Counterfeit Electronics Monitoring and Avoidance Sample Clauses

Counterfeit Electronics Monitoring and Avoidance. The Contractor shall implement the following Counterfeit Electronics Monitoring and Avoidance practices:  252.246-7007 Contractor Counterfeit Electronic Part Detection and Avoidance System
AutoNDA by SimpleDocs

Related to Counterfeit Electronics Monitoring and Avoidance

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Program Monitoring and Evaluation (c) The Recipient shall prepare, or cause to be prepared, and furnish to the Association not later than six months after the Closing Date, a report of such scope and in such detail as the Association shall reasonably request, on the execution of the Program, the performance by the Recipient and the Association of their respective obligations under the Legal Agreements and the accomplishment of the purposes of the Financing.”

  • Musculoskeletal Injury Prevention and Control (a) The Hospital in consultation with the Joint Health and Safety Committee (JHSC) shall develop, establish and put into effect, musculoskeletal prevention and control measures, procedures, practices and training for the health and safety of employees.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • International Olympic Committee; International Red Cross and Red Crescent Movement As instructed from time to time by ICANN, the names (including their IDN variants, where applicable) relating to the International Olympic Committee, International Red Cross and Red Crescent Movement listed at xxxx://xxx.xxxxx.xxx/en/resources/registries/reserved shall be withheld from registration or allocated to Registry Operator at the second level within the TLD. Additional International Olympic Committee, International Red Cross and Red Crescent Movement names (including their IDN variants) may be added to the list upon ten (10) calendar days notice from ICANN to Registry Operator. Such names may not be activated in the DNS, and may not be released for registration to any person or entity other than Registry Operator. Upon conclusion of Registry Operator’s designation as operator of the registry for the TLD, all such names withheld from registration or allocated to Registry Operator shall be transferred as specified by ICANN. Registry Operator may self-­‐allocate and renew such names without use of an ICANN accredited registrar, which will not be considered Transactions for purposes of Section 6.1 of the Agreement.

  • Safeguards Monitoring and Reporting 8. The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • International ACH Transactions You understand that in the event an International ACH Transaction (“IAT”) Entry that is transmitted to or from any of your accounts is identified and designated by the Credit Union’s screening criteria for review and examination under the OFAC Rules and Regulations (“OFAC Rules”). The settlement of such an IAT Entry may be delayed or suspended pending the Credit Union’s review of the IAT Entry, and may be terminated under applicable OFAC Rules. You acknowledge that we may be required to place an indefinite hold on the funds covered by the IAT Entry if the IAT Entry is required to be terminated under the OFAC Rules. You agree that any delay described above will be a permissible delay under the regulations applicable to the availability of funds held in deposit accounts. In the event an IAT Entry is delayed or terminated, we will provide you such notice as may be required by applicable laws and regulations.

  • Monitoring Arrangements 8.1 We will formally monitor the progress of the access agreement at least once a year through the Executive Group who report biannually to the Steering Group. Initial monitoring will be concerned with participation rates and the development of data on lower income and other under-represented groups, against which to monitor. When specific baselines, targets, and milestones are determined we will look to monitor against these.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

Time is Money Join Law Insider Premium to draft better contracts faster.