CERTIFICATION OF DAYS USED Sample Clauses

CERTIFICATION OF DAYS USED. The Sick Leave Bank Committee shall certify in writing (either physically or electronically) prior to using said leave to the Superintendent or designee of any person granted the use of Sick Leave Bank days. Further, the Committee shall notify the Superintendent or designee of the specific dates that these benefits will begin and cease. Benefits to any individual shall cease if the available days in the Sick Leave Bank become exhausted.
AutoNDA by SimpleDocs

Related to CERTIFICATION OF DAYS USED

  • Definition of Days A day shall mean calendar days, however, where a deadline occurs on a Saturday, Sunday or Holiday (as identified in Article 25), the deadline shall be extended to the next normal business day.

  • Counting of Days Except where otherwise specifically provided, any reference in this Note to a period of "days" means calendar days, not Business Days.

  • Destruction of Data Provider shall destroy or delete all Personally Identifiable Data contained in Student Data and obtained under the DPA when it is no longer needed for the purpose for which it was obtained or transfer said data to LEA or LEA’s designee, according to a schedule and procedure as the parties may reasonable agree. Nothing in the DPA authorizes Provider to maintain personally identifiable data beyond the time period reasonably needed to complete the disposition.

  • Calculation of Damages (a) The amount of any Damages payable under Section 9.02 by the Indemnifying Party shall be net of any amounts recovered or recoverable by the Indemnified Party under applicable insurance policies from any other third party with indemnification obligations or from any other Person alleged to be responsible therefor. If the Indemnified Party receives any amounts under applicable insurance policies, from any other third party with indemnification obligations or from any other Person alleged to be responsible for any Damages, subsequent to an indemnification payment by the Indemnifying Party, then such Indemnified Party shall promptly reimburse the Indemnifying Party for any payment made or expense incurred by such Indemnifying Party in connection with providing such indemnification payment up to the amount received by the Indemnified Party, net of any expenses incurred by such Indemnified Party in collecting such amount. (b) The Indemnifying Party shall not be liable under Section 9.02 for any (i) Damages relating to any matter to the extent that there is included in the Preliminary Balance Sheet a specific liability or reserve relating to such matter, (ii) consequential or punitive Damages or (iii) Damages for lost profits. (c) Notwithstanding any other provision of this Agreement to the contrary, if on the Closing Date the Indemnified Party has actual knowledge of any information that would cause one or more of the representations and warranties made by the Indemnifying Party to be inaccurate as of the date made, the Indemnified Party shall have no right or remedy after the Closing with respect to such inaccuracy and shall be deemed to have waived its rights to indemnification in respect thereof.

  • Identification of Data a. All Background, Third Party Proprietary and Controlled Government Data provided by Disclosing Party shall be identified in the Annex under which it will be provided. b. NASA software and related Data provided to Partner shall be identified in the Annex under which it will be used. Notwithstanding H.4., Software and related Data will be provided to Partner under a separate Software Usage Agreement (SUA). Partner shall use and protect the related Data in accordance with this Article. Unless the SUA authorizes retention, or Partner enters into a license under 37 C.F.R. Part 404, the related Data shall be disposed of as instructed by NASA.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA. (b) If applicable, once the transfer of PII has been accomplished in accordance with the EA’s written election to do so, Contractor agrees to return or destroy all PII when the purpose that necessitated its receipt by Contractor has been completed. Thereafter, with regard to all PII (including without limitation, all hard copies, archived copies, electronic versions, electronic imaging of hard copies) as well as any and all PII maintained on behalf of Contractor in a secure data center and/or cloud-based facilities that remain in the possession of Contractor or its Subcontractors, Contractor shall ensure that PII is securely deleted and/or destroyed in a manner that does not allow it to be retrieved or retrievable, read or reconstructed. Hard copy media must be shredded or destroyed such that PII cannot be read or otherwise reconstructed, and electronic media must be cleared, purged, or destroyed such that the PII cannot be retrieved. Only the destruction of paper PII, and not redaction, will satisfy the requirements for data destruction. Redaction is specifically excluded as a means of data destruction. (c) Contractor shall provide the EA with a written certification of the secure deletion and/or destruction of PII held by the Contractor or Subcontractors. (d) To the extent that Contractor and/or its subcontractors continue to be in possession of any de-identified data (i.e., data that has had all direct and indirect identifiers removed), they agree not to attempt to re-identify de-identified data and not to transfer de-identified data to any party.

  • Certification of Public Information Holdings and each Lender acknowledge that certain of the Lenders may be “public-side” Lenders (Lenders that do not wish to receive material non-public information with respect to Holdings, its Subsidiaries or their securities) and, if documents or notices required to be delivered pursuant to this Section 5.01 or otherwise are being distributed through IntraLinks/IntraAgency, SyndTrak or another relevant website or other information platform (the “Platform”), any document or notice that Holdings has indicated contains Non-Public Information shall not be posted on that portion of the Platform designated for such public-side Lenders. Holdings agrees to clearly designate all Information provided to the Administrative Agent by or on behalf of Holdings which is suitable to make available to Public Lenders. If Holdings has not indicated whether a document or notice delivered pursuant to this Section 5.01 contains Non-Public Information, the Administrative Agent reserves the right to post such document or notice solely on that portion of the Platform designated for Lenders who wish to receive material non-public information with respect to Holdings, its Subsidiaries and their securities;

  • Retention of Data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.

  • Provision of Data 26.1 The Supplier shall submit all information required under applicable law and regulations, such as but not limited to information required to meet financial and administrative obligations. If Wavin has not received one or more of the requested documents within ten (10) days of making the request, Wavin shall be entitled to suspend payment until the moment of receipt, or to terminate the Agreement without any liability. 26.2 Every change in the data submitted under clause 26.1 must be immediately reported to Wavin in writing.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!