Wherever the Company proposes to Sample Clauses

Wherever the Company proposes to effect a technological change which is likely to affect the terms and conditions or security of employment of 10% or more, or ten per Operator Services office, whichever is the lesser, of the employees within the bargaining unit at the location affected by technological change, it shall give notice of the technological change to the Union Repr esentative(s) for that location and the National Union at least 120 days prior to the date on which the technological change is to be effected. Such notice shall be in writing and shall state:
AutoNDA by SimpleDocs

Related to Wherever the Company proposes to

  • Consent to Emails and Automated Text Messages By participating as a User, you represent that you are the owner of the email address, mobile phone number, and/or other alias you enrolled, or that you have the delegated legal authority to act on behalf of the owner of such email address, mobile phone number and/or other alias to send or receive money as described in this Agreement. You consent to the receipt of emails or text messages from us, from Zelle, from other Users that are sending you money or requesting money from you, and from other Network Banks or their agents regarding the Services or related transfers between Network Banks and you. You agree that we may, Zelle may or either of our agents may use automatic telephone dialing systems in connection with text messages sent to any mobile phone number you enroll. You further acknowledge and agree:

  • CENTURYLINK OSS INFORMATION 57.1 Subject to the provisions of this Agreement and Applicable Law, CLEC shall have a limited, revocable, non-transferable, non-exclusive right to use CenturyLink OSS Information during the term of this Agreement, for CLEC’s internal use for the provision of Telecommunications Services to CLEC End Users in the State.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • Einwilligung Zur Verwendung Von Daten A. Analysedaten. Wenn du dich entscheidest, die Sammlung von Analysedaten zuzulassen, erklärst du dein Einverständnis damit, dass Apple, seine Tochtergesellschaften und Auftragnehmer Diagnosedaten sowie technische, nutzungsrelevante und zugehörige Informationen, einschließlich insbesondere eindeutige System- oder Hardwarekennungen, Informationen über deinen Computer, deine Systemsoftware und Softwareprogramme sowie deine Peripheriegeräte sammeln, verwalten, verarbeiten und verwenden dürfen. Diese Informationen werden regelmäßig gesammelt, um Produkte und Dienste von Apple bereitzustellen und zu verbessern, die Bereitstellung von Softwareaktualisierungen, Produktsupport und anderen Diensten für dich (sofern vorhanden) in Verbindung mit der Apple-Software zu vereinfachen und um die Einhaltung der Bestimmungen dieses Lizenzvertrags zu überprüfen. Du kannst deine Einstellungen für die Analyse jederzeit ändern, indem du auf deinem Computer zur Einstellung „Analyse“ navigierst und das Markierungsfeld deaktivierst. Die Einstellung „Analyse“ befindet sich in der Systemeinstellung „Sicherheit“ im Bereich „Privatsphäre“. Apple ist berechtigt, diese Informationen zu nutzen, sofern diese für die oben beschriebenen Zwecke in einer Form gesammelt werden, die keinerlei Rückschlüsse auf deine Person zulässt. Damit Partner und Fremdentwickler von Apple die Möglichkeit erhalten, ihre für die Nutzung mit Apple-Produkten ausgelegte(n) Software, Hardware und Dienste zu optimieren, stellt Apple solchen Partnern oder Fremdentwicklern möglicherweise einen Teil seiner Diagnoseinformationen bereit, der für die Software, Hardware und/oder Dienste dieses Partners oder Entwicklers relevant ist, vorausgesetzt, diese Informationen werden in einer Form verwendet, die keinerlei Rückschlüsse auf deine Person zulässt.

  • Datenschutzrichtlinie Ihre Informationen werden jederzeit gemäß der Apple Datenschutzrichtlinie behandelt, die durch Verweis in diese Lizenz integriert wird und unter folgender Adresse verfügbar ist: xxxx://xxx.xxxxx.xxx/de/privacy/.

  • Information Sharing (a) HHSC will provide the MA Dual SNP with resources regarding the LTSS covered by Medicaid in accordance with this section.

  • LICENSE HOLDER CONTACT INFORMATION This noƟce is being provided for informaƟon purposes. It does not create an obligaƟon for you to use the broker’s services. Please acknowledge receipt of this noƟce below and retain a copy for your records. Davidson Bogel Real Estate, LLC 9004427 xxxx@xx0xx.xxx 214-526-3626 Licensed Broker /Broker Firm Name or Primary Assumed Business Name License No. Email Phone Xxxxxxx Xxxxxx Xxxxx XX 598526 xxxxxx@xx0xx.xxx 214-526-3626 Designated Broker of Firm License No. Email Phone Xxxxxxxxxxx Xxxx Xxxxxx 672133 xxxxxxx@xx0xx.xxx 214-526-3626 Licensed Supervisor of Sales Agent/ Associate License No. Email Phone N/A N/A N/A N/A Sales Agent/Associate’s Name License No. Email Phone Buyer/Tenant/Seller/Landlord Initials Date Regulated by the Texas Real Estate Commission InformaƟon available at xxx.xxxx.xxxxx.xxx

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

  • Anerkennung der Rechte Dritter A. Apple stellt möglicherweise bestimmte Komponenten der Apple-Software und in der Apple-Software enthaltene Open-Source-Programme von Drittanbietern auf seiner Open-Source-Website (https:// xxxxxxxxxx.xxxxx.xxx) („Open-Source-Komponenten“) zur Verfügung. Die Anerkennungen, Lizenzbestimmungen und Schadensersatzregelungen für diese Komponenten sind in der elektronischen Dokumentation für die Apple-Software enthalten. Ziehe bitte die elektronische Dokumentation zurate, da dir möglicherweise zusätzliche Rechte an den Open-Source-Komponenten der Apple-Software zustehen. Du erklärst dich ausdrücklich damit einverstanden, dass im Falle eines aus der Änderung der Open-Source-Komponenten der Apple-Software resultierenden Ausfalls oder Schadens der Apple- Hardware dieser Ausfall oder Schaden von den Bestimmungen der Apple-Hardwaregarantie ausgeschlossen wird.

  • Further Assurances and Corrective Instruments Issuer and Company agree that they will, from time to time, execute, acknowledge and deliver, or cause to be executed, acknowledged and delivered, such supplements hereto and such further instruments as may reasonably be required for carrying out the intention of or facilitating the performance of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.