Pre-Operations Identification and Undergrounding Sample Clauses

Pre-Operations Identification and Undergrounding. (A) Before any construction, repairs or maintenance of the Swimming Pool, Grantee must contact the appropriate “one call system” such as Underground Service Alert, or other system for notification of intended excavation activities established pursuant to applicable federal, state or local laws or regulations, and Grantor’s Facility Inspector at City of Bellflower Department of Public Works to determine if Xxxxxxx’s Operations will cross or otherwise impact existing underground facilities owned by Grantor, Grantor’s affiliates or third parties.
AutoNDA by SimpleDocs

Related to Pre-Operations Identification and Undergrounding

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Contractor’s Staff Identification Contractor shall provide, at Contractor’s expense, all staff providing services under this Contract with a photo identification badge.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Identification Badges Identification badges will be supplied by Advanced Behavioral Health (ABH) to all credentialed individuals who are providing services to children. Badges must be presented to the child/youth and any present adults at the time of service and must be worn for the duration of the service. Badges will be updated every two years during the re- credentialing process. Any individual or agency who fails to submit a photo ID to ABH within the designated timeframe will have their credentialing status terminated.

  • User Identification 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Promotion and Protection of Investment (1) Each Contracting Party shall encourage and create favourable conditions for investors of the other Contracting Party to make investments in its territory, and admit such investments in accordance with its laws and policy.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Promotion and Protection of Investments 1. Each Contracting Party shall encourage and create favourable conditions for investors of the other Contracting Party to make investments in its territory and shall admit such investments in accordance with its laws and regulations.

Time is Money Join Law Insider Premium to draft better contracts faster.