Sample provision GCC 16 Sample Clauses

Sample provision GCC 16. 1—The method and conditions of payment to be made to the Supplier under this Contract shall be as follows: A.
AutoNDA by SimpleDocs
Sample provision GCC 16. 1—The method and conditions of payment to be made to the Supplier under this Contract shall be as follows: A. Payment of local currency portion of a foreign Supplier shall be made in Kenya shillings within thirty (30) days of presentation of claim supported by a certificate from the Procuring Entity declaring that the Goods have been delivered and that all other contracted Services have been performed. B. Payment for Goods and Services supplied from within Kenya: Payment for Goods and Services supplied from within Kenya shall be made in [Kenya Shilling], as follows: (i)
Sample provision GCC 16. 1—The method and conditions of payment to be made to the Supplier under this Contract shall be as follows: A. Payment for Goods supplied from abroad: Payment of foreign currency portion shall be made in _KES [insert currency of the Contract Price] in the following manner: (i) Advance Payment: NOT APPLICABLE (ii)
Sample provision GCC 16. 1—The method and conditions of payment to be made to the Supplier under this Contract shall be as follows: Payment for Goods supplied from abroad: Payment of foreign currency portion shall be made in ( ) [currency of the Contract Price] in the following manner: (i) Advance Payment: Twenty (20) percent of the Contract Price shall be paid within sixty (60) days of signing of the Contract, and upon submission of claim and a bank guarantee for equivalent amount valid until the Goods are delivered and in the form provided in the bidding documents or another form acceptable to the Procuring Entity. (iii)

Related to Sample provision GCC 16

  • Provision for Local Switching 4.2.12.1 BellSouth shall perform routine testing (e.g., Mechanized Loop Tests (MLT) and test calls such as 105, 107 and 108 type calls) and fault isolation on a mutually agreed upon schedule.

  • Leave Provisions Clause No. Title

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • EXPENSE PROVISION Until this agreement shall be amended or terminated pursuant to Section 2 or Section 5 hereof, the Manager agrees, with respect to Class Z6, to pay or provide for the payment of any fee or expense allocated at the class level and attributable to Class Z6 and waive a portion of the management fee payable by such class, such that the ordinary operating expenses incurred by Class Z6 in any fiscal year (excluding (i) taxes; (ii) the fees and expenses of all Trustees of the Trust who are not “interested persons” of the Trust or of the Adviser; (iii) interest expenses with respect to borrowings by the Fund; (iv) Rule 12b-1 fees, if any; (v) expenses of printing and mailing proxy materials to shareholders of the Fund; (vi) all other expenses incidental to holding meetings of the Fund’s shareholders, including proxy solicitations therefor; and (vii) such non-recurring and/or extraordinary expenses as may arise, including actions, suits or proceedings to which the Fund is or is threatened to be a party and the legal obligation that the Fund may have to indemnify the Trust’s Trustees and officers with respect thereto) as well as non-operating expenses such as brokerage commissions and fees and expenses associated with the Fund’s securities lending program, if applicable, will not exceed the annual rate set forth in Schedule A of the average daily net assets of the class (computed in the manner set forth in the Trust’s Trust Instrument) throughout the month. For avoidance of doubt, it is understood that this agreement shall not apply to any other class other than Class Z6 of the Fund.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Provision of Multiple Services If the Sub-Advisor shall have provided both investment advisory services under subparagraph (a) and investment management services under subparagraph (b) of paragraph (1) for the same portion of the investments of the Portfolio for the same period, the fees paid to the Sub-Advisor with respect to such investments shall be calculated exclusively under subparagraph (b) of this paragraph 4.

  • OPERATIVE PROVISIONS 1. In this Agreement words and expressions which are defined in the General Conditions of Contract shall have the same meanings as are respectively assigned to them in the General Conditions of Contract.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Overtime Provisions (a) Time worked as an extension to the regular scheduled shift or time worked in a bi-weekly pay period that is in excess of seventy-five (75) hours shall be compensated at a rate of one and one-half times (1½ x) the Nurse’s regular hourly rate for the overtime worked. A Nurse who works in excess of four (4) hours overtime in any one day shall be compensated at a rate of two times (2 x) the Nurse’s regular hourly rate for the overtime worked.

Time is Money Join Law Insider Premium to draft better contracts faster.