQ Family Access Authorized User. Although ASQ Family Access Authorized Users do not assign access rights and permissions to any other users, ASQ Family Access Authorized Users may aid in the delivery of an indirect Invitation.
Rights Management. Any Digital Rights Management used to protect Licensed Content must support the following: A valid license, containing the unique cryptographic key/keys, other necessary decryption information, and the set of approved usage rules, shall be required in order to decrypt and play each piece of content. Each license shall bound to either a (i) specific individual end user device or (ii) domain of registered end user devices in accordance with the approved usage rules. Licenses bound to individual end user devices shall be incapable of being transferred between such devices. Licenses bound to a domain of registered end user devices shall ensure that such devices are only registered to a single domain at a time. An online registration service shall maintain an accurate count of the number of devices in the domain (which number shall not exceed the limit specified in the usage rules for such domain). Each domain must be associated with a unique domain ID value. If a license is deleted, removed, or transferred from a registered end user device, it must not be possible to recover or restore such license except from an authorized source.
Rights Management. The Music Service uses Windows Media Digital Rights Management (“DRM”) to ensure that songs that are downloaded as part of a subscription or purchased on a permanent download to own basis are not used in a manner that violates the rights of the copyright owner. Embarq will not interfere with or circumvent the DRM measures. Songs selected on a PC Subscription Model or Portable Subscription Model basis can be streamed for immediate listening, or can be downloaded to a subscriber’s hard drive for play-back later while off-line. The tracks and playlists selected as part of a PC Subscription Model or
Rights Management. Authorized Users assign access rights and permissions for each Family Access Authorized User via a direct or indirect Invitation. It is understood that caregivers perform the role of Family Access Authorized User. Although Family Access Registered Users do not assign access rights and permissions to any other users, Family Access Registered Users may aid in the delivery of an indirect Invitation.
Rights Management. Subject only to the provisions of this Agreement, the management and operation of the business and the employment, direction, promotion, transfer, lay-off, and suspension, discharge, or other discipline of employees for just cause, shall be vested solely in the Management of the Company.
AutoNDA by SimpleDocs

Related to Rights Management

  • Pain Management Inpatient rehabilitation for Pain Management is excluded.

  • Crisis Management 1. The Parties reaffirm their commitment to cooperating in promoting international peace and stability.

  • Traffic Management The Customer will not utilize the Services in a manner which, in the view of the Centre Operator, significantly distorts traffic balance on the Centre Operator’s circuits which are shared with other users. If, in the reasonable view of the Centre Operator, the Customer’s traffic patterns cause or may cause such distortion, the Customer should have a dedicated circuit capability. If the Customer declines to do so then the Centre Operator may suspend the Services while the matter is being resolved. If there is no resolution within 5 business days then either party may terminate the Agreement.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Time Management Because of the nature of the duties performed by these supervisors, it is impracticable to apply provisions which prescribe normal work hours. However, it is normally expected that eighty (80) hours of work shall constitute a normal payroll period. It is recognized that these supervisors are responsible for managing and accounting for their own hours of work and that they may work hours in excess of the normal work day and/or payroll period and may make adjustments in hours of work in subsequent work days and/or payroll periods, provided such time management system does not result in overtime payment or guarantee hour-for-hour time off for extra hours worked.

  • Service Management Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components.

  • Labour Management (a) No employee or group of employees will undertake to represent the Union at meetings with the University without the proper authorization of the Union. Neither will the University meet with any employee or group of employees undertaking to represent the Union without the authorization of the Union. In representing an employee or group of employees, an elected or appointed representative of the Union will speak for the Union.

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

  • Programme Management The Government will establish a programme management office and the Council will be able to access funding support to participate in the reform process. The Government will provide further guidance on the approach to programme support, central and regional support functions and activities and criteria for determining eligibility for funding support. This guidance will also include the specifics of any information required to progress the reform that may be related to asset quality, asset value, costs, and funding arrangements.

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.