Not a substitute for your records Sample Clauses

Not a substitute for your records. Nothing in this Agreement excuses or relieves you from your responsibility to make and keep the Plan’s records. Nothing in this Agreement allocates or delegates to PCS (or any Affiliate of it) your, an Administrator’s, a Participating Employer’s, or an Affiliated Employer’s responsibility to keep records.
AutoNDA by SimpleDocs

Related to Not a substitute for your records

  • Your records You agree to keep adequate records in accordance with Applicable Regulations to demonstrate the nature of orders submitted and the time at which such orders are submitted.

  • How to Update Your Records You agree to promptly update your registration records if your e-mail address or other information changes. You may update your records, such as your e-mail address, by using the Profile page.

  • RETENTION AND ACCESS REQUIREMENTS FOR RECORDS ADOF shall retain all records pertinent to this agreement for a period of no less than 3 years from the expiration or termination date. As used in this provision, records includes books, documents, accounting procedures and practice, and other data, regardless of the type or format. ADOF shall provide access and the right to examine all records related to this agreement to the U.S. Forest Service Inspector General, or Comptroller General or their authorized representative. The rights of access in this section must not be limited to the required retention period but must last as long as the records are kept. If any litigation, claim, negotiation, audit, or other action involving the records has been started before the end of the 3-year period, the records must be kept until all issues are resolved, or until the end of the regular 3-year period, whichever is later. Records for nonexpendable property acquired in whole or in part, with Federal funds must be retained for 3 years after its final disposition.

  • Reporting Unauthorized Transactions You should notify us immediately if you believe your Access Codes or any Access Devices have been lost or stolen, that someone has gained access to the Security Procedure, or that someone has transferred or may transfer money from your Account without your permission or if you suspect any fraudulent activity on your Account. To notify us, call us at the number provided in Section 9.6 between 8:00 a.m. to 4:30 p.m. Central Time during a Business Day.

  • Customer Records Customer grants to Cisco and its independent accountants the right to examine Xxxxxxxx's books, records and accounts during Customer's normal business hours to verify compliance with this Agreement. In the event such audit discloses non-compliance with this Agreement, Customer shall promptly pay to Cisco the appropriate license fees, plus the reasonable cost of conducting the audit.

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

  • UNAUTHORIZED TRANSFERS To report a lost or stolen Card, PIN, Access Code or any combination thereof, You will call Us at the telephone number shown in this Agreement. You may also report the loss of a Card, PIN, Access Code or any combination thereof, by writing to Us at the address shown in this Agreement. You should also call the number or write to the address listed above if You believe a transfer has been made using the information from Your check without Your permission.

Time is Money Join Law Insider Premium to draft better contracts faster.