Visible Reflectance Sample Clauses

Visible Reflectance. Center-of-glazing values, according to NFRC 300.
AutoNDA by SimpleDocs

Related to Visible Reflectance

  • Unbundled Loop Concentration 2.8.5.1 Upon the Effective Date of this Amendment, the Unbundled Loop Concentration (ULC) element will no longer be offered by BellSouth and no new orders for ULC will be accepted. Any existing ULCs that were provisioned prior to the Effective Date of this Amendment will be grandfathered at the rates set forth in the Parties’ interconnection agreement that was in effect immediately prior to this Amendment and may remain connected, maintained and repaired according to BellSouth’s TR73600 until such time as they are disconnected by MyLineToo, or BellSouth provides ninety (90) calendar days notice that such ULC must be terminated.

  • Commingling Assets The assets of your IRA cannot be commingled with other property except in a common trust fund or common investment fund.

  • Agreement Exceptions/Deviations Explanation If the proposing Vendor desires to deviate form the Vendor Agreement language, all such deviations must be listed on this attribute, with complete and detailed conditions and information included. TIPS will consider any deviations in its proposal award decisions, and TIPS reserves the right to accept or reject any proposal based upon any deviations indicated below. In the absence of any deviation entry on this attribute, the proposer assures TIPS of their full compliance with the Vendor Agreement. No response

  • Use of State Property A. Grantee is prohibited from using State Property for any purpose other than performing Services authorized under the Grant Agreement.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • Unbundled Loop Concentration (ULC) System 2.5.1 BellSouth will provide to <<customer_name>> Unbundled Loop Concentration (ULC). Loop concentration systems in the central office concentrate the signals transmitted over local loops onto a digital loop carrier system. The concentration device is placed inside a BellSouth central office. BellSouth will offer ULC with a TR008 interface or a TR303 interface.

  • Sale Area Map The boundaries of “Sale Area” and any subdivision thereof, are as shown on the at- tached “Sale Area Map” that is made a part hereof, and were, before timber sale advertisement, designated on the ground by Forest Service to meet the anticipated needs of the parties. The location of Sale Area and its approximate acreage are stated in A1. Subdivisions may be revised and additional ones may be established only by written agreement. Subdivisions or cutting units may be eliminated from Sale Area under conditions described in B6.36. Catastrophically Damaged areas may be re- moved from Sale Area under B8.32. Where applicable, the following are also identified on Sale Area Map:

  • Site to be free from Encumbrances Subject to the provisions of Clause 10.3, the Site shall be made available by the Authority to the Concessionaire pursuant hereto free from all Encumbrances and occupations and without the Concessionaire being required to make any payment to the Authority on account of any costs, compensation, expenses and charges for the acquisition and use of such Site for the duration of the Concession Period, except insofar as otherwise expressly provided in this Agreement. For the avoidance of doubt, it is agreed that existing rights of way, easements, privileges, liberties and appurtenances to the Licensed Premises shall not be deemed to be Encumbrances. It is further agreed that the Concessionaire accepts and undertakes to bear any and all risks arising out of the inadequacy or physical condition of the Site.

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

  • IDENTITY OF THE PROPERTY 11.1 The Purchaser shall admit the identity of the Property with that described in the Proclamation of Sale and such other documents offered by the Assignee/Bank as the title to the Property by a comparison of the description in the Proclamation of Sale and the aforesaid documents.

Time is Money Join Law Insider Premium to draft better contracts faster.