Activate Sample Clauses

Activate a) Contractor shall engage trusted messengers in trusted environments to help the public, specifically the HTC communities, participate in the census. b) Contractor shall conduct and participate in community gatherings and other forums to rally the public to participate in the Census. c) Contractor shall collaborate with other stakeholders and across sectors to encourage the public to participate in the census process by filling out the census questionnaire. d) Contractor shall provide County with, data collected during outreach efforts, including phone numbers and activity information related to the collection of each data set.
AutoNDA by SimpleDocs
Activate. Versa Titan Subscription gets auto activated when the Hardware Appliance gets auto provisioned. Once the specific Versa Titan Subscription instance is activated, License gets activated and from this date on, it runs w/out stoppage during the Versa Titan Service Duration. All functionality as defined by Your Subscription License are available in Active status.
Activate. Action. Specific action determines the Subscription License start date & time for a Subscription License.
Activate. Programming to bring alive public spaces and parks across the City (PP&R and PPF collaborate) • Build on activation to xxxxxx further support of PPF initiatives like Friends & Allies and playground upgrades (PP&R and PPF collaborate) 1. Green Dreams, Friends & Allies, and other civic programs (PPF leads) 2. Continue development and activation of Healthy Parks, Healthy Portland to listen and learn from centered, underserved communities to enhance equity (PP&R leads) 1. Build community support for alternative funding sources to support PP&R, resulting in stable, adequate funding The intention is for PPF to utilize the funding from PP&R to strengthen its operations and develop sustainable strategies that will xxxxxx its financial independence. Personnel $ 100,000 Materials/Supplies $ Contracts/Subgrants $ Other $ Indirect/Admin $ $ TOTAL EXPENSES $100,000 The Portland Parks Foundation's anticipated costs for which it seeks support from the city are entirely derived from staff and overhead. While we fund the majority of these basic operating costs through private contributions, most funders want their money to go directly to projects and programs. Examples: We successfully raised over $170,000 for the Xxxxxxxx Elk Fountain restoration, but expenses for architectural roughly equal this, not accounting for many hours devoted to meetings with city staff, community members, and consultants Paseo: We raised over $200,000 for 2022’s festival to bring underrepresented communities to activate downtown, but fees for artists, producers, subcontractors, rentals, steering committee stipends, etc. equaled that. The many hours for facilitation, fundraising, media strategy and execution, and production came from general operating revenues. Each program listed has similar costs associated with it. But overall, the ROI on the city's investment is 15: 1, say nothing of the community benefit each initiative creates. Estimated personnel costs for the following programs:
Activate. The function carried out by the designated administrator to allow selected students to access and take their exams within 60 minutes of the activation time. Student accounts must be enabled before they can be activated. Xxxxxxx: An individual who is responsible for overseeing the testing process to deter dishonest behavior.
Activate. To turn on, supply power, or enable systems, equipment, or devices to become active by normal operating controls. Examples include turning on the gas or water supply valves to the fixtures and appliances, and activating electrical breakers or fuses.
Activate. Once install is complete, CLICK
AutoNDA by SimpleDocs

Related to Activate

  • Deactivation Computershare applications shall automatically deactivate a User ID after a specified number of unsuccessful log-in attempts. Sessions must be restricted or timed out after a defined period of inactivity and require Users to re-authenticate. User IDs for Computershare Personnel with access to Customer Confidential Information shall be deactivated immediately upon changes in job responsibilities that render such access unnecessary, or upon termination of employment.

  • Activation We will notify the Xxxxxx of your request to receive electronic billing information. The presentment of your first electronic bill may vary from Xxxxxx to Xxxxxx and may take up to sixty (60) days, depending on the billing cycle of each Xxxxxx. While your electronic bill feature is being activated it is your responsibility to keep your accounts current. Each electronic Xxxxxx reserves the right to accept or deny your request to receive electronic bills.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • enabled This information is collected by Symantec for the purpose of providing protection and of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it. − Executable files that are identified as potential malware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Software’s automatic submission function. The collected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products. − The name given to the computer during the initial setup of the operating system. If collected, the name will be used by Symantec as an account name for the computer under which You may elect to receive additional services and/or under which You may use certain features of the Software. You may change such account name at any time after installation of the Software (recommended). − Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation of the Software was successfully completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encountered by the Software at the time of installation or error. The status information is collected by Symantec for the purpose of evaluating and improving Symantec’s product performance and installation success rate. Symantec may also use this information to optimize its web-pages. − Information contained in email messages that you send through the Software to Symantec to report as spam or as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with your permission, and will not be sent automatically. If you send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantec’s antispam technology. − Information contained in a report that You may choose to send to Symantec through the Software when the Software encounters a problem. The report includes information regarding the status of both the Software and Your computer at the time that the Software encountered the problem. The status information about Your computer may include the system language, country locale, and the operating system version for Your computer, as well as the processes running, their status and performance information, and data from files or folders that were open at the time the Software encountered the problem. The information could contain personally identifiable information if such information is included in, or is a part of the name of the files or folders open at the time the Software encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantec’s product performance. − The Internet Protocol (IP) address and/or Media Access Control (MAC) address and the Machine ID of the computer on which the Software is installed to enable the Software to function and for license administration purposes. − Other general, statistical information used for product analysis, and for improving product functionality. Unless it is expressly defined as optional, the collected information as set out above is necessary for the purpose of the functionality of Symantec’s products. Information may be transferred to the Symantec group in the United States or other countries that may have less protective data protection laws than the region in which You are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection. Subject to applicable laws, Symantec reserves the right to cooperate with any legal process and any law enforcement or other government inquiry related to your use of this Software. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software, You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze such information for these purposes. In addition, any Data that you transmit or store through the Online Backup Feature will be transferred to and stored in servers located in countries that may have less protective data protection laws than the country in which You are located (including without limitation the United States). These servers are owned and maintained by a third party processor which Symantec has required by contract to safeguard Your Data. If you have any questions about how your Data is being handled, please contact Symantec Customer Service using the contact details in Section 12.

  • Switching All of the negotiated rates, terms and conditions set forth in this Section pertain to the provision of local and tandem switching.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Service Activation For new customers - the services are activated immediately after successful processing of payment and our fraud detection software approves the order. The payment verification procedure is obligatory and if we fail to approve a transaction within 48 hours of the payment submission, the funds will be credited back to the payer and the order will be cancelled. Free Trials - All free trial orders are manually processed. If we deem your order to be suspicious or high risk, we will notify you and request additional information before process the order. Failure to comply with our request for more information will result in cancellation of the order. For existing customers - the services for existing customers, including upgrade services and renewals, are activated immediately after our Sales Department receives the according service payment.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!