We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Contents of RFQ Sample Clauses

Contents of RFQ. 4.1 The Request for Qualification submitted by the Bidder shall contain the following sections: (a) Letter of Application (appendix 1) (b) General and Organizational Information (appendix 2) (c) Financial Information (appendix 3) (d) Experience Record (Appendix 4) (e) Company Incorporation Certificate, GST registration, Pan card, etc. (f) Check List (Appendix 6) 4.2 The RFQ shall include the above information in the formats given in the appendices and any other statement of information in support of qualification criteria. 4.3 The documentary evidence of the Bidder’s qualifications to implement the Project, shall establish to the NMMT’s satisfaction that the Bidder has the financial, managerial, technical, procurement and other capabilities necessary to perform the contract and, in particular, meets the experience and other required criteria. The documentary evidence shall include another material required to be compiled and submitted by Applicants in accordance with these instructions. This shall include but not be limited to the following: 1. Audited financial statements certified by Chartered Accountant for last three years up to end of last financial year (Balance Sheets, Profit and Loss Account and cash flow statements and Annual Reports)as required to conform to the RFQ requirements; 2. Summary statement of turnover for past three financial years, and present net worth certified by a Chartered Accountant. 3. Certified Copies of original documents in support of legal constitution of the firm and place of business; 4. Experience in qualifying projects (as given in the Bid Document) with details of projects completed as well as under way and contractually committed along with clients details and certificates.
Contents of RFQ. 2.8.1 The RFQ Document comprises the disclaimer set forth hereinabove, the contents as listed below, and will additionally include any Addenda issued in accordance with Clause 2.10. Sections
Contents of RFQ. Unless otherwise agreed by the Parties, each RFQ shall be in the form of a written or electronic communication and shall contain the following information: (i) the Specifications for the Products, including without limitation whether LMT intends that any Components included within the RFQ shall be Conventional Components; (ii) the minimum quantity of Products the Customer expects to order; (iii) the earliest or requested delivery date or shipping schedule for the Products; (iv) any special requirements for packaging and shipment of the Products; (v) applicable test and acceptance criteria requested by, or proposed to, the Customer; (vi) the proposed warranty, if any, to be given by LMT to the Customer; (vii) the estimated price that LMT intends to charge the Customer; (viii) the payment terms that LMT intends to offer the Customer; and (ix) such further information as is reasonably available to LMT and reasonably required by VPC in order for VPC to produce a Quote to manufacture the Products. VPC shall have the opportunity to request further information regarding the RFQ, and LMT shall provide all such information and such further assistance as VPC shall reasonably request. VPC shall retain all CAD drawings included with an RFQ for not less than three (3) years.

Related to Contents of RFQ

  • Contents of Personnel File A. Adverse statements prepared by the County shall not be included in an employee's official personnel file unless a copy is provided to the employee. B. An employee shall have the right to inspect and review the contents of his or her official personnel file at reasonable intervals. C. In addition, an employee shall have the right to inspect and review the contents of his or her official personnel file in any case where the employee has a grievance related to performance; to a performance evaluation; or is contesting his or her suspension or discharge from County service. D. Letters of reference and reports concerning criminal investigations concerning the employee shall be excluded from the provisions of B. and C., above. E. An employee shall have the right to respond in writing or personal interview to any information contained in his or her official personnel file, such reply to become a permanent part of such employee's official personnel file. F. Any contents of an employee's official personnel file may be destroyed pursuant to an agreement between the Chief of Employee Relations and the employee concerned or by an order of an arbitrator, court or impartial hearing officer unless the particular item is otherwise required by law to be kept.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • Benefits of Agreement; No Third-Party Rights The provisions of this Agreement are intended solely to benefit the Member and, to the fullest extent permitted by applicable law, shall not be construed as conferring any benefit upon any creditor of the Company (and no such creditor shall be a third-party beneficiary of this Agreement), and the Member shall have no duty or obligation to any creditor of the Company to make any contributions or payments to the Company.

