Authorized Users Authorized Users" are:
Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.
Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:
Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.
Contractor’s Books and Records Contractor shall maintain any and all ledgers, books of account, invoices, vouchers, canceled checks, and other records or documents evidencing or relating to charges for services or expenditures and disbursements charged to the County for a minimum of five (5) years, or for any longer period required by law, from the date of final payment to the Contractor under this Contract. Any records or documents required to be maintained shall be made available for inspection, audit and/or copying at any time during regular business hours, upon oral or written request of the County.
Procurement for Goods and Works Except as ADB may otherwise agree, Goods and Works shall only be procured on the basis of the methods of procurement set forth below: National Competitive Bidding Shopping The methods of procurement are subject to, among other things, the detailed arrangements and threshold values set forth in the Procurement Plan. The Borrower may only modify the methods of procurement or threshold values with the prior agreement of ADB, and modifications must be set out in updates to the Procurement Plan.
Training Records A. Employees may request a copy of their training record. The Employer will provide either a hard copy or electronic access to their training record. If an employee provides documentation to the Employer of work-related training it will be recorded in the training record or the employee personnel file. B. At the time of permanent layoff employees will be provided an opportunity to submit documentation of successfully completed training to be considered.
Custodian's Books and Records The Custodian shall provide any assistance reasonably requested by a Fund in the preparation of reports to such Fund's shareholders and others, audits of accounts, and other ministerial matters of like nature. The Custodian shall maintain complete and accurate records with respect to securities and other assets held for the accounts of each Portfolio as required by the rules and regulations of the SEC applicable to investment companies registered under the 1940 Act, including: (a) journals or other records of original entry containing a detailed and itemized daily record of all receipts and deliveries of securities (including certificate and transaction identification numbers, if any), and all receipts and disbursements of cash; (b) ledgers or other records reflecting (i) securities in transfer, (ii) securities in physical possession, (iii) securities borrowed, loaned or collateralizing obligations of each Portfolio, (iv) monies borrowed and monies loaned (together with a record of the collateral therefor and substitutions of such collateral), (v) dividends and interest received, (vi) the amount of tax withheld by any person in respect of any collection made by the Custodian or any Subcustodian, and (vii) the amount of reclaims or refunds for foreign taxes paid; and (c) cancelled checks and bank records related thereto. The Custodian shall keep such other books and records of each Fund as such Fund shall reasonably request. All such books and records maintained by the Custodian shall be maintained in a form acceptable to the applicable Fund and in compliance with the rules and regulations of the SEC, including, but not limited to, books and records required to be maintained by Section 31(a) of the 1940 Act and the rules and regulations from time to time adopted thereunder. All books and records maintained by the Custodian pursuant to this Agreement shall at all times be the property of each applicable Fund and shall be available during normal business hours for inspection and use by such Fund and its agents, including, without limitation, its independent certified public accountants. Notwithstanding the preceding sentence, no Fund shall take any actions or cause the Custodian to take any actions which would cause, either directly or indirectly, the Custodian to violate any applicable laws, regulations or orders.
Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.
Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff. 2. In the event that staff suspect their password is compromised or known to others, staff will change their password and notify their supervisor immediately.