Competitive Ordering Process Sample Clauses

Competitive Ordering Process. 1. Pre solicitation and solicitation: All active IDIQ holders will receive notification of the posting of each proposed TO at the time a proposed TO is posted to the SeaPort Portal. All proposed TOs will incorporate all terms of the IDIQ contract unless otherwise specified in the proposed TO. In addition, the proposed TO will include:
AutoNDA by SimpleDocs
Competitive Ordering Process. 1. Pre solicitation and solicitation: The Government may solicit multiple functional areas in a single DO/TO. All active IDIQ-MAC holders that are able to propose to the functional area(s) on the DO/TO will receive notification via email. The Offeror does not need to be eligible to compete in all functional areas for the DO/TO to be considered for award. Proposals received from IDIQ-MAC holders not eligible to participate in any of the functional area(s) identified in the DO/TO RFP will not be considered. DO/TO’s may be awarded to multiple awardees under one DO/TO solicitation. All DO/TOs will incorporate all terms of the IDIQ-MAC contract unless otherwise specified in the DO/TO. In addition, the DO/TO will include:
Competitive Ordering Process. (1) Pre solicitation and solicitation. All IDIQ holders will receive notification of the posting at the time a proposed Order is posted to the SeaPort portal. All proposed Orders will incorporate all terms of the IDIQ contract unless otherwise specified in the proposed Order. IDIQ holders will be provided a reasonable response period to prepare and submit proposals based on the estimated dollar value and complexity of the proposed Order. If less than 30 days’ response time was allowed and only one offer was received, the Order shall be resolicited per DFARS 215.371-2 except as provided in DFARS 215.371-4 and 215.371-5.
Competitive Ordering Process 

Related to Competitive Ordering Process

  • Protective Order The Settling Defendants cannot, and do not, make any representation that they have, can or will produce such responses to written interrogatories, or a complete set of such responses, and it is understood and agreed that the failure to produce such responses shall not constitute a breach or violation of this Settlement Agreement;

  • Executive Orders This Contract is subject to the provisions of Executive Order No. Three of Governor Xxxxxx X. Xxxxxxx, promulgated June 16, 1971, concerning labor employment practices, Executive Order No. Seventeen of Governor Xxxxxx X. Xxxxxxx, promulgated February 15, 1973, concerning the listing of employment openings and Executive Order No. Sixteen of Governor Xxxx X. Xxxxxxx promulgated August 4, 1999, concerning violence in the workplace, all of which are incorporated into and are made a part of the Contract as if they had been fully set forth in it. The Contract may also be subject to Executive Order No. 14 of Governor M. Xxxx Xxxx, promulgated April 17, 2006, concerning procurement of cleaning products and services, Executive Order No. 61 of Governor Xxxxxx X. Xxxxxx promulgated December 13, 2017 concerning the Policy for the Management of State Information Technology Projects, as issued by the Office of Policy and Management, Policy ID IT-SDLC-17-04, and Executive Order No. 49 of Governor Xxxxxx X. Xxxxxx, promulgated May 22, 2015, mandating disclosure of certain gifts to public employees and contributions to certain candidates for office in accordance with their respective terms and conditions. If Executive Orders 14, 61 or 49 are applicable, it is deemed to be incorporated into and are made a part of the Contract as if it had been fully set forth in it. At the Contractor’s request, the State shall provide a copy of these orders to the Contractor.

  • Executive Order No 13224. Neither any Borrower nor any Affiliate of any Borrower or their respective agents acting or benefiting in any capacity in connection with the Advances or other transactions hereunder, is any of the following (each a “Blocked Person”):

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust has determined that the Procedures, as part of the Trust’s overall anti-money laundering program and the Red Flag Identity Theft Prevention program, are reasonably designed to prevent the Fund from being used for money laundering or the financing of terrorist activities and to achieve compliance with the applicable provisions of the Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust:

  • Pre-Ordering In accordance with FCC and Commission rules and orders, BellSouth will provide electronic access to the following pre-ordering functions: service address validation, telephone number selection, service and feature availability, due date information and customer record information. Access is provided through the Local Exchange Navigation System (LENS) interface and the Telecommunications Access Gateway (TAG) interface. Customer record information includes customer specific information in XXXX and RSAG. TelSouth shall provide to BellSouth access to customer record information, including circuit numbers associated with each telephone number where applicable. TelSouth shall Version R1Q03; 03/04/03 provide such information within four (4) hours after request via electronic access where available. If electronic access is not available, TelSouth shall provide to BellSouth paper copies of customer record information, including circuit numbers associated with each telephone number where applicable. If BellSouth requests the information before noon, the customer record information shall be provided the same day. If BellSouth requests the information after noon, the customer record information shall be provided by noon the following day.

