Authority to Match Data Sample Clauses

Authority to Match Data. The Computer Matching and Privacy Protection Act of 1988 (CMPPA), Public Law 100- 503, 102 Stat. 2507 (1988), as amended, was enacted as an amendment to the Privacy Act of 1974 (5 U.S.C. § 552a). The CMPPA applies when computerized comparisons of Privacy Act-protected records contained within a federal agency’s databases and the records of another organization are made in order to determine an individual’s eligibility to receive a federal benefit. The CMPPA requires the parties participating in a matching program to execute a written agreement specifying the terms and conditions under which the matching program will be conducted.
AutoNDA by SimpleDocs
Authority to Match Data. The Computer Matching and Privacy Protection Act of 1988 (CMPPA), Public Law 100- 503, 102 Stat. 2507 (1988), as amended, was enacted as an amendment to the Privacy Act of 1974 (5 U.S.C. § 552a). The CMPPA applies when computerized comparisons of Privacy Act-protected records contained within a federal agency’s databases and the records of another organization are made in order to determine an individual’s eligibility to receive a federal benefit. The CMPPA requires the parties participating in a matching program to execute a written agreement specifying the terms and conditions under which the matching program will be conducted. DHS-USCIS has determined that the status verification checks to be conducted by the CA- DHCS using the SAVE Program is a “matching program” as defined in the CMPPA.

Related to Authority to Match Data

  • Return of Products No Products or part shall be returned to Seller without an approved Return Goods Authorization (“RMA”) from Seller. Custom and special order Products are non-returnable. Returns are subject to a restocking fee.

  • AUDIT OF LICENSED PRODUCT USAGE Contractor shall have the right to periodically audit, no more than annually, at Contractor’s expense, use of licensed Product at any site where a copy of the Product resides provided that: (i) Contractor gives Licensee(s) at least thirty (30) days advance written notice, (ii) such audit is conducted during such party’s normal business hours, (iii) the audit is conducted by an independent auditor chosen on mutual agreement of the parties. Contractor shall recommend a minimum of three (3) auditing/accounting firms from which the Licensee will select one (1). In no case shall the Business Software Alliance (BSA), Software Publishers Association (SPA), Software and Industry Information Association (SIIA) or Federation Against Software Theft (FAST) be used directly or indirectly to conduct audits, or be recommended by Contractor; (iv) Contractor and Licensee are each entitled to designate a representative who shall be entitled to participate, and who shall mutually agree on audit format, and simultaneously review all information obtained by the audit. Such representatives also shall be entitled to copies of all reports, data or information obtained from the audit; and (v) if the audit shows that such party is not in compliance, Licensee shall be required to purchase additional licenses or capacities necessary to bring it into compliance and shall pay for the unlicensed capacity at the NYS Net Price in effect at time of audit, or if none, then at the Contractor’s U.S. Commercial list price. Once such additional licenses or capacities are purchased, Licensee shall be deemed to have been in compliance retroactively, and Licensee shall have no further liability of any kind for the unauthorized use of the software.

  • Reformulation of Products As of the Effective Date, and continuing thereafter, Products that Xxxxx directly manufactures, imports, distributes, sells, or offers for sale in California shall either: (a) be Reformulated Products pursuant to § 2.2, below; or (b) be labeled with a clear and reasonable exposure warning pursuant to §§ 2.3 and 2.4, below. For purposes of this Settlement Agreement, a “Reformulated Product” is a Product that is in compliance with the standard set forth in § 2.2, below. The warning requirement set forth in §§ 2.3 and 2.4 shall not apply to any Reformulated Product.

  • Review of legality and data minimisation (a) The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e).

  • RE-WEIGHING PRODUCT Deliveries are subject to re- weighing at the point of destination by the Authorized User. If shrinkage occurs which exceeds that normally allowable in the trade, the Authorized User shall have the option to require delivery of the difference in quantity or to reduce the payment accordingly. Such option shall be exercised in writing by the Authorized User.

  • Authoritative Root Database To the extent that ICANN is authorized to set policy with regard to an authoritative root server system (the “Authoritative Root Server System”), ICANN shall use commercially reasonable efforts to (a) ensure that the authoritative root will point to the top-­‐level domain nameservers designated by Registry Operator for the TLD, (b) maintain a stable, secure, and authoritative publicly available database of relevant information about the TLD, in accordance with ICANN publicly available policies and procedures, and (c) coordinate the Authoritative Root Server System so that it is operated and maintained in a stable and secure manner; provided, that ICANN shall not be in breach of this Agreement and ICANN shall have no liability in the event that any third party (including any governmental entity or internet service provider) blocks or restricts access to the TLD in any jurisdiction.

  • Encounter Data Party shall provide encounter data to the Agency of Human Services and/or its departments and ensure further that the data and services provided can be linked to and supported by enrollee eligibility files maintained by the State.

  • Other Methods of Procurement of Goods The following table specifies the methods of procurement, other than International Competitive Bidding, which may be used for goods. The Procurement Plan shall specify the circumstances under which such methods may be used: Procurement Method

  • Study An application for leave of absence for professional study must be supported by a written statement indicating what study or research is to be undertaken, or, if applicable, what subjects are to be studied and at what institutions.

  • FINANCIAL IMPLICATIONS There are no budget implications. The applicant will be responsible for all costs, expenses, liabilities and obligations imposed under or incurred in order to satisfy the terms of this proposed development agreement. The administration of the proposed development agreement can be carried out within the approved 2019- 2020 budget and with existing resources.

Time is Money Join Law Insider Premium to draft better contracts faster.