Use of Security Procedure to Confirm Instructions Sample Clauses

Use of Security Procedure to Confirm Instructions. When Wells Fargo receives an Instruction in the name of the Undersigned that is not given to Xxxxx Fargo in person by a representative of the Undersigned, Xxxxx Fargo will confirm that the Instruction is authorized by the Undersigned by means of the security procedure set forth in this Agreement.
AutoNDA by SimpleDocs

Related to Use of Security Procedure to Confirm Instructions

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Deadlines for Providing Insurance Documents after Renewal or Upon Request As set forth herein, certain insurance documents must be provided to the OGS Procurement Services contact identified in the Contract Award Notice after renewal or upon request. This requirement means that the Contractor shall provide the applicable insurance document to OGS as soon as possible but in no event later than the following time periods:  For certificates of insurance: 5 business days  For information on self-insurance or self-retention programs: 15 calendar days  For other requested documentation evidencing coverage: 15 calendar days  For additional insured and waiver of subrogation endorsements: 30 calendar days Notwithstanding the foregoing, if the Contractor shall have promptly requested the insurance documents from its broker or insurer and shall have thereafter diligently taken all steps necessary to obtain such documents from its insurer and submit them to OGS, OGS shall extend the time period for a reasonable period under the circumstances, but in no event shall the extension exceed 30 calendar days.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Reliance on Instructions The Custodian shall be entitled to rely upon any Instruction, notice or other instrument in writing received by the Custodian and reasonably believed by the Custodian to be genuine and to be signed by an Authorized Person of the Series. Where the Custodian is issued Instructions orally, the Series acknowledge that if written confirmation is requested, the validity of the transactions or enforceability of the transactions authorized by the Series shall not be affected if such confirmation is not received or is contrary to oral Instructions given. The Custodian shall be fully protected in acting in accordance with all such Instructions and in failing to act in the absence thereof. The Custodian shall be under no duty to question any direction of an Authorized Person with respect to the portion of the account over which such Authorized Person has authority, to review any property held in the account, to make any suggestions with respect to the investment and reinvestment of the Assets in the account, or to evaluate or question the performance of any Authorized Person. The Custodian shall not be responsible or liable for any diminution of value of any Assets held by the Custodian or its subcustodians pursuant to Instructions. In following Instructions, the Custodian shall be fully protected and shall not be liable for the acts or omissions of any person or entity not selected or retained by the Custodian in its sole discretion, including but not limited to, any broker-dealer or other entity designated by the Fund or Authorized Person to hold Assets of the account as collateral or otherwise pursuant to an investment strategy.

  • Suspension or Debarment Instructions Instructions for Certification 1. By answering yes to the next Attribute question below, the vendor and prospective lower tier participant is providing the certification set out herein in accordance with these instructions. 2. The certification in this clause is a material representation of fact upon which reliance was placed when this transaction was entered into. If it is later determined that the prospective lower tier participant knowingly rendered an erroneous certification in addition to other remedies available to the federal government, the department or agency with which this transaction originated may pursue available remedies, including suspension and / or debarment. 3. The prospective lower tier participant shall provide immediate written notice to the person to which this proposal is submitted if at any time the prospective lower tier participant learns that its certification was erroneous when submitted or has become erroneous by reason of changed circumstances. 4. The terms “covered transaction,” “debarred,” “suspended,” “ineligible,” “lower tier covered transaction,” “participants,” “person,” “primary covered transaction,” “principal,” “proposal” and “voluntarily excluded,” as used in this clause, have the meanings set out in the Definitions and Coverage sections of rules implementing Executive Order 12549. You may contact the person to which this proposal is submitted for assistance in obtaining a copy of those regulations. 5. The prospective lower tier participant agrees by submitting this form that, should the proposed covered transaction be entered into, it shall not knowingly enter into any lower tier covered transaction with a person who is debarred, suspended, declared ineligible or voluntarily excluded from participation in this covered transaction, unless authorized by the department or agency with which this transaction originated. 6. The prospective lower tier participant further agrees by submitting this form that it will include this clause titled “Certification Regarding Debarment, Suspension, Ineligibility and Voluntary Exclusion-Lower Tier Covered Transaction” without modification in all lower tier covered transactions and in all solicitations for lower tier covered transactions. 7. A participant in a covered transaction may rely upon a certification of a prospective participant in a lower tier covered transaction that it is not debarred, suspended, ineligible or voluntarily excluded from the covered transaction, unless it knows that the certification is erroneous. A participant may decide the method and frequency by which it determines the eligibility of its principals. Each participant may, but is not required to, check the Nonprocurement List. 8. Nothing contained in the foregoing shall be construed to require establishment of a system of records in order to render in good faith the certification required by this clause. The knowledge and information of a participant is not required to exceed that which is normally possessed by a prudent person in the ordinary course of business dealings. 9. Except for transactions authorized under paragraph 5 of these instructions, if a participant in a covered transaction knowingly enters into a lower tier covered transaction with a person who is suspended, debarred, ineligible or voluntarily excluded from participation in this transaction, in addition to other remedies available to the federal government, the department or agency with which this transaction originated may pursue available remedies, including suspension and / or debarment.

