Notice and Techniques Clause Samples

Notice and Techniques. Municipality is entitled to Overlash if it provides at least fourteen (14) days prior notice via ENS to the SPA and complies with Approved Overlashing Techniques. If before the expiration of the 14-day notice, the SPA has identified a safety, engineering or pole loading concern with Municipality’s proposal, the proposed Overlash will be placed on hold until (a) all of the SPA’s concerns are addressed, or (b) a decision or order is issued on the concerns in a dispute resolution process under Article 12. Municipality must perform (at Municipality’s expense) its own pre-survey of all routes where it proposes to Overlash new cable to its existing licensed Attachment(s) and provide written or electronic results of that survey (in a format reasonably acceptable to Frontier) to Frontier at least five (5) days prior to the installation of the proposed Overlashing. Each notice from Municipality seeking to Overlash must identify (a) the specific Pole impacted by the proposed Overlashing, including the identification number that appears on each Pole, (b) a diagram or drawing of the Overlashing technique to be utilized and a signed certification from Municipality that the Overlashing technique is an Approved Overlashing Technique, (c) the weight and dimensions of each cable sought to be Overlashed onto existing Attachments, and (d) other technical information as Frontier or the SPA may reasonably request after receipt and review of Municipality’s notice of proposed Overlashing. If Make-Ready Work is required to accommodate any proposed Overlashing, the Parties will use the make-ready process in Article 4.

Related to Notice and Techniques

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • Proprietary Materials Each of the Parties shall own its own intellectual property including without limitation all trade secrets, know-how, proprietary data, documents, and written materials in any format. Any materials created exclusively by IPS for the School shall be owned by IPS, and any materials created exclusively by Operator for the School shall be Operator’s proprietary material. The Parties acknowledge and agree that neither has any intellectual property interest or claims in the other Party’s proprietary materials. Notwithstanding the foregoing, materials and work product jointly created by the Parties shall be jointly owned by the Parties and may be used by the individual Party as may be agreed upon by both Parties from time to time.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/aupdetail.html • The UC Policy on Copyright Ownership: ▇▇▇▇://▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.