Configure Xxxxxxxx and Person Identifiers Sample Clauses

Configure Xxxxxxxx and Person Identifiers. 11.1.1. Contractor Activities
AutoNDA by SimpleDocs
Configure Xxxxxxxx and Person Identifiers. 3. Configure Xxxxxxxx and Person Identifiers to perform as described in Attachment 1, sections Xxxx-0, Xxxx-00, Xxxx-00, Case-17, and Interface-9.

Related to Configure Xxxxxxxx and Person Identifiers

  • Indirect Identifiers Any information that, either alone or in aggregate, would allow a reasonable person to be able to identify a student to a reasonable certainty Information in the Student’s Educational Record Information in the Student’s Email Provider: For purposes of the DPA, the term “Provider” means provider of digital educational software or services, including cloud-based services, for the digital storage, management, and retrieval of pupil records.

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • User ID and Password You will be assigned a personal User ID and a Password that you will use to obtain access to the Online Banking. You authorize us to follow any instructions entered through the Service using your User ID and Password. Because your User ID and Password can be used to access your Accounts and to access information about these Accounts, you should treat your User ID and Password with the same degree of care and secrecy that you use to protect your ATM security code and other sensitive financial data. We may ask you to change your User ID and Password from time to time for security reasons. You agree not to use any language that is abusive, harassing, libelous, defamatory, obscene, or threatening when defining your Password or any other personalization of your Accounts.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD

  • Act Identifier Title Shoulder note Iron Ore (Robe River) Agreement Xxx 0000 First Schedule Iron Ore (Robe River) Agreement Second Schedule First variation agreement Third Schedule Second variation agreement [s. 3B] Fourth Schedule Third variation agreement [s. 2] Fifth Schedule Fourth variation agreement Sixth Schedule Fifth variation agreement

  • Reactive Power and Primary Frequency Response 9.6.1 Power Factor Design Criteria

  • IP Addresses Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by the Licensee to the Distributor. The use of proxy servers by the Licensee or the Participating Institutions is authorized as long as any proxy server IP addresses provided limit remote or off- campus access to the Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to the Distributor on an annual or as- needed basis without the need to amend this Agreement. Alternatively, if the Publisher is utilizing its own and/or third-party system for IP range change notification (such as e.g. IP Registry), then an updated list may be sent via such system instead. The Distributor shall ensure that the Publisher shall use reasonable efforts to cooperate with the Participating Institutions in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement. Both the Licensee and the Distributor will provide cooperation to coordinate or facilitate this process but they will not be liable for correct implementation of such authentication protocols and procedures (which remain the full responsibility of the Publisher and the respective Participating Institution).

  • Vendor Identity and Contact Information It is Vendor’s sole responsibility to ensure that all identifying vendor information (name, EIN, d/b/a’s, etc.) and contact information is updated and current at all times within the TIPS eBid System and the TIPS Vendor Portal. It is Vendor’s sole responsibility to confirm that all e-correspondence issued from xxxx-xxx.xxx, xxxxxxx.xxx, and xxxxxxxxxxxxxxxx.xxx to Vendor’s contacts are received and are not blocked by firewall or other technology security. Failure to permit receipt of correspondence from these domains and failure to keep vendor identity and contact information current at all times during the life of the contract may cause loss of TIPS Sales, accumulating TIPS fees, missed rebid opportunities, lapse of TIPS Contract(s), and unnecessary collection or legal actions against Vendor. It is no defense to any of the foregoing or any breach of this Agreement that Vendor was not receiving TIPS’ electronic communications issued by TIPS to Vendor’s listed contacts.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • LOGOS, AND FLAGS The Supplier cannot use the seal(s), logos, crests, or reproductions of flags or likenesses of Federal agency officials without specific pre-approval.

Time is Money Join Law Insider Premium to draft better contracts faster.