CCI-Authorized Copies Sample Clauses

CCI-Authorized Copies. A copy made pursuant to Section 3.3(ii) may be made using only a method delineated in Table C1, AACS Authorized Copying Methods, in accordance with any associated restrictions and obligations specified therein and in the Agreement.
AutoNDA by SimpleDocs

Related to CCI-Authorized Copies

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Authorized Affiliates The parties agree that, by executing the DPA, the Customer enters into the DPA on behalf of itself and, as applicable, in the name and on behalf of its Authorized Affiliate(s), thereby establishing a separate DPA between Okta and each such Authorized Affiliate, subject to the provisions of the Agreement. Each Authorized Affiliate agrees to be bound by the obligations under this DPA and, to the extent applicable, the Agreement. An Authorized Affiliate is not and does not become a party to the Agreement, and is only a party to the DPA. All access to and use of the Service by Authorized Affiliate(s) must comply with the terms and conditions of the Agreement and any violation thereof by an Authorized Affiliate shall be deemed a violation by Customer.

  • CONTRACTOR STAFF WITHIN AUTHORIZED USER AGREEMENT The provisions of this section shall apply unless otherwise agreed in the Authorized User Agreement. All employees of the Contractor, or of its Subcontractors, who shall perform under an Authorized User Agreement, shall possess the necessary qualifications, training, licenses, and permits as may be required within the jurisdiction where the Services specified are to be provided or performed, and shall be legally entitled to work in such jurisdiction. All Business Entities that perform Services under the Contract on behalf of Contractor shall, in performing the Services, comply with all applicable Federal, State, and local laws concerning employment in the United States. Staffing Changes within Authorized User Agreement

  • Authorized Contacts LightEdge Solutions provides reliable and secure managed services by requiring technical support and information requests come only from documented, authorized client-organization contacts. Additionally, in compliance with federally regulated CPNI (Customer Proprietary Network Information) rules, a customer contacting LightEdge Solutions to request an add, move, or change and/or to request information on their account, must provide LightEdge representative with customer’s Code Word. Code Word is not required or verified to open trouble tickets related to service issues, however, any subsequent information/updates or authorization of intrusive testing related to the trouble ticket will require the Code Word. Customer shall provide a “contact list” which will contain one (“1”) Administrative contact and may contain up to three (“3”) Technical contacts per service. Administrative and Technical contacts are authorized to request service changes or information, including the contact name, contact e-mail address and contact phone number for each contact but must provide customer Code Word for any CPNI related requests. Requests to change a contact on the list or to change the Code Word must be submitted by the Administrative contact. Requests to replace the Administrative contact shall be submitted via fax to LightEdge on customer company letterhead. All requests are verified per procedure below.  Requests for CPNI, configuration information or changes are accepted only from documented, authorized client-organization contacts via e-mail, fax or phone and will require Customer’s Code Word. E-mail and fax requests must be submitted without the Code Word. Customer contact will be called to verify Code Word. E- mail requests that include the Code Word will be denied and the client Administrative Contact will be notified and required to change the Code Word.  E-mail and fax requests are verified with a phone call to the documented client contact. Phone call requests must be validated with an e-mail request from a documented client contact.

  • Authorized Capital The authorized capital of the Acquirer consists of 200 shares of common stock, $0.0001 par value, of which one share of common stock is presently issued and outstanding;

  • Default Authorized User a. Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Authorized Personnel Pursuant to the terms of the Schedule A and the Agreement between the Fund and DST, the Fund authorizes the following Fund personnel to provide instructions to DST, and receive inquiries from DST in connection with Schedule A and the Agreement: Name Title _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ _____________________________ ________________________________ This Schedule may be revised by the Fund by providing DST with a substitute Schedule C. Any such substitute Schedule C shall become effective twenty-four (24) hours after DST's receipt of the document and shall be incorporated into the Agreement.

  • Authorized Persons Concurrently with the execution of this Agreement and from time to time thereafter, as appropriate, each Fund shall deliver to the Custodian, duly certified as appropriate by a Treasurer or any Deputy or Assistant Treasurer of such Fund, a certificate setting forth: (a) the names, titles, signatures and scope of authority of all persons authorized to give Proper Instructions or any other notice, request, direction, instruction, certificate or instrument on behalf of such Fund (collectively, the "Authorized Persons" and individually, an "Authorized Person"); and (b) the names, titles and signatures of those persons authorized to issue Special Instructions. Such certificate may be accepted and relied upon by the Custodian as conclusive evidence of the facts set forth therein and shall be considered to be in full force and effect until delivery to the Custodian of a similar certificate to the contrary. Upon delivery of a certificate which deletes the name(s) of a person previously authorized by a Fund to give Proper Instructions or to issue Special Instructions, such persons shall no longer be considered an Authorized Person or authorized to issue Special Instructions for that Fund.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

Time is Money Join Law Insider Premium to draft better contracts faster.