  • Data Protection Impact Assessment and Prior Consultation Processor shall provide reasonable assistance to the Company with any data protection impact assessments, and prior consultations with Supervising Authorities or other competent data privacy authorities, which Company reasonably considers to be required by article 35 or 36 of the GDPR or equivalent provisions of any other Data Protection Law, in each case solely in relation to Processing of Company Personal Data by, and taking into account the nature of the Processing and information available to, the Contracted Processors.

  • Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/. B. Grantee shall identify and document on the client records the primary language/dialect of a client who has limited English proficiency and the need for translation or interpretation services and shall not require a client to provide or pay for the services of a translator or interpreter. C. Grantee shall make every effort to avoid use of any persons under the age of 18 or any family member or friend of the client as an interpreter for essential communications with a client with limited English proficiency, unless the client has requested that person and using the person would not compromise the effectiveness of services or violate the client’s confidentiality and the client is advised that a free interpreter is available.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code. (b) Any Service Instructions identified by the Account Holder’s TBS Access Code shall be deemed to be given by the Account Holder and shall be conclusive and binding on the Account Holder and the Account Holder hereby authorises the Bank to act on any such Service Instructions identified by the Account Holder’s TBS Access Code. (c) All acts on the part of the Bank pursuant to such Service Instructions identified by the Account Holder’s TBS Access Code shall be conclusive and binding on the Account Holder (notwithstanding that such Service Instructions may not have been given by the Account Holder or with his consent or authority). (d) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled (but not obliged), in its reasonable discretion, to permit the Account Holder to operate the TBS without the use of his T-PIN upon verifying the identity of the Account Holder in accordance with the Bank’s prevailing prescribed procedure at the time. (e) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled, in its reasonable discretion, to refuse to act on all or any Service Instructions; and the Bank shall be entitled in its reasonable discretion to require written confirmation of the Account Holder’s Service Instructions (even where identified by the Account Holder’s TBS Access Code), and to refuse to act on any such Service Instructions unless and until such written confirmation is received by the Bank. (f) The use of any TBS and the TBS Access Code is also subject to the Bank’s terms and conditions governing the type of Account or facility of which the TBS may be operated in connection therewith and nothing in these terms and conditions shall be construed as amending or varying those terms and conditions. (g) The Bank shall at its reasonable discretion, be entitled to change, de- activate or revoke the use of the TBS Access Code at any time without giving any reason but with reasonable notice to the Account Holder.

  • License of Data; Warranty; Termination of Rights A. The valuation information and evaluations being provided to the Trust by USBFS pursuant hereto (collectively, the “Data”) are being licensed, not sold, to the Trust. The Trust has a limited license to use the Data only for purposes necessary to valuing the Trust’s assets and reporting to regulatory bodies (the “License”). The Trust does not have any license nor right to use the Data for purposes beyond the intentions of this Agreement including, but not limited to, resale to other users or use to create any type of historical database. The License is non-transferable and not sub-licensable. The Trust’s right to use the Data cannot be passed to or shared with any other entity. The Trust acknowledges the proprietary rights that USBFS and its suppliers have in the Data. B. THE TRUST HEREBY ACCEPTS THE DATA AS IS, WHERE IS, WITH NO WARRANTIES, EXPRESS OR IMPLIED, AS TO MERCHANTABILITY OR FITNESS FOR ANY PURPOSE OR ANY OTHER MATTER. C. USBFS may stop supplying some or all Data to the Trust if USBFS’s suppliers terminate any agreement to provide Data to USBFS. Also, USBFS may stop supplying some or all Data to the Trust if USBFS reasonably believes that the Trust is using the Data in violation of the License, or breaching its duties of confidentiality provided for hereunder, or if any of USBFS’s suppliers demand that the Data be withheld from the Trust. USBFS will provide notice to the Trust of any termination of provision of Data as soon as reasonably possible.