XXXX and Mill Levy Funds Sample Clauses

XXXX and Mill Levy Funds 
AutoNDA by SimpleDocs

Related to XXXX and Mill Levy Funds

  • Xxxxxx and Recall An employee in receipt of notice of layoff pursuant to 9.08(A)(a)(ii) may:

  • Global Access Transport Charges (U S. Bridged): Per-minute per-bridge port usage charges, based on availability of service, zone and origination access type. Bridging charges are additional and are priced at Customer's applicable Toll Meet Meet-Me Access rate per minute. Freephone (IFN) Transport Zone A – G. Discounts:

  • Additional Procedures Applicable to High Value Accounts 1. If a Preexisting Individual Account is a High Value Account as of December 31, 2013, the Reporting [FATCA Partner] Financial Institution must complete the enhanced review procedures described in paragraph D of this section with respect to such account by December 31, 2014. If based on this review, such account is identified as a U.S. Reportable Account, the Reporting [FATCA Partner] Financial Institution must report the required information about such account with respect to 2013 and 2014 in the first report on the Account. For all subsequent years, information about the account should be reported on an annual basis.

  • Prohibition Against Selecting and Installing Products Containing Hazardous Materials The Contractor shall not select, install or otherwise incorporate any products or materials containing Hazardous Materials within the boundaries of the Site. Should the Contractor or any Subcontractors have knowledge that, or believe that, an item, component, material, substance, or accessory within a product or assembly selected by the Contractor or any Subcontractor may contain Hazardous Materials it is the Contractor’s responsibility to secure a written certification from the manufacturer of any suspected material which identifies the specific Hazardous Material(s) contained, together with the Material Safety Data Sheets (MSDS) for such materials which shall be submitted to the Owner and Design Professional.

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Agreement with Respect to Leased Data Processing Equipment (a) The Receiver hereby grants to the Assuming Bank an exclusive option for the period of ninety (90) days commencing the day after Bank Closing to accept an assignment from the Receiver of any or all Data Processing Leases to the extent that such Data Processing Leases can be assigned.

  • Earned Value Management System ‌ An earned value management system (EVMS) means a project management tool that effectively integrates the project scope of work with cost, schedule and performance elements for optimum project planning and control. The qualities and operating characteristics of EVMS are described in American National Standards Institute /Electronics Industries Alliance (ANSI/EIA) Standard-748. An EVMS is not mandatory; however, Contractors are encouraged to have an EVMS ANSI/EIA Standard-748 during the entire term of OASIS. The Contractor shall notify the OASIS CO, in writing, if there are any changes in the status of their EVMS and provide the reasons for the change and copies of audits by the Defense Contract Management Agency (DCMA) or other cognizant Government administration office, as applicable. If only part of a Contractor’s organization is EVMS ANSI/EIA Standard-748 certified, the Contractor shall make the distinction between which business units or sites and geographic locations have been certified.

  • Future Treatment of Unallowable Costs Unallowable Costs shall be separately determined and accounted for by Defendants, and Defendants shall not charge such Unallowable Costs directly or indirectly to any contracts with the United States or any State Medicaid program, or seek payment for such Unallowable Costs through any cost report, cost statement, information statement, or payment request submitted by Defendants or any of their subsidiaries or affiliates to the Medicare, Medicaid, TRICARE, or FEHBP Programs.

Time is Money Join Law Insider Premium to draft better contracts faster.