客戶如需維修手機請往 Apple 授權維修中心 Sample Clauses

客戶如需維修手機請往 Apple 授權維修中心. Customers shall visit Apple authorised service centres for iPhone or iPad repair service.
AutoNDA by SimpleDocs

Related to 客戶如需維修手機請往 Apple 授權維修中心

  • Regulatory Filing In the event that this Interconnection Construction Service Agreement contains any terms that deviate materially from the form included in Attachment P or from the standard terms and conditions in this Appendix 2, the Transmission Provider shall file the executed Interconnection Construction Service Agreement on behalf of itself and the Interconnected Transmission Owner with FERC as a service schedule under the Tariff. Interconnection Customer may request that any information so provided be subject to the confidentiality provisions of Section 17 of this Appendix

  • Regulatory Matters The parties will negotiate in good faith to resolve regulatory criticisms or concerns expressed by the Office of the Comptroller of the Currency or other U.S. federal or state banking Regulators that can reasonably be addressed through a modification of the Agreement or adoption of mutually agreeable policies or procedures to prevent or resolve a Material Default described by clause (iii) of such definition, subject to applicable legal requirements including restrictions on disclosing confidential supervisory information.

  • BACKGROUND INVESTIGATION The BOARD is prohibited from knowingly employing a person who has been convicted of committing or attempting to commit certain criminal offenses. If the required criminal background investigation is not completed at the time this Contract is signed, and the subsequent investigation report reveals that there has been a prohibited conviction, this Contract shall immediately become null and void.

  • Required Procurement Procedures for Obtaining Goods and Services The Grantee shall provide maximum open competition when procuring goods and services related to the grant-assisted project in accordance with Section 287.057, Florida Statutes.

  • Traditional Medicine Cooperation 1. The aims of Traditional Medicine cooperation will be: (a) to build on existing agreements or arrangements already in place for Traditional Medicine cooperation; and (b) to promote information exchanges on Traditional Medicine between the Parties. 2. In pursuit of the objectives in Article 149 (Objectives), the Parties will encourage and facilitate, as appropriate, the following activities, including, but not limited to: (a) encouraging dialogue on Traditional Medicine policies and promotion of respective Traditional Medicine; (b) raising awareness of active effects of Traditional Medicine; (c) encouraging exchange of experience in conservation and restoration of Traditional Medicine; (d) encouraging exchange of experience on management, research and development for Traditional Medicine; (e) encouraging cooperation in the Traditional Medicine education field, mainly through training programs and means of communication; (f) having a consultation mechanism between the Parties' Traditional Medicine authorities; (g) encouraging cooperation in Traditional Medicine therapeutic services and products manufacturing; and (h) encouraging cooperation in research in the fields of Traditional Medicine in order to contribute in efficacy and safety assessments of natural resources and products used in health care.

  • Research, Science and Technology Cooperation 1. The aims of cooperation in research, science and technology, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to build on existing agreements already in place for cooperation on research, science and technology; (b) to encourage, where appropriate, government agencies, research institutions, universities, private companies and other research organizations in the Parties to conclude direct arrangements in support of cooperative activities, programs or projects within the framework of this Agreement, specially related to trade and commerce; and (c) to focus cooperative activities towards sectors where mutual and complementary interests exist, with special emphasis on information and communication technologies and software development to facilitate trade between the Parties. 2. The Parties will encourage and facilitate, as appropriate, the following activities including, but not limited to:

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • ROAD WORK PHASE APPROVAL Purchaser shall obtain written approval from the Contract Administrator upon completion of each of the following phases of road work:  Drainage installation  Subgrade compaction  Rock compaction SUBSECTION RESTRICTIONS

  • Xxxxx and X Xxxxxxxxxx. Non-Commutative Geometry, Non- Associative Geometry and the Standard Model of Particle Physics, 1401.5083.

  • Background Investigations OSC policy requires that background investigations be conducted on Contractor Staff who will have access to OSC’s IT systems, access to OSC confidential information/data, or routine access to any OSC facility. For purposes of this policy, “routine access” is defined as access to an OSC facility for five consecutive business days or 10 business days over the annual term of the engagement. Accordingly, with the signing of this Agreement, the Contractor certifies that it has or will conduct a background investigation on Staff to whom the policy applies within the 12 months prior to the Staff commencing Services under this Agreement. The Contractor agrees to undertake a background investigation of any new/replacement Staff during the term of the Agreement. At a minimum, background investigations shall include a review/evaluation of the following: • identity verification, including Social Security Number search; • employment eligibility, including verification of U.S. citizenship or legal immigration status where appropriate; • criminal history/court records (Federal, State and local for the past five years); • work experience/history for the past five years; • pertinent skills, qualifications, and education/professional credentials; and • references. The Contractor must obtain the consent of its Staff to allow OSC, upon request: (i) to review the background investigation records, including all supporting documentation, and (ii) to conduct its own background investigation. Only Staff who have passed the background investigation, and provided such consent shall be assigned to provide Services to OSC under this Agreement. During the term of the Agreement, and in accordance with Appendix A (Section 10, Records), the Contractor must maintain records related to the background investigations performed.

Time is Money Join Law Insider Premium to draft better contracts faster.