Protected Use definition

Protected Use means a Residence, Religious Institution, Hospital Building, School or Public Park.
Protected Use means (i) the operation of automobile driving motion-based simulator rides, excluding arcade center(s) within the Project (which are like "GameWorks" or "Dave xxx Buster" type uses) which could have similar type simulator rides or games or multi-passenger (defined as having five or more passengers) motion-based simulator rides (such as the "Emaginator" ride currently operating adjacent to the movie theater) and also excluding the operation by a tenant of less than three single-passenger automobile driving motion-based simulator rides, or (ii) the sale of "NASCAR" branded merchandise, excluding the incidental sale of NASCAR branded merchandise. In the event Tenant ceases to use the Premises for the sale of NASCAR branded merchandise for a period of 45 days or more (subject to Force Majeure or remodeling by Tenant as permitted by this Lease), then NASCAR branded merchandise shall cease to be a Protected Use.
Protected Use means the exclusive possession and occupation, use and quiet enjoyment by the NMH without interruption of the NMH Areas for the purpose of the provision of the NMH Health Services;

Examples of Protected Use in a sentence

  • Equipment and Buildings not part of the operation of the compressor shall be set back a minimum of two hundred (200) feet from the Protected Use, Public Building or Habitable Structure or one hundred (100) feet from the property line, whichever is greater.

  • Although the Latvian public sector was extremely fiscally prudent, inappropriately low interest rates led to high private-sector borrowing.

  • Against concerns held by their Bank counterparts, Fund staff had vehemently pushed for and ultimately succeeded in injecting a degree of flexibility into the FSAP.15 In this sense, the process reform further cemented the IMF’s claim to leadership in this area, which is not least manifested by the post- crisis launch of the joint Early Warning Exercise (EWE) with the Financial Stability Board (FSB).

  • Written notarized waivers granted by the all the Protected Use Property Owners within a six hundred (600) foot radius around the proposed well or boundary of Multiple Well Site must be filed, at the expense of the Operator, in the applicable county records.

  • No application for a Gas Well permit within six hundred (600) feet of a Protected Use by Waiver of Protected Uses shall be accepted unless the written notarized waivers are obtained from all Protected Use Property Owners within six hundred (600) feet of the proposed well site.

  • No variance or waiver for a distance setback from a Protected Use shall be required for subsequent wells; however no well shall be drilled closer than three hundred (300) feet from any Protected Use or Public Building.

  • Within forty-five (45) days of receipt of a complete application, a site plan and a request for a waiver to drill a Gas Well within six hundred (600) feet of a Protected Use, the Gas Inspector shall schedule the matter on a City Council night agenda for a public hearing and give notice by mail of the time, place and purpose thereof to the applicant and any other party who has requested in writing to be so notified.

  • The sign(s) shall substantially indicate that a Gas Well Permit within six hundred (600) feet of a Protected Use by Protected Use Waiver to drill for gas has been requested and shall further set forth that additional information can be acquired by telephoning the Operator at the number indicated on the sign.

  • Written notarized waivers granted by all the Protected Use Property Owners within a six hundred (600) foot radius around the proposed well pursuant to Section 15-36 of this Ordinance.

  • The Western response has involved both military manoeuvres and force deploy- ments, particularly what NATO terms “enhanced forward presence” in the Baltic and Poland.44If Russia is not to be emboldened by its Ukraine experience, it follows that the war there must not be resolved in Russia’s favour.


More Definitions of Protected Use

Protected Use means a church, school or public park,
Protected Use means hospital, medical clinic, medical offices (including physician practices, physician groups, dental, osteopathic, chiropractic, and podiatric offices and services, and other health care providers), ambulatory care services, ambulatory surgical services, in-patient or out-patient or clinical services, physical therapy, work hardening, occupational therapy services, rehabilitation services, nursing facility services, home health care services, diagnostic imaging, and other diagnostic or therapeutic services, clinical/reference laboratory services, health and welfare services, and academic medical centers, provided that the aforementioned exclusives shall remain applicable to Tenant so long as the applicable lease remains in effect, or for such shorter period that the exclusive remains in effect, unless waived in writing by the tenant for whom the exclusive was granted.

Related to Protected Use

  • protected area means an area that is or has to be listed in the register referred to in section 10 of the Protected Areas Act;

  • Permitted Use , in relation to a property, means the limited purposes for which the property may be used in terms of –

  • Protected Information means PHI provided by CE to BA or created, maintained, received or transmitted by BA on CE’s behalf.

  • Licensed Use means the Licensor’s permitted use of the Licensed Data under the PSGA Member Licence. Login Details means the unique identifiers assigned to the Licensor when it entered into the PSGA Member Licence enabling access to the On-Line Ordering Service. On-Line Ordering Service means the service accessed by entering the Licensor’s Login Details where indicated on OS’s Website. OS means Ordnance Survey Limited, a company registered in England and Wales (company registration number 09121572) whose registered address is at Xxxxxxxx Xxxxx, Xxxxxx Xxxxx, XXXXXXXXXXX, XX00 0XX. OS Data means Data (including but not limited to Licensed Data) which OS owns or which OS licenses from a third party (including but not limited to the Crown).

  • Protected Territory means the United States of America.

  • Intended Use means the use of machinery in accordance with the information provided in the instructions for use;

  • Protected Disclosure means any communication made in good faith that discloses or demonstrates information that may evidence unethical or improper activity.

  • Protected Areas Act means the National Environmental Management: Protected Areas Act, 2003;

  • Protected tenant means a tenant who has obtained a court order.

