Customs policy Sample Clauses

Customs policy. The counterfeit commodities, commodities containing with plenty of liquid or powder, or equipped with battery, or food or drugs may have certain delivery risks due to customs policies. Superbuy shall not be liable for the customs clearance and any legal liabilities related thereto in case of any consequences arising out of the said risks.
AutoNDA by SimpleDocs
Customs policy. Condition 9: The Government implements a customs valuation system that, in operational terms, adheres strictly to the conditions of the WTO Valuation Agreement (Agreement on Implementation of Article VII of the General Agreement on Tariffs and Trade of 1994) and is based - as a matter of principle - on transaction value and proper application of the methods set out in Articles 1 to 7, in sequence. The implementation of the customs valuation system according to the above rules will entail a progressive development of risk-based post-clearance valuation controls. ANNEX II

Related to Customs policy

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Travel Policy (1) Travel arrangements shall be planned in accordance with the Federal Travel regulations, prescribed by the General Services Administration for travel in the conterminous 48 United States, (hereinafter the FTR) and the Joint Travel Regulation, Volume 2, DoD Civilian Personnel, Appendix A, prescribed by the Department of Defense (hereinafter the JTR).

  • City Policy THE CITY OPPOSES DISCRIMINATION ON THE BASIS OF RACE AND SEX AND URGES ALL OF ITS CONTRACTORS TO PROVIDE A FAIR OPPORTUNITY FOR MINORITIES AND WOMEN TO PARTICIPATE IN THEIR WORK FORCE AND AS SUBCONTRACTORS AND VENDORS UNDER CITY CONTRACTS.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Personnel Policy Employees of the Parties to this Agreement shall be subject to the personnel rules, laws and regulations of their respective agencies, unless they are employed temporarily by another Party to this Agreement and the authority under which such temporary employment is authorized provides that such employees shall be subject to the employing Party’s personnel laws and regulations.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Schedule of Underlying Insurance Policies If Umbrella or Excess policy is evidenced to comply with minimum limits, a copy of the Underlying Schedule from the Umbrella or Excess insurance policy may be required.

  • Alcohol Policy Residents are required to abide by all New York State and New York University regulations regarding the use of alcohol. In residence halls, persons under the age of 21 may not be in the presence of alcohol or alcoholic beverage containers. Students (including residents and non- residential students), and guests who are of legal drinking age (21 years of age or older) may possess and consume alcoholic beverages (referred herein “alcohol”) within NYU residence halls in accordance with the following:

  • Policy Because the volume of human genomic and phenotypic data maintained in these repositories is substantial and, in some instances, potentially sensitive (e.g., data related to the presence or risk of developing particular diseases or conditions and information regarding family relationships or ancestry), data must be shared in a manner consistent with the research participants’ informed consent, and the confidentiality of the data and the privacy of participants must be protected. Access to human genomic data will be provided to research investigators who, along with their institutions, have certified their agreement with the expectations and terms of access detailed below. NIH expects that, through Data Access Request (DAR) process, approved users of controlled-access datasets recognize any restrictions on data use established by the Submitting Institutions through the Institutional Certification, and as stated on the dbGaP study page. Definitions of the underlined terminology in this document are found in section 13. The parties to this Agreement include: the Principal Investigator (PI) requesting access to the genomic study dataset (an “Approved User”), the PI’s home institution (the “Requester”) as represented by the Institutional Signing Official designated through the eRA Commons system, and the NIH. The effective date of this Agreement shall be the DAR Approval Date, as specified in the notification of approval of the Data Access Committee (DAC).

Time is Money Join Law Insider Premium to draft better contracts faster.