OBTAINING INFORMATION Clause Samples
OBTAINING INFORMATION. 1. The Committee has the authority to obtain further information from both parties and third parties before taking a decision. It has the authority to summon parties, witnesses and experts to appear in its meeting to provide a further explanation. Such a summon must take place with due regard to a period of fourteen days.
2. Should the parties refuse to provide the requested information or to appear at the meeting, the Committee shall come to the conclusions that it sees fit.
3. The Committee cannot assign a retroactive effect that is longer than up to 1 May of the year prior to the contract period during which the dispute has been made pending regarding its rulings.
OBTAINING INFORMATION. 6.1. The Website, as well as the "Race Regulations," the current versions of which are posted on the Internet on the web page of the relevant Event, are the primary sources of information for the Participant.
6.2. With the help of marketing tools, the NGO "RUN UKRAINE" and/or a person authorized by it can conduct campaigns to research its Participant base, during which it can send electronic and SMS messages to the Participant. If the Participant does not want to receive newsletters from NGO "RUN UKRAINE" and its Partners, they must cancel the corresponding field in the registration form on the Website. Later, the Participant can change their choice on the Website.
OBTAINING INFORMATION. Any costs incurred by You in obtaining information in support of Your claim under this Policy.
OBTAINING INFORMATION. Each Guarantor has established adequate means of obtaining from Borrower on a continuing basis information regarding Borrower’s financial condition.
OBTAINING INFORMATION. The Bank may obtain credit bureau or similar reports in considering applications for accounts or other services as permitted by the Fair Credit Reporting Act.
OBTAINING INFORMATION. The Bank (and its duly authorised representatives or Agents) are also permitted at all reasonable times, to attend any premises where the Seller carries on business to inspect, check, verify and copy all Relevant Documents and where the Returned Goods are located to inspect, check and verify the Returned Goods.
OBTAINING INFORMATION. The setting Out
OBTAINING INFORMATION. If one or more of the parties desires to obtain information from the other in order to prepare for the arbitration hearing, the parties shall attempt in good faith to agree on a plan for such an exchange as may be strictly necessary yet expeditious (e.g., obtaining documents, and the like). Should the parties fail to reach agreement, any party may request that a joint conference be held in person or by telephone with the arbitrators to explain points of agreement and disagreement. The arbitrators shall thereafter promptly determine the scope of and time allowed for any such information exchange as is permitted by such commercial rules, except that in no event shall a party be prohibited against its desires from the following discovery: five (5) depositions of one (1) day each, of which no more than three (3) may be of employees of the other party; two (2) sets of interrogatories comprising a total of thirty-five (35) questions; two
OBTAINING INFORMATION. For guidance on using the Ex- cluded Parties List System, see PGI 209.105–1.
OBTAINING INFORMATION. From the characterization of network traffic anomalies as proposed in [Barford 2002] [Lakhina 2004] [Lakhina 2005], different types of anomalies can affect volume metrics and traffic features, such as IP addresses and ports, in the same manner. This clearly shows that we cannot perform reliable classification based only on these metrics, and further information needs to be identified. For this purpose, we introduce the notion of anomaly attributes. An anomaly attribute is a feature that helps to characterize a specific anomaly (see Table 1). The classification module uses signatures based on attributes derived directly from the packets that compose the anomaly. The detection algorithm retrieves these packets straightforwardly. A detected anomaly is identified by its slot, network address and mask. We also know exactly why it was considered anomalous (i.e. the deltoid for one or more of the volume metrics was above the threshold). Using this information, we then read all packets of the corresponding slot that are destined to that network, so that we can find the responsible destination hosts (i.e. IP address/32). Our idea of responsible destinations is similar to the notion of dominant IP address range and/or port of [Lakhina 2004]. In our algorithm, the set of responsible destinations comprises all the destination hosts that appear in any of the possible combinations of minimum sets that would bring the anomaly's corresponding deltoid below a fraction of the original threshold. After identifying these hosts, we follow an equivalent approach to determine the responsible sources, ports and protocols. This notion could also be applied to any other traffic feature. Potentially, finding the packets (or flows) that compose an anomaly can be performed with any detection algorithm that identifies the starting time and anomalous flows of the anomalies (e.g. [Li 2006] [▇▇▇▇▇▇▇ 2007]).
Table 1. Attributes derived from a given anomaly. p, b and s are for packets, bytes and syn respectively During the anomaly detection and responsible flows identification phases, we compute the attributes shown in Table 1. Attributes found and impactlevel are specific to the detection algorithm we use in this work, but similar attributes should be available for other detection algorithms. The remaining attributes are derived while identifying the responsible flows. This list is by no means exhaustive and can be further extended. These attributes are those we identified as useful up to ...
