Acceptable Security Sample Clauses

Acceptable Security. 10.1.1 The Reservation Party shall provide NGG with Acceptable Security for the PARCA Security Amount on and from the dates specified in accordance with the Phase I PARCA Works Report or as otherwise required under this Agreement.
AutoNDA by SimpleDocs
Acceptable Security. Acceptable security for Bids, performance and payment shall be limited to:
Acceptable Security. The Shareholder shall provide the Company and/or the Segregated Account with security, in a form acceptable to the Company, for the Shareholder’s obligations, as shall be determined from time to time by the Company and the Shareholder (“Acceptable Security”). The Shareholder will also provide a Letter of Credit to be issued on behalf of the Segregated Account, for the benefit of the Insured.
Acceptable Security. Any agreement by the Secretary to accept alternative security under paragraph (d)(3) of this section must contain provisions de- signed to ensure that the insurance of
Acceptable Security. Acceptable security for bids, performance and payment shall be limited to:
Acceptable Security 

Related to Acceptable Security

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • Acceptable Uses a. An Authorized Licensee User runs and uses the Model through the AnyLogic Software (i.e. on a computer where the AnyLogic Software is installed) manually, not via any kind of remote interface. This is an acceptable use regardless whether the Model was developed using the same installation of the AnyLogic Software or not, by the same Authorized Licensee User or not, or by the same Licensee or not. In this case, the Authorized Licensee User is also the End User.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Acceptable credit rating For the purposes of clause 12.1, an acceptable credit rating means that the Retailer or the third party (as the case may be):

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Qualified Property Applicant’s Qualified Property is described in Schedule 2.3, which is incorporated herein by reference. The Parties expressly agree that the location of the Qualified Property shall be within the Reinvestment Zone as set out in Schedule 2.1.

  • Determine Whether a Non-U.S. Entity Is a Financial Institution a) Review information maintained for regulatory or customer relationship purposes (including information collected pursuant to AML/KYC Procedures) to determine whether the information indicates that the Account Holder is a Financial Institution.

  • Determination of Clearing Price The Selling Shareholder and the Placement Agents shall have determined, in writing, the clearing price for the Securities in the Auction.

  • Acceptable Use Agreement I understand that I must use school ICT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the ICT systems and other users. I will, where possible, educate the young people in my care in the safe use of ICT and embed E-Safety in my work with young people including my ‘Prevent’ duty. For my professional and personal safety: • I understand that the school will monitor my use of the ICT systems, email and other digital communications. • I understand that the rules set out in this agreement also apply to use of school ICT systems (e.g. laptops, email, VLE etc.) out of school, and to the transfer of personal data (digital or paper based) out of school • I understand that the school ICT systems are intended for educational use and that I will only use the systems for personal or recreational use within the policies and rules set down by the school. • I will not disclose my username or password to anyone else, nor will I try to use any other person’s username and password. I understand that I should not write down or store a password where it is possible that someone may steal it. • I will immediately report any illegal, inappropriate or harmful material or incident, I become aware of, to the appropriate person.  Will report damaged equipment to the ICT support staff and will not attempt to repair any damage. I will be professional in my communications and actions when using school ICT systems: • I will not access, copy, remove or otherwise alter any other user’s files, without their express permission. • I will ensure that when I take and / or publish images of others I will do so with their permission and in accordance with the school’s policy on the use of digital / video images. If my personal device is used to record images this should be transferred to school systems and deleted from my device as soon as is practicable • I will only use chat and social networking sites in school in accordance with the school’s policies. • I will only communicate with students / pupils and parents / carers using official school systems. • I will not engage in any on-line activity that may compromise my professional responsibilities or be harmful to the reputation of the school. The school and the local authority have the responsibility to provide safe and secure access to technologies and ensure the smooth running of the school: • I will not use personal email addresses when communicating with pupils and parents. • I will not try to upload, download or access any materials which are illegal (including but not restricted to child sexual abuse images, criminally racist material, adult pornography covered by the Obscene Publications Act) or inappropriate or may cause harm or distress to others. I will not try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials. • I will not install or attempt to install programmes of any type on a machine, or store programmes on a computer and understand that all software should be appropriately licenced. • I will not disable or cause any damage to school equipment, or the equipment belonging to others. • Where digital personal data is transferred outside the secure local network, it must be encrypted. • I understand that the GDPR policy requires that any staff or student / pupil data to which I have access, will be kept private and confidential. • I will immediately report any damage or faults and loss of data to an appropriate person. I understand that I am responsible for my actions in and out of the school: • I understand that this Acceptable Use Agreement applies not only to my work and use of school ICT equipment in school, but also applies to my use of school ICT systems and equipment off the premises and my use of personal equipment on the premises or in situations related to my employment by the school • I understand that if I fail to comply with this Acceptable Use Agreement, I could be subject to disciplinary action. I have read and understand the above and agree to use the school ICT systems (both in and out of school) and my own devices (in school and when carrying out communications related to the school) within these guidelines. Staff / Volunteer Name Signed

Time is Money Join Law Insider Premium to draft better contracts faster.