Control method(s) envisaged Sample Clauses

Control method(s) envisaged. Several control methods are applied as it was the case throughout Euratom 7th Framework Programme (2009-2011), including ex-ante control measures and randomly selected biannual ex-post verifications in the framework of the internal control scheme. Moreover, the requirement for audit certificates and the performance of regular independent external audits help to ensure sound financial management, including regularity and legality of the transactions performed.
AutoNDA by SimpleDocs

Related to Control method(s) envisaged

  • Reporting Unauthorized Transactions You should notify us immediately if you believe your Access Codes or any Access Devices have been lost or stolen, that someone has gained access to the Security Procedure, or that someone has transferred or may transfer money from your Account without your permission or if you suspect any fraudulent activity on your Account. To notify us, call us at the number provided in Section 9.6 between 8:00 a.m. to 4:30 p.m. Central Time during a Business Day.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Direct Trunked Transport 7.3.2.1 Either Party may elect to purchase direct trunked transport from the other Party.

  • CONSEQUENCES OF POSITIVE TEST RESULTS For post-Accident or reasonable suspicion, a Covered Employee shall be immediately removed from performing his or her job or, in the alternative, may be temporarily reassigned to work that is not safety-sensitive if such work is available. The Covered Employee shall be subject to disciplinary action, and shall meet with the SAPC, as set forth in Exhibit A, and section 10 below, if the Covered Employee:

  • Trunk Data Exchange 65.9.1 Each Party agrees to service trunk groups to the blocking criteria in Section 64.3.4 in a timely manner when trunk groups exceed measured blocking thresholds on an average time consistent busy hour for a twenty- one (21) Day study period. The Parties agree that twenty-one (21) Days is the study period duration objective unless mutually agreed otherwise. The study period will not include a holiday.

  • Apple and Android Devices The following terms apply when you use a mobile application obtained from either the Apple Store or Google Play (each an “App Distributor”) to access the Site:

  • Deliverables for an Authorized User Agreement (Transaction Deliverables must be identified, as a measure of progress in the Authorized User Agreement. A Deliverable as a bulk number of hours is not permissible under the OGS Centralized Contract. Retainage As part of the Mini-Bid, the Authorized User may elect to retain a percentage of each individual Deliverable payment of no more than 20% until the acceptance of the complete Deliverable or project. This retainage may be reduced as described in the Mini-Bid, when the Contractor substantially reduces the time required from the timeframes negotiated between the Authorized User and the Contractor for the completion and acceptance of a Deliverable.

Time is Money Join Law Insider Premium to draft better contracts faster.