  • Anti-Terrorism The Contractor agrees to undertake all reasonable efforts to ensure that none of the UNDP funds received under the Contract is used to provide support to individuals or entities associated with terrorism and that recipients of any amounts provided by UNDP hereunder do not appear on the list maintained by the Security Council Committee established pursuant to Resolution 1267 (1999). The list can be accessed via xxxxx://xxx.xx.xxx/sc/suborg/en/sanctions/1267/aq_sanctions_list. This provision must be included in all sub-contracts or sub-agreements entered into under the Contract.

  • Anti-Money Laundering Program The Distributor represents and warrants that it (a) has adopted an anti-money laundering compliance program ("AML Program") that satisfies the requirements of all applicable laws and regulations; and (b) will notify the Trust promptly if an inspection by the appropriate regulatory authorities of its AML Program identifies any material deficiency, and will promptly remedy any material deficiency of which it learns.

  • Anti-Piracy In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditional Access System and Subscriber Management System as set out in ANNEXURE X attached herewith. If so instructed by Information (as defined below) by ZEEL, the IPTV Operator shall shut off or de-authorize the transmission to any unauthorized subscriber/ subscriber indulging in piracy, within ten minutes from the time it receives such instruction from ZEEL. Any communication under this Clause shall be considered as valid Information only if (i) the information is sent through e-mail in a format as mutually agreed by the parties and (ii) the information is sent by a person(s) who is designated to send such information. However, the “information” may even be provided by ZEEL representatives through other means of communications such as telephonic message, fax etc. and the said “information” shall later be confirmed by ZEEL through e-mail and the IPTV Operator shall be under obligation to act upon such information.

  • OFAC; Sanctions; Anti-Corruption Laws; Anti-Money Laundering Laws No Loan Party or any of its Subsidiaries is in violation of any Sanctions. No Loan Party nor any of its Subsidiaries nor, to the knowledge of such Loan Party, any director, officer, employee, agent or Affiliate of such Loan Party or such Subsidiary (a) is a Sanctioned Person or a Sanctioned Entity, (b) has any assets located in Sanctioned Entities, or (c) derives revenues from investments in, or transactions with Sanctioned Persons or Sanctioned Entities. Each of the Loan Parties and its Subsidiaries has implemented and maintains in effect policies and procedures designed to ensure compliance with all Sanctions, Anti-Corruption Laws and Anti-Money Laundering Laws. Each of the Loan Parties and its Subsidiaries, and to the knowledge of each such Loan Party, each director, officer, employee, agent and Affiliate of each such Loan Party and each such Subsidiary, is in compliance with all Sanctions, Anti-Corruption Laws and Anti-Money Laundering Laws. No proceeds of any Loan made or Letter of Credit issued hereunder will be used to fund any operations in, finance any investments or activities in, or make any payments to, a Sanctioned Person or a Sanctioned Entity, or otherwise used in any manner that would result in a violation of any Sanction, Anti-Corruption Law or Anti-Money Laundering Law by any Person (including any Lender, Bank Product Provider, or other individual or entity participating in any transaction).

  • Anti-Money Laundering Compliance Programs Soliciting Dealer represents to the Dealer Manager and to the Company that it has established and implemented anti-money laundering compliance programs in accordance with applicable law, including applicable FINRA Conduct Rules, the Exchange Act Rules and Regulations and the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, as amended (the “USA PATRIOT Act”), specifically including, but not limited to, Section 352 of the International Money Laundering Abatement and Anti-Terrorist Financing Act of 2001 (the “Money Laundering Abatement Act,” and together with the USA PATRIOT Act, the “AML Rules”) reasonably expected to detect and cause the reporting of suspicious transactions in connection with the offering and sale of the Shares. Soliciting Dealer further represents that it currently is in compliance with all AML Rules, specifically including, but not limited to, the Customer Identification Program requirements under Section 326 of the Money Laundering Abatement Act, and Soliciting Dealer hereby covenants to remain in compliance with such requirements and shall, upon request by the Dealer Manager or the Company, provide a certification to the Dealer Manager or the Company that, as of the date of such certification (a) its AML Program is consistent with the AML Rules, and (b) it is currently in compliance with all AML Rules, specifically including, but not limited to, the Customer Identification Program requirements under Section 326 of the Money Laundering Abatement Act. Upon request by the Dealer Manager at any time, Soliciting Dealer will (i) furnish a written copy of its AML Program to the Dealer Manager for review, and (ii) furnish a copy of the findings and any remedial actions taken in connection with its most recent independent testing of its AML Program.

Time is Money Join Law Insider Premium to draft better contracts faster.