Resource Use Sample Clauses

Resource Use. All Hosting Plans are subject to general resource and usage monitoring. Any action or process that unreasonably consumes resources degrading the shared environment for other users is subject to review. This includes but is not limited to execution of scripts (PHP, ▇▇▇.▇▇▇, CGI/PERL, FTP, HTTP, database connections and the like). Where a Hosting Plan has data transfer and/or disk space usage limits, and you exceed the allocated limits, you will be charged excess data and/or storage Fees at the rate of $1 per gigabyte (or part thereof) each month.
Resource Use. Resource use is to be limited to the collection of seeds by the Trustee, within ecologically sustainable levels, for revegetation projects and amenity plantings on the Island.
Resource Use. Norway House Cree Nation and Manitoba recognize that aboriginal people, including Norway House Cree Nation, have, at law, priority rights to the harvesting of Fish and wildlife resources within the Norway House Resource Management Area, based on their rights recognized and affirmed by Section 35 of the ▇▇▇▇▇▇▇▇▇▇▇▇ ▇▇▇, ▇▇▇▇. In section 15.1 of the NFA, Manitoba agreed as a matter of policy, subject to certain limitations, to grant to Norway House Cree Nation first priority rights to the wildlife resouces in the Norway House Resource Management Area traditionally available to and used by Norway House Cree Nation as a source of food supply, income-in-kind and income. Norway House Cree Nation and Manitoba recognize that, subject to the rights of aboriginal people, and subject to resource management plans in force, other individuals may, as provided by law, ▇▇▇▇, trap or fish in the Norway House Resource Management Area. Norway House Cree Nation and Manitoba recognize that provisions for conservation, management and protection of Fish and wildlife resources in the Norway House Resource Management Area will be necessary. Actions under this Article, by the Norway House Resource Management Board, Norway House Cree Nation, and Manitoba, shall be consistent with the rights of Norway House Cree Nation, and other aboriginal people, the rights of other individuals, and the need for the conservation, management and protection of Fish and wildlife resources in the Norway House Resource Management Area.
Resource Use. Resources are measured with an agent, which is software that must be installed on your server. If you have a Managed(+) service pack, this will be done by our services and we guarantee its functioning. For Essential+ service packs the client must install this himself on the instruction of ▇▇▇▇▇▇▇ and ▇▇▇▇▇▇▇ cannot offer a guarantee regarding the functioning of this agent. The report of the resource use will be published in your monthly report and concerns the reporting of the advanced monitoring.
Resource Use. Servers are shared with other customers. Customer will make every effort to avoid running CPU intensive CGI scripts, e.g. scripts that have bugs, or do not to close properly after being run. Should such a process occur Customer will make every effort to resolve the error as soon as possible. A number of services are prohibited by the Acceptable Use Policy and must not be run. If Customer processes are adversely affecting server performance disproportionately LiveCode Ltd reserves the right to negotiate additional charges with the Customer and/ or discontinue the offending processes at its sole discretion. Should Customer continue to adversely affect performance of its shared service and LiveCode Ltd are unable to resolve this matter with Customer, LiveCode Ltd may suspend or terminate Customer’s account at its sole discretion.
Resource Use. Fox Lake and Manitoba recognize that: (a) other individuals may, as provided by law, ▇▇▇▇, trap or fish in the Fox Lake Resource Management Area, subject to: (i) the aboriginal and treaty rights of aboriginal peoples recognized and affirmed by section 35 of the Constitution Act, 1982, and (ii) Resource Management Plans in force; (b) the conservation, management and protection of Resources in the Fox Lake Resource Management Area is desirable; and (c) actions under Article 6 by the Fox Lake Resource Management Board, Fox Lake and Manitoba will be consistent with the rights of Fox Lake and other aboriginal peoples, the rights of other individuals, and the desirability of conservation, management and protection of Resources in the Fox Lake Resource Management Area.
Resource Use 

Related to Resource Use

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not ▇▇▇, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • System Use (a) An electronic site access system may be used on site, subject to the requirements of this statement. (b) The system operates via: (i) a facial recognition device; and (ii) an electronic gate. (c) The system will be installed at the access and egress point/s of the site and will only be utilised to identify presence on site. (d) The purpose for which the electronic site access system will be implemented is to ensure: (i) avoiding unauthorised access to site; (ii) confirmation and co-ordination of effort in emergency situations; and (iii) confirmation that all entrants to site have received a site specific induction; (e) The only personal data collected by the system is a site entrant’s: (i) image; (ii) first & last name; (iii) mobile phone number; (iv) email address; and (v) employer’s name. (the Collected Data) (f) The Collected Data will only be held or used for the purposes specified above, unless otherwise by consent or required by law. (g) The Employer will not use the electronic site access control system to verify who was on a site at a particular time for the purpose of: (i) evaluating whether a variation claim regarding labour costs made by a subcontractor can be substantiated; (ii) taking disciplinary action against an Employee, or assisting a subcontractor to take disciplinary action against its own employees, regarding their start and finish times; or (iii) otherwise generally tracking a worker’s movements whilst on the site.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.