Source of the data Sample Clauses

Source of the data. The data of the interested parties may be provided to SegurCaixa Adeslas by the interested parties themsel- ves or the policyholders at any time during the rela- tionship (pre-contractual and contractual) with Segur- Caixa Adeslas for the purposes described in section
AutoNDA by SimpleDocs
Source of the data. Q4.2 Identify the source of the data. • A fully executed sponsored project agreement. • A collaborator with whom there is no funding and/or executed agreement/contract • A commercial entity. • A publicly available source. (Provide link) • A pending award. (Indicate expected start date below) • Controlled access data set (Identify below) • Other (Describe below)
Source of the data. The data of the interested parties may be provid- ed to SegurCaixa Adeslas by the interested parties themselves or the policyholders at any time during the relationship (pre-contractual and contractual) with SegurCaixa Adeslas for the purposes described in section 2. “Purpose of the personal data process- ing”. Also, within the context of the management of the formalised policies and, if required, to deal with losses, personal data may be received from policyhold- ers, insured parties and third parties, including through service provider companies subject to the coverage of the policies (healthcare centres and professionals, ve- hicle repair workshops, domestic repair professionals or companies, experts or other similar professionals). Interested parties shall be responsible for the accura- cy and veracity of the personal data provided to Se- gurCaixa Adeslas, which reserves the right to rectify or delete false or incorrect data, without prejudice to its right to take other relevant legal actions in each case. When the data provided relate to a third par- ty, the interested parties must inform and obtain the consent of the third party concerning the processing described in this text. As we have already indicated, data from public sourc- es from official bodies are also processed, in order to complement the information provided by interested parties during the insurance contracting process. As we have already indicated, data made public by the interested parties may also be processed in order to adopt the measures required to prevent fraudulent conduct relating to insurance. In particular, Segur- Caixa Adeslas may process data obtained from public profiles on social media about the interested parties for this purpose.
Source of the data. The data for the dependent variable comes from a lawsuit filed against the Secretary of State in September of 2016 by the Lawyers’ Committee for Civil Rights Under Law (Lawyers’ Committee), Project Vote, Campaign Legal Center, and the Voting Rights Institute of the Georgetown University School of Law, along with the New York City office of Xxxxxx Xxxxxxx and Xxxx LLP and Atlanta-based firm of Xxxxxx Xxxx LLP, acting as pro xxxx counsel, on behalf of the Georgia State Conference of the NAACP (GA NAACP), Georgia Coalition for the Peoples’ Agenda (GCPA), and Asian Americans Advancing Justice Atlanta. The suit claimed that the exact match system used to verify a voter’s identity against the Social Security Database (SSD) and the Department of Drivers’ Services (DDS) disproportionately affected black, Latino and Asian American applicants. The plaintiffs subpoenaed the data as part of the litigation, and a member of counsel from the Lawyers’ Committee sent it to me after I contacted her requesting it. The data include information on all 646,287 registration applicants that were rejected between July 2013 and July 2016. For reference, during the November 2014 elections there were 6,036,491 registered voters in Georgia, meaning that the number of rejected applicants represents more than 10% of the entire electorate (SOS “Voter Registration Figures”). In the data set, each entry includes the following identifiers: name, address, county, race, gender, year of birth, reason for rejection and date of rejection. Out of the pool of 646,287, the lawsuit focused on the 34,874 applicants who were canceled due to being “Not Verified,” which comprised 5% of the whole set. Based on an interview with a representative from the Secretary of State’s office, “Not Verified” means that the application was entered and sent for verification with DDS, as all paper applications are, and DDS could not match all of the fields from the form with its system, and after the county did not hear from the individual in 40 days, the application was canceled (Xxxxxxx 2017). Further explanation of the verification process proceeds in the next section, as well as explanations on the different reasons for rejection, but it is important to note that as a result of the lawsuit the Secretary of State’s office stopped using the exact match system.3 In other words, the suit was successful in demonstrating that this particular reason and method for verification was affecting minorities disproportionately. ...
Source of the data. All Data in TIS/OBI is provided by the IMs, RUs and terminals. The Data which can be retrieved by the TIS-User for reporting purposes is based on the signed TIS User Agreement and TIS Data Sharing Declarations and assigned to the company the TIS-User is linked to.

Related to Source of the data

  • Data Services In lieu of any other rates or discounts, the Customer will receive a discount of 20% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS1 and DS-3 Access Service.

  • Source of Measure Law No. 20 of 2008 Concerning Micro, Small and Medium Enterprises - Law No. 25 of 1992 Concerning Cooperatives

  • Source of Data A description of (1) the process used to identify claims in the Population, and (2) the specific documentation relied upon by the IRO when performing the Quarterly Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare contractor manual or bulletins (including issue and date), other policies, regulations, or directives).‌‌‌

  • Communications and Computer Lines Tenant may install, maintain, replace, remove or use any communications or computer wires and cables (collectively, the "Lines") at the Project in or serving the Premises, provided that (i) Tenant shall obtain Landlord's prior written consent, use an experienced and qualified contractor reasonably approved by Landlord, and comply with all of the other provisions of Articles 7 and 8 of this Lease, (ii) an acceptable number of spare Lines and space for additional Lines shall be maintained for existing and future occupants of the Project, as determined in Landlord's reasonable opinion, (iii) the Lines therefor (including riser cables) shall be (x) appropriately insulated to prevent excessive electromagnetic fields or radiation, (y) surrounded by a protective conduit reasonably acceptable to Landlord, and (z) identified in accordance with the "Identification Requirements," as that term is set forth hereinbelow, (iv) any new or existing Lines servicing the Premises shall comply with all applicable governmental laws and regulations, (v) as a condition to permitting the installation of new Lines, Tenant shall remove existing Lines located in or serving the Premises and repair any damage in connection with such removal, and (vi) Tenant shall pay all costs in connection therewith. All Lines shall be clearly marked with adhesive plastic labels (or plastic tags attached to such Lines with wire) to show Tenant's name, suite number, telephone number and the name of the person to contact in the case of an emergency (A) every four feet (4') outside the Premises (specifically including, but not limited to, the electrical room risers and other Common Areas), and (B) at the Lines' termination point(s) (collectively, the "Identification Requirements"). Landlord reserves the right to require that Tenant remove any Lines located in or serving the Premises which are installed in violation of these provisions, or which are at any time (1) are in violation of any Applicable Laws, (2) are inconsistent with then-existing industry standards (such as the standards promulgated by the National Fire Protection Association (e.g., such organization's "2002 National Electrical Code")), or (3) otherwise represent a dangerous or potentially dangerous condition.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Information Systems The Official Agency in conjunction with the Authority will meet the relevant requirements of Articles 131 to 136 of Regulation (EU) 2017/625 and Implementing Regulation (EU) 2019/1715 as appropriate to the Official Agency. The Official Agency shall record appropriate data in the Official Agency Premises Inspection database (OAPI), which will be further developed over the life of the contract. Data should be entered into the database on an ongoing basis but shall be entered within one month of the activity taking place, unless otherwise agreed with the Authority.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

Time is Money Join Law Insider Premium to draft better contracts faster.