Commonly available tools Sample Clauses

Commonly available tools. Widely used, commercially available tools.
AutoNDA by SimpleDocs

Related to Commonly available tools

  • Currently Available Existing as part of CenturyLink’s network at the time of a requested order or service. Currently Available does not include any service, Network Element, facility, feature, function or capability that CenturyLink either does not provide to itself or to its own End Users, does not have the capability to provide, or is not required to provide on a resold or unbundled basis under Applicable Law.

  • Publicly Available Statements and Reports For a period of five (5) years from the Effective Date or until such earlier time that the Company is required to be liquidated or the Common Stock and Warrants cease to be publicly traded, the Company will furnish to the Representative such copies of financial statements and other periodic and special reports as the Company from time to time furnishes generally to holders of any class of its securities and such additional documents and information with respect to the Company as the Representative may from time to time reasonably request. Any financial statements and reports filed on the Commission’s XXXXX website or otherwise available on the Company’s website will be considered furnished for purposes of this section.

  • Certain Available Information The Securities Administrator shall maintain at its Corporate Trust Office and shall make available free of charge during normal business hours for review by any Holder of a Certificate or any Person identified to the Securities Administrator as a prospective transferee of a Certificate, originals or copies of the following items: (i) in the case of a Holder or prospective transferee of a Class C Certificate, a Class P Certificate or a Residual Interest, any related private placement memorandum or other disclosure document relating to such Certificates, if any, in the form most recently provided to the Securities Administrator; and (ii) in all cases, (A) this Agreement and any amendments hereof entered into pursuant to Section 11.01, (B) all monthly statements required to be delivered to Certificateholders of the relevant Class pursuant to Section 4.02 since the Closing Date, and all other notices, reports, statements and written communications delivered to the Certificateholders of the relevant Class pursuant to this Agreement since the Closing Date, (C) all certifications delivered by a Responsible Officer of the Securities Administrator since the Closing Date pursuant to Section 10.01(h), (D) any and all Officers’ Certificates delivered to the Trustee by the Servicer since the Closing Date to evidence the Servicer’s determination that any P&I Advance was, or if made, would be a Nonrecoverable P&I Advance or Nonrecoverable Servicing Advance, respectively, and (E) any and all Officers’ Certificates delivered to the Securities Administrator by the Servicer since the Closing Date pursuant to Section 4.04(a). Copies and mailing of any and all of the foregoing items will be available from the Securities Administrator upon request at the expense of the person requesting the same.

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Information Available So long as the Registration Statement is effective covering the resale of Shares owned by the Investor, the Company will furnish to the Investor: (a) as soon as practicable after it is available, one copy of (i) its Annual Report to Stockholders (which Annual Report shall contain financial statements audited in accordance with generally accepted accounting principles by a national firm of certified public accountants) and (ii) if not included in substance in the Annual Report to Stockholders, its Annual Report on Form 10-K (the foregoing, in each case, excluding exhibits); (b) upon the reasonable request of the Investor, all exhibits excluded by the parenthetical to subparagraph (a)(ii) of this Section 7.5 as filed with the SEC and all other information that is made available to shareholders; and (c) upon the reasonable request of the Investor, an adequate number of copies of the Prospectuses to supply to any other party requiring such Prospectuses; and the Company, upon the reasonable request of the Investor, will meet with the Investor or a representative thereof at the Company's headquarters to discuss all information relevant for disclosure in the Registration Statement covering the Shares and will otherwise cooperate with any Investor conducting an investigation for the purpose of reducing or eliminating such Investor's exposure to liability under the Securities Act, including the reasonable production of information at the Company's headquarters; provided, that the Company shall not be required to disclose any confidential information to or meet at its headquarters with any Investor until and unless the Investor shall have entered into a confidentiality agreement in form and substance reasonably satisfactory to the Company with the Company with respect thereto.

  • How to Update Your Records You agree to promptly update your registration records if your e-mail address or other information changes. You may update your records, such as your e-mail address, by using the Profile page.

  • Periodic Reports, etc For a period of five (5) years from the Effective Date or until such earlier time upon which the Company is dissolved, the Company will furnish to the Representative and its counsel copies of such financial statements and other periodic and special reports as the Company from time to time furnishes generally to holders of any class of its securities, and promptly furnish to the Representative: (i) a copy of each periodic report the Company shall be required to file with the Commission; (ii) a copy of every press release and every news item and article with respect to the Company or its affairs which was released by the Company; (iii) a copy of each Form 8-K or Schedules 13D, 13G, 14D-1 or 13E-4 received or prepared by the Company; (iv) five (5) copies of each Registration Statement; and (v) such additional documents and information with respect to the Company and the affairs of any future subsidiaries of the Company as the Representative may from time to time reasonably request; provided that the Representative shall sign, if requested by the Company, a Regulation FD compliant confidentiality agreement which is reasonably acceptable to the Representative and its counsel in connection with the Representative’s receipt of such information. Documents filed with the Commission pursuant to its Electronic Data Gathering, Analysis and Retrieval System (“XXXXX”) shall be deemed to have been delivered to the Representative pursuant to this section.

  • Accounting Methods and Financial Records Maintain a system of accounting, and keep such books, records and accounts (which shall be true and complete in all material respects) as may be required or as may be necessary to permit the preparation of financial statements in accordance with GAAP and in compliance with the regulations of any Governmental Authority having jurisdiction over it or any of its properties.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!