Screen Fencing of boundaries Sample Clauses

Screen Fencing of boundaries. It is proposed the following fences will be constructed as detailed:
AutoNDA by SimpleDocs

Related to Screen Fencing of boundaries

  • ISP-Bound Traffic 7.3.6.1 The Parties agree that ISP-bound traffic is Interstate traffic and governed by the FCC’s Order on Remand and Report and Order (Intercarrier Compensation for ISP-bound Traffic) CC Docket 01-131 (FCC ISP Order), effective June 14, 2001. However, the Parties agree to exchange ISP-bound traffic utilizing the xxxx and keep compensation mechanism. Xxxx and keep will apply to both end office call termination and tandem switched transport of ISP-bound traffic.

  • Closing of Books The Company will not close its stockholder books or records in any manner which prevents the timely exercise of this Warrant, pursuant to the terms hereof.

  • Communications Relating to Portfolio Securities Subject to the provisions of Section 2.3, the Custodian shall transmit promptly to the Fund for each Portfolio all written information (including, without limitation, pendency of calls and maturities of domestic securities and expirations of rights in connection therewith and notices of exercise of call and put options written by the Fund on behalf of the Portfolio and the maturity of futures contracts purchased or sold by the Portfolio) received by the Custodian from issuers of the securities being held for the Portfolio. With respect to tender or exchange offers, the Custodian shall transmit promptly to the Portfolio all written information received by the Custodian from issuers of the securities whose tender or exchange is sought and from the party (or his agents) making the tender or exchange offer. If the Portfolio desires to take action with respect to any tender offer, exchange offer or any other similar transaction, the Portfolio shall notify the Custodian at least three business days prior to the date on which the Custodian is to take such action.

  • Keeping of Books Keep, and cause each of its Subsidiaries to keep, proper books of record and account, in which full and correct entries shall be made of all financial transactions and the assets and business of the Borrower and each such Subsidiary in accordance with generally accepted accounting principles in effect from time to time.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Recording of Overtime Employees shall record starting and finishing times for overtime worked in a form determined by the Employer.

  • Keeping and Marking of Records and Books (i) The Servicer will (and will cause each Originator to) maintain and implement administrative and operating procedures (including, without limitation, an ability to recreate records evidencing Receivables in the event of the destruction of the originals thereof), and keep and maintain all documents, books, records and other information reasonably necessary or advisable for the collection of all Receivables (including, without limitation, records adequate to permit the immediate identification of each new Receivable and all Collections of and adjustments to each existing Receivable). The Servicer will (and will cause each Originator to) give the Agent notice of any material change in the administrative and operating procedures referred to in the previous sentence.

  • Marking of Records At its expense, the Seller will xxxx its master data processing records evidencing Pool Receivables and related Contracts with a legend evidencing that Receivable Interests related to such Pool Receivables and related Contracts have been sold in accordance with the Agreement.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

Time is Money Join Law Insider Premium to draft better contracts faster.