  • Agreement to Governing Law and Jurisdiction Each party agrees to the applicable governing law above without regard to choice or conflicts of law rules, and to the exclusive jurisdiction of the applicable courts above.

  • Limitation of Vendor Indemnification and Similar Clauses This is a requirement of the TIPS Contract and is non-negotiable TIPS, a department of Region 8 Education Service Center, a political subdivision, and local government entity of the State of Texas, is prohibited from indemnifying third-parties (pursuant to the Article 3, Section 52 of the Texas Constitution) except as otherwise specifically provided for by law or as ordered by a court of competent jurisdiction. Article 3, Section 52 of the Texas Constitution states that "no debt shall be created by or on behalf of the State … " and the Texas Attorney General has opined that a contractually imposed obligation of indemnity creates a "debt" in the constitutional sense. Tex. Att'y Gen. Op. No. MW-475 (1982). Thus, contract clauses which require TIPS to indemnify Vendor, pay liquidated damages, pay attorney's fees, waive Vendor's liability, or waive any applicable statute of limitations must be deleted or qualified with ''to the extent permitted by the Constitution and Laws of the State of Texas." Does Vendor agree? Yes, I Agree Alternative Dispute Resolution Limitations This is a requirement of the TIPS Contract and is non-negotiable. TIPS, a department of Region 8 Education Service Center, a political subdivision, and local government entity of the State of Texas, does not agree to binding arbitration as a remedy to dispute and no such provision shall be permitted in this Agreement with TIPS. Vendor agrees that any claim arising out of or related to this Agreement, except those specifically and expressly waived or negotiated within this Agreement, may be subject to non-binding mediation at the request of either party to be conducted by a mutually agreed upon mediator as prerequisite to the filing of any lawsuit arising out of or related to this Agreement. Mediation shall be held in either Camp or Titus County, Texas. Agreements reached in mediation will be subject to the approval by the Region 8 ESC's Board of Directors, authorized signature of the Parties if approved by the Board of Directors, and, once approved by the Board of Directors and properly signed, shall thereafter be enforceable as provided by the laws of the State of Texas. Does Vendor agree? Yes, Vendor agrees Does Vendor agree? Yes, Vendor agrees No Waiver of TIPS Immunity This is a requirement of the TIPS Contract and is non-negotiable. Vendor agrees that nothing in this Agreement shall be construed as a waiver of sovereign or government immunity; nor constitute or be construed as a waiver of any of the privileges, rights, defenses, remedies, or immunities available to Region 8 Education Service Center or its TIPS Department. The failure to enforce, or any delay in the enforcement, of any privileges, rights, defenses, remedies, or immunities available to Region 8 Education Service Center or its TIPS Department under this Agreement or under applicable law shall not constitute a waiver of such privileges, rights, defenses, remedies, or immunities or be considered as a basis for estoppel. 5 Does Vendor agree? Yes, Vendor agrees Payment Terms and Funding Out Clause This is a requirement of the TIPS Contract and is non-negotiable. Vendor agrees that TIPS and TIPS Members shall not be liable for interest or late-payment fees on past-due balances at a rate higher than permitted by the laws or regulations of the jurisdiction of the TIPS Member. Funding-Out Clause: Vendor agrees to abide by the applicable laws and regulations, including but not limited to Texas Local Government Code § 271.903, or any other statutory or regulatory limitation of the jurisdiction of any TIPS Member, which requires that contracts approved by TIPS or a TIPS Member are subject to the budgeting and appropriation of currently available funds by the entity or its governing body. 2

  • CONTRACTOR RESPONSIBILITY PROVISIONS For the purpose of these provisions, the term contractor is defined as any person, including, but not limited to, a bidder, offeror, loan recipient, grantee or lessor, who has furnished or performed or seeks to furnish or perform, goods, supplies, services, leased space, construction or other activity, under a contract, grant, lease, purchase order or reimbursement agreement with the Commonwealth of Pennsylvania (Commonwealth). The term contractor includes a permittee, licensee, or any agency, political subdivision, instrumentality, public authority, or other public entity in the Commonwealth.

  • Notification of Acceptance of General Offer of Privacy Terms Upon execution of Exhibit “E”, General Offer of Privacy Terms, Subscribing LEA shall provide notice of such acceptance in writing and given by personal delivery, or e-mail transmission (if contact information is provided for the specific mode of delivery), or first-class mail, postage prepaid, to the designated representative below. The designated representative for notice of acceptance of the General Offer of Privacy Terms is: Name: Xxxxx Xxxxxxxx Title: Technology Director Contact Information: xxxxx.xxxxxxxx@xxxxxxxxx.x00.xx.xx (000)000-0000 xxx 000

Time is Money Join Law Insider Premium to draft better contracts faster.