Authorized Representatives Each Party shall provide Notice to the other Party of the persons authorized to nominate and/or agree to a schedule or dispatch order for the delivery or acceptance of the Product or make other Notices on behalf of such Party and specify the scope of their individual authority and responsibilities, and may change its designation of such persons from time to time in its sole discretion by providing Notice.
Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.
Landlord’s Authorized Representative Landlord designates Xxx Xxxxx and Xxxx Xxxxx (either such individual acting alone, “Landlord’s Representative”) as the only persons authorized to act for Landlord pursuant to this Work Letter. Tenant shall not be obligated to respond to or act upon any request, approval, inquiry or other Communication from or on behalf of Landlord in connection with this Work Letter unless such Communication is in writing from Landlord’s Representative. Landlord may change either Landlord’s Representative at any time upon not less than 5 business days advance written notice to Tenant. Landlord’s Representative shall be the sole persons authorized to direct Landlord’s contractors in the performance of Landlord’s Work.
Authorized Representative Sourcewell's Authorized Representative is its Chief Procurement Officer. Supplier’s Authorized Representative is the person named in the Supplier’s Proposal. If Supplier’s Authorized Representative changes at any time during this Contract, Supplier must promptly notify Sourcewell in writing.
Protocol No action to coerce or censor or penalize any negotiation participant shall be made or implied by any other member as a result of participation in the negotiation process.
Tenant’s Authorized Representative Tenant designates Xxxxx Xxxxxxx and Xxxxxx Xxxxx (either such individual acting alone, “Tenant’s Representative”) as the only persons authorized to act for Tenant pursuant to this Work Letter. Landlord shall not be obligated to respond to or act upon any request, approval, inquiry or other communication (“Communication”) from or on behalf of Tenant in connection with this Work Letter unless such Communication is in writing from Tenant’s Representative. Tenant may change either Tenant’s Representative at any time upon not less than 5 business days advance written notice to Landlord. Neither Tenant nor Tenant’s Representative shall be authorized to direct Landlord’s contractors in the performance of Landlord’s Work (as hereinafter defined).
Authorized Representations Distributors is not authorized by the Issuer to give any information or to make any representations other than those contained in the appropriate registration statements or Prospectuses and Statements of Additional Information filed with the Securities and Exchange Commission under the 1933 Act (as these registration statements, Prospectuses and Statements of Additional Information may be amended from time to time), or contained in shareholder reports or other material that may be prepared by or on behalf of the Issuer for Distributors' use. This shall not be construed to prevent Distributors from preparing and distributing sales literature or other material as it may deem appropriate.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.
Research Records Each Party shall maintain records of each Research Program (or cause such records to be maintained) in sufficient detail and in good scientific manner as will properly reflect all work done and results achieved by or on behalf of such Party in the performance of such Research Program. All laboratory notebooks shall be maintained for no less than the term of any Patent issuing therefrom. All other records shall be maintained by each Party during the relevant Research Term and for [**] thereafter. All such records of a Party shall be considered such Party’s Confidential Information.
Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.