Information Transferred Upon Disposal of Fort Monmouth Historic Property Sample Clauses

Information Transferred Upon Disposal of Fort Monmouth Historic Property. In disposing of real property and improvements that contain the Select Historic Properties, the Army's bid solicitation will contain the following information:
AutoNDA by SimpleDocs

Related to Information Transferred Upon Disposal of Fort Monmouth Historic Property

  • Dienste Und Materialien Von Drittanbietern (a) Die Apple-Software gewährt möglicherweise Zugang zu(m) iTunes Store, App Store, Apple Books, Game Center, iCloud, Karten von Apple und zu anderen Diensten und Websites von Apple und Drittanbietern (gemeinsam und einzeln als „Dienste“ bezeichnet). Solche Dienste sind möglicherweise nicht in xxxxx Sprachen oder in xxxxx Ländern verfügbar. Die Nutzung dieser Dienste erfordert Internetzugriff und die Nutzung bestimmter Dienste erfordert möglicherweise eine Apple-ID, setzt möglicherweise dein Einverständnis mit zusätzlichen Servicebedingungen voraus und unterliegt unter Umständen zusätzlichen Gebühren. Indem du diese Software zusammen mit einer Apple-ID oder einem anderen Apple-Dienst verwendest, erklärst du dein Einverständnis mit den anwendbaren Servicebedingungen für diesen Dienst, z. B. den neuesten Apple Media Services-Bedingungen für das Land, in dem du auf diese Services zugreifst, die du über die Webseite xxxxx://xxx.xxxxx.xxx/legal/ internet-services/itunes/ anzeigen und nachlesen kannst

  • Acquisition of Property The Contractor shall document that all property was acquired consistent with its engineering, production planning, and property control operations.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • Application of Miscellaneous Proceeds upon Condemnation, Destruction, or Loss in Value of the Property In the event of a total taking, destruction, or loss in value of the Property, all of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument, whether or not then due, with the excess, if any, paid to Borrower. In the event of a partial taking, destruction, or loss in value of the Property (each, a “Partial Devaluation”) where the fair market value of the Property immediately before the Partial Devaluation is equal to or greater than the amount of the sums secured by this Security Instrument immediately before the Partial Devaluation, a percentage of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument unless Borrower and Lender otherwise agree in writing. The amount of the Miscellaneous Proceeds that will be so applied is determined by multiplying the total amount of the Miscellaneous Proceeds by a percentage calculated by taking (i) the total amount of the sums secured immediately before the Partial Devaluation, and dividing it by (ii) the fair market value of the Property immediately before the Partial Devaluation. Any balance of the Miscellaneous Proceeds will be paid to Borrower. In the event of a Partial Devaluation where the fair market value of the Property immediately before the Partial Devaluation is less than the amount of the sums secured immediately before the Partial Devaluation, all of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument, whether or not the sums are then due, unless Borrower and Lender otherwise agree in writing.

  • Transfer Upon Realization of Pledged, Mortgaged or Charged Escrow Securities (1) You may transfer within escrow to a financial institution the escrow securities you have pledged, mortgaged or charged under section 4.2 to that financial institution as collateral for a loan on realization of the loan.

  • LOCATION WITHIN ENTERPRISE OR REINVESTMENT ZONE At the time of the Application Approval Date, the Land is within an area designated either as an enterprise zone, pursuant to Chapter 2303 of the TEXAS GOVERNMENT CODE, or a reinvestment zone, pursuant to Chapter 311 or 312 of the TEXAS TAX CODE. The legal description, and information concerning the designation, of such zone is attached to this Agreement as EXHIBIT 1 and is incorporated herein by reference for all purposes.

  • Sale or License of Custom Products Involving Tax Exempt Financing (i.e., Certificates of Participation - COPS) The Authorized User’s sale or other transfer of Custom Products which were acquired by the Authorized User using third party, tax-exempt financing may not occur until such Custom Products are, or become, useable. In the event that the Contractor wishes to obtain ownership rights to Custom Product(s), the sale or other transfer shall be at fair market value determined at the time of such sale or other transfer, and must be pursuant to a separate written agreement in a form acceptable to the Authorized User which complies with the terms of this paragraph.

  • Creative Commons Attribution-Non-Commercial-NoDerivs License The Creative Commons Attribution Non-Commercial-NoDerivs License (CC-BY-NC-ND) permits use, distribution and reproduction in any medium, provided the original work is properly cited, is not used for commercial purposes and no modifications or adaptations are made. (see below) Use by commercial "for-profit" organizations Use of Wiley Open Access articles for commercial, promotional, or marketing purposes requires further explicit permission from Wiley and will be subject to a fee. Further details can be found on Wiley Online Library xxxx://xxxxxxx.xxxxx.xxx/WileyCDA/Section/id-410895.html Other Terms and Conditions:

  • Data Disposition When the contracted work has been completed or when the Data is no longer needed, except as noted above in Section 5.b, Data shall be returned to DSHS or destroyed. Media on which Data may be stored and associated acceptable methods of destruction are as follows: Data stored on: Will be destroyed by: Server or workstation hard disks, or Removable media (e.g. floppies, USB flash drives, portable hard disks) excluding optical discs Using a “wipe” utility which will overwrite the Data at least three (3) times using either random or single character data, or Degaussing sufficiently to ensure that the Data cannot be reconstructed, or Physically destroying the disk Paper documents with sensitive or Confidential Information Recycling through a contracted firm, provided the contract with the recycler assures that the confidentiality of Data will be protected. Paper documents containing Confidential Information requiring special handling (e.g. protected health information) On-site shredding, pulping, or incineration Optical discs (e.g. CDs or DVDs) Incineration, shredding, or completely defacing the readable surface with a coarse abrasive Magnetic tape Degaussing, incinerating or crosscut shredding

Time is Money Join Law Insider Premium to draft better contracts faster.