Subpoenas Directed to TWTC Sample Clauses

Subpoenas Directed to TWTC. Where AT&T is providing resold services to TWTC, or, if applicable under this Agreement, switching, then TWTC agrees that in those cases where TWTC receives subpoenas or court ordered requests regarding targeted telephone numbers belonging to TWTC End Users, and where TWTC does not have the requested information, TWTC will advise the law enforcement agency initiating the request to redirect the subpoena or court ordered request to AT&T for handling in accordance with 4.1 above.
AutoNDA by SimpleDocs
Subpoenas Directed to TWTC. Where BellSouth is providing resold services to TWTC, or, if applicable under this Agreement, switching, then TWTC agrees that in those cases where TWTC receives subpoenas or court ordered requests regarding targeted telephone numbers belonging to TWTC End Users, and where TWTC does not have the requested information, TWTC will advise the law enforcement agency initiating the request to redirect the subpoena or court ordered request to BellSouth for handling in accordance with 4.1 above.

Related to Subpoenas Directed to TWTC

  • Subpoenas Directed to BellSouth Where BellSouth provides resold services or local switching for <<customer_name>>, BellSouth shall respond to subpoenas and court ordered requests delivered directly to BellSouth for the purpose of providing call detail records when the targeted telephone numbers belong to <<customer_name>> end users. Billing for such requests will be generated by BellSouth and directed to the law enforcement agency initiating the request. BellSouth shall maintain such information for <<customer_name>> end users for the same length of time it maintains such information for its own end users.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Return of material containing or pertaining to the Confidential Information 7.1 The Disclosing Party may, at any time, and in its sole discretion request the Receiving Party to return any material and/or data in whatever form containing, pertaining to or relating to Confidential Information disclosed pursuant to the terms of this Agreement and may, in addition request the Receiving Party to furnish a written statement to the effect that, upon such return, the Receiving Party has not retained in its possession, or under its control, either directly or indirectly, any such material and/or data.

  • Disciplinary Information There are no legal or disciplinary events to disclose in response to this item.

  • Right to Grieve Disciplinary Action Employees shall have the right to grieve written censures or warnings, and adverse employee appraisals. Employees shall have the right to rebut in writing any disciplinary notice and that rebuttal will be placed in the employee file, but will not be part of the formal disciplinary record. Should an employee dispute any such entry in his/her file, he/she shall be entitled to recourse through the Grievance Procedure and the eventual resolution thereof shall become part of his/her personal record.

  • Right to Grieve Other Disciplinary Action (a) Disciplinary action grievable by the employee shall include:

  • Contractor Sensitive Information 17.1 The Authority must:

  • Informal Observation Additional evaluation of employees may occur through informal observations by the Employer. It may not be necessary to reduce such evaluations to writing, and a verbal discussion between the Employer and the employee concerning the informal observations may suffice. If a written evaluation is deemed necessary, Procedures C and D as outlined above shall be followed.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Disposition of Confidential Information Upon termination of Agreement or request of City, Contractor shall within forty-eight (48) hours return all Confidential Information which includes all original media. Once Contractor has received written confirmation from City that Confidential Information has been successfully transferred to City, Contractor shall within ten (10) business days purge all Confidential Information from its servers, any hosted environment Contractor has used in performance of this Agreement, work stations that were used to process the data or for production of the data, and any other work files stored by Contractor in whatever medium. Contractor shall provide City with written certification that such purge occurred within five (5) business days of the purge.

Time is Money Join Law Insider Premium to draft better contracts faster.