  • protected variety means any variety that is the subject of a breeder’s right;

  • Proprietary Information shall have the same meaning as Confidential Information.

  • Protected Data means Student Data and/or Teacher or Principal Data, to the extent applicable to the product or service actually being provided to the District by Vendor pursuant to the Master Agreement.

  • Unauthorized Use means either of the following:

  • Approved Use means the use of the Project for the operation of a Healthcare Facility as a ___ ____ [insert type of facility] with __ __ [beds/units] [of which not less than __ ___ [beds/units] are [to be] in use] and such other uses as may be approved in writing from time to time by HUD based upon a request made by the Borrower, Operator, or Master Tenant, but excluding any uses that are discontinued with the written approval of HUD. Master Tenant shall ensure that use of the Healthcare Facility is in accordance with the Approved Use.

  • Confidential Information has the meaning set forth in Section 6.1.

  • protected species means any of the following animals:

  • Water-oriented use means a use that is water-dependent, water-related, or water-enjoyment, or a combination of such uses.

  • Proprietary Information and Technology means any and all of the following: works of authorship, computer programs, source code and executable code, whether embodied in software, firmware or otherwise, assemblers, applets, compilers, user interfaces, application programming interfaces, protocols, architectures, documentation, annotations, comments, designs, files, records, schematics, test methodologies, test vectors, emulation and simulation tools and reports, hardware development tools, models, tooling, prototypes, breadboards and other devices, data, data structures, databases, data compilations and collections, inventions (whether or not patentable), invention disclosures, discoveries, improvements, technology, proprietary and confidential ideas and information, know-how and information maintained as trade secrets, tools, concepts, techniques, methods, processes, formulae, patterns, algorithms and specifications, customer lists and supplier lists and any and all instantiations or embodiments of the foregoing or any Intellectual Property Rights in any form and embodied in any media.

  • Confidential and Proprietary Information means any information that is classified as confidential in the Firm’s Global Policy on Confidential Information or that may have intrinsic value to the Firm, the Firm’s clients or other parties with which the Firm has a relationship, or that may provide the Firm with a competitive advantage, including, without limitation, any trade secrets; inventions (whether or not patentable); formulas; flow charts; computer programs; access codes or other systems information; algorithms; technology and business processes; business, product or marketing plans; sales and other forecasts; financial information; client lists or other intellectual property; information relating to compensation and benefits; and public information that becomes proprietary as a result of the Firm’s compilation of that information for use in its business, provided that such Confidential and Proprietary Information does not include any information which is available for use by the general public or is generally available for use within the relevant business or industry other than as a result of your action. Confidential and Proprietary Information may be in any medium or form, including, without limitation, physical documents, computer files or discs, electronic communications, videotapes, audiotapes, and oral communications.

  • Confidential Information Breach means, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Protected Activity means filing a charge, complaint, or report with, or otherwise communicating, cooperating, or participating in any investigation or proceeding that may be conducted by, any federal, state or local government agency or commission, including the Securities and Exchange Commission, the Equal Employment Opportunity Commission, the Occupational Safety and Health Administration, and the National Labor Relations Board (the “Government Agencies”). The Employee understands that in connection with such Protected Activity, the Employee is permitted to disclose documents or other information as permitted by law, and without giving notice to, or receiving authorization from, the Company. Notwithstanding the foregoing, the Employee agrees to take all reasonable precautions to prevent any unauthorized use or disclosure of any information that may constitute Company confidential information to any parties other than the Government Agencies. The Employee further understands that “Protected Activity” does not include the disclosure of any Company attorney-client privileged communications. Any language in any other agreement between the Company and the Employee regarding the Employee’s right to engage in Protected Activity that conflicts with, or is contrary to, this paragraph is superseded by this Agreement. In addition, pursuant to the Defend Trade Secrets Act of 2016, the Employee is notified that an individual will not be held criminally or civilly liable under any federal or state trade secret law for the disclosure of a trade secret that (i) is made in confidence to a federal, state, or local government official (directly or indirectly) or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (ii) is made in a complaint or other document filed in a lawsuit or other proceeding, if (and only if) such filing is made under seal. In addition, an individual who files a lawsuit for retaliation by an employer for reporting a suspected violation of law may disclose the trade secret to the individual’s attorney and use the trade secret information in the court proceeding, if the individual files any document containing the trade secret under seal and does not disclose the trade secret, except pursuant to court order.

  • Company Information As defined in Section 4(a)(i).

  • Protected Parties means the following Persons: (a) the Debtors; (b) Reorganized BSA; (c) the Related Non- Debtor Entities; (d) the Local Councils; (e) the Contributing Chartered Organizations; (f) the Settling Insurance Companies, including Hartford; and (g) all of such Persons’ Representatives; provided, however, that no Perpetrator is or shall be a Protected Party. Notwithstanding the foregoing, a Contributing Chartered Organization shall be a Protected Party with respect to Abuse Claims only as set forth in the definition of “Abuse Claim.”

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Supplier's Confidential Information means any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, Know-How, personnel and suppliers of the Supplier, including IPRs, together with information derived from the above, and any other information clearly designated as being confidential (whether or not it is marked as "confidential") or which ought reasonably to be considered to be confidential;

  • Customer's Confidential Information means all Personal Data and any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, know-how, personnel, and suppliers of the Customer, including all IPRs, together with all information derived from any of the above, and any other information clearly designated as being confidential (whether or not it is marked "confidential") or which ought reasonably be considered to be confidential;