Authorized Activities In carrying out the purposes of the Partnership, but subject to all other provisions of this Agreement, the Partnership is authorized to engage in any kind of lawful activity, and perform and carry out contracts of any kind, necessary or advisable in connection with the accomplishment of the purposes and business of the Partnership described herein and for the protection and benefit of the Partnership; provided that the General Partner shall not be obligated to cause the Partnership to take, or refraining from taking, any action which, in the judgment of the General Partner, (i) could adversely affect the ability of the General Partner to qualify and continue to qualify as a REIT, (ii) could subject the General Partner to additional taxes under Code Section 857 or 4981 or (iii) could violate any law or regulation of any governmental body or agency having jurisdiction over the General Partner or its securities.
Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.
Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:
Service Areas HHSC authorizes the MA Dual SNP to add the MA Product to Texas service areas that are not identified in Attachment C, Proposed MA Product Service Areas, provided it receives prior CMS approval and complies with the notice requirements specified in this Agreement.
Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.