Communications and Notifications Sample Clauses

Communications and Notifications. 12.1. If you have any questions on anything relating to your electricity supply, or would like to talk to us about your experience with QEnergy, you can contact us by:  phone on 0000 000 000  fax on 0000 000 000  post at XX Xxx 0000 Xxxxx Xxxxxxxx Xxxxxxxxxx 0000; or  email at xxxxxxx@xxxxxxx.xxx.xx If you need the help of an interpreter service, please call 131 450. A copy of this Market Contract will be provided to you in accordance with the law.
AutoNDA by SimpleDocs
Communications and Notifications. Except as agreed otherwise, it shall be understood that a communication or notification to a Party has been completed, as of its receipt by the Information Center of that Party.
Communications and Notifications. Shift inc. may, from time to time, send you relevant information about the App and/or Services or other offerings which may be of interest to you and to them. You consent to receive such communications as part of using the Services. You may “opt-out” of these communications at any time by sending an email to xxxx@xxxxxxx.xx. However, please note that Shift inc. will still send communications that are needed to provide Services to you, such as a response to a password, customer support request, or any notification regarding activities in your account and you cannot opt out of these communications. Shift inc. may give you notice relating to your account or the Services at the email address and/or phone number you provided when registering for your account in the App, or any other notification means through the App, such as alerts and notifications. Notices will be considered received and notified within 12 hours after the e-mail, notification or alert is sent.
Communications and Notifications. In order to maintain the security and confidentiality of the information within the system, no confidential information (as detailed below) is transmitted via e-mail or any other insecure method of communication. Users may receive e-mails to their designated e-mail account containing a link to the information contained within CTO Stream. Users must then log in to CTO Stream to access the information. Security of Data Transmission All data transferred between the user’s device and CTO Stream is encrypted using SSL. The software is hosted in a secure data centre in the United Kingdom. System protection is provided through a combination of physical security at the data centre, network security via firewalls, and security measures within the application itself. Backend access, to either the database or the file system, is only available to authorized system administrators. Data Storage and Backup CTO Stream data is kept for the maximum period required by Laws and Regulations applicable to the Study. Full data back-up and disaster recovery procedures are in place to ensure the safety, security and operation of the system. More information on these procedures is available upon requests directed to CTO. Confidential information within CTO Stream CTO Stream contains two (2) types of information that may be deemed confidential: information specific to the Study and REB information. Study Information includes responses to the questions contained within each application, as well as material such as the protocol, Investigator Brochure (“IB”)/Product Monograph (“PM”), study budget, and written information to be provided to Study participants. REB Information is categorized in the following two ways: Accessible REB Information includes letters issued by the REB (e.g., documenting the results of a review) and communication between the REB and an applicant within CTO Stream. Restricted REB Information includes comments by the REB in the application, meeting minutes and agenda, and any review material uploaded into CTO Stream by the REB of Record. For greater clarity, no Personal Health Information or study participant record is intended to be shared through CTO Stream. Access to confidential information within CTO Stream by user group CTO Study Information is formally provided to CTO when the provincial initial application is submitted for research ethics review. In addition, designated individuals at CTO have access to all confidential information contained within CTO St...
Communications and Notifications. All communications or notifications sent by Gandi in application of Gandi's General Service Conditions shall be sent to You by e- mail, to the e-mail address You entered and declared, that is associated with Your Gandi Hosting Account (designated in Gandi's General Service Conditions and in each of Our Contracts as, “Notification” or “Communication”). You must therefore ensure that the said e-mail address is regularly updated and read. You acknowledge that You are fully responsible, and that Gandi cannot be held responsible for any consequences following Your non-compliance with this obligation, particularly in the event that You fail to receive a Communication or Notification because You have provided an invalid or out-of- date e-mail address. You agree that all Communication or Notifications sent to the said e-mail address shall be reputed to have been successfully sent to You, received, and read by You within five (5) days of being sent. You acknowledge and accept that Our systems are reliable with regards to this. For Your communications and notifications addressed to Gandi, in addition to the information indicated on Our website, You may also use the support contact form that is specifically for this purpose.
Communications and Notifications. In order to maintain the security and confidentiality of the information within the system, no Confidential Information (as detailed below) is transmitted via e-mail or any other insecure method of communication. Users may receive e-mails to their designated e- mail account containing a link to the information contained within CTO Stream. Users must then log in to CTO Stream to access the information. Security of Data Transmission All data transferred between the user’s device and CTO Stream is encrypted using SSL. The software is hosted in a secure data centre in the United Kingdom. System protection is provided through a combination of physical security at the data centre, network security via firewalls, and security measures within the application itself. Backend access, to either the database or the file system, is only available to authorized system administrators. Data Storage and Backup CTO Stream data is kept for the maximum period required by Laws and Regulations applicable to the Clinical Study. Full data back-up and disaster recovery procedures are in place to ensure the safety, security and operation of the system. More information on these procedures is available upon requests directed to CTO. Confidential Information within CTO Stream CTO Stream contains two (2) types of information that may be deemed Confidential Information: information specific to the Clinical Study and REB information. Clinical Study Information includes responses to the questions contained within each application, as well as material such as the protocol, Investigator Brochure (“IB”)/Product Monograph (“PM”), study budget, and written information to be provided to Clinical Study participants. REB Information is categorized in the following two ways: Accessible REB Information includes letters issued by the REB of Record (e.g., documenting the results of a review) and communication between the REB of Record and an applicant within CTO Stream. Restricted REB Information includes comments by the REB of Record in the application, meeting minutes and agenda, and any review material uploaded into CTO Stream by the REB of Record. For greater clarity, no Personal Health Information or study participant record is intended to be shared through CTO Stream. Access to Confidential Information within CTO Stream by user group CTO Clinical Study Information is formally provided to CTO when the provincial initial application is submitted for research ethics review. In addition, designate...
Communications and Notifications. 26.1) Communications by KDDIA to the Customer about the Service including notifications about changes to these Terms of Use will be done by email, facsimile, registered mail, or other methods as deemed appropriate by KDDIA.
AutoNDA by SimpleDocs
Communications and Notifications. 9.1. The Client acknowledges that GFI will notify the Client on issues related to the Agreement or amendments to this Agreement by publishing notifications on the Website, in the Account’s interface or by sending them to the e-mail address of the Client or by mailing them to the post address of the Client that GFI has in the System, or by sending SMS messages to the Client’s mobile telephone number.
Communications and Notifications. 1. The communications or notifications of the Policyholder allowed for in this policy are considered to be valid and fully effective if they are sent by registered mail or by other means by which there is a written record, to the registered office of the Insurer or, in the case of an Insurer with its head office abroad, to the address of its head office or branch, according to the case.
Communications and Notifications. In order to maintain the security and confidentiality of the information within the system, no Confidential Information (as detailed below) is transmitted via e-mail or any other insecure method of communication. Users may receive e-mails to their designated e-mail account containing a link to the information contained within CTO Stream. Users must then log in to CTO Stream to access the information. Security of Data Transmission All data transferred between the user’s device and CTO Stream is encrypted using SSL. The software is hosted in a secure data centre in the United Kingdom. System protection is provided through a combination of physical security at the data centre, network security via firewalls, and security measures within the application itself. Backend access, to either the database or the file system, is only available to authorized system administrators. Data Storage and Backup CTO Stream data is kept for the maximum period required by Laws and Regulations applicable to the Clinical Study. Full data back-up and disaster recovery procedures are in place to ensure the safety, security and operation of the system. More information on these procedures is available upon requests directed to CTO.
Time is Money Join Law Insider Premium to draft better contracts faster.