Demonstrate Sample Clauses

Demonstrate efficient job skill: Every job at FIFS has a set of job skills necessary for performance of the job. It is important to understand that whatever a person’s job, our customers expect employees to know how to perform the skills for which they are responsible in quick and efficiently manner.
AutoNDA by SimpleDocs
Demonstrate. Have a rubber band available to demonstrate how muscles stretch and shrink (expand and contract).  Read the text on page 11. STOP
Demonstrate a. Mixing and application equipment capabilities and procedures, including the flow of material from nozzle or sprayer. May 2017 C01025C17 VERTICAL AND OVERHEAD CONCRETE Georgetown Wet Weather Treatment Station 03720 - 9 SURFACE REPAIR SYSTEMS
Demonstrate. Give a clear, straightforward description which includes all the main points. Describe… Give all the basic facts which relate to a certain topic. Identify... Write a list of the main items (not sentences). List… Show that you can do a particular activity. ● A formal report ● A powerpoint presentation ● A leaflet ● A handout or information sheet ● A web page You may be able to include images to illustrate your work. Examples: ● List the main features on your mobile phone. ● Describe the best way to greet a customer ● Outline the procedures you follow to keep your computer system secure. For BTEC First - Obtaining a Merit grade KEYWORDS DESCRIPTION
Demonstrate a proven satisfactory record of knowledge and work experience with commercial/industrial type “integrated systems.” “Integrated systems” is defined for the purposes of this Agreement as a combination of compatible multiple hardware and/or software systems which may be produced by different manufacturers, and of different types, brands or models combined to form the total integrated computer security system. Such knowledge and work experience shall include CCure 800 software package, Nice Vision digital recorders, cross point matrix switching systems, network systems and gate control systems.
Demonstrate sensitivity to the costs of care in the ED setting and take steps to minimize costs without compromising quality.

Related to Demonstrate

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Satisfactory Completion of Due Diligence The Company and the Shareholders shall have completed their legal, accounting and business due diligence of the Parent and the results thereof shall be satisfactory to the Company and the Shareholders in their sole and absolute discretion.

  • Capability to Evaluate Investor has such knowledge and experience in financial and business matters so as to enable such Investor to utilize the information made available to it in connection with the Offering in order to evaluate the merits and risks of the prospective investment, which are substantial, including without limitation those set forth in the Disclosure Documents (as defined in Section 3.2.4 below).

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Measures SAP protects its assets and facilities using the appropriate means based on the SAP Security Policy • In general, buildings are secured through access control systems (e.g., smart card access system). • As a minimum requirement, the outermost entrance points of the building must be fitted with a certified key system including modern, active key management. • Depending on the security classification, buildings, individual areas and surrounding premises may be further protected by additional measures. These include specific access profiles, video surveillance, intruder alarm systems and biometric access control systems. • Access rights are granted to authorized persons on an individual basis according to the System and Data Access Control measures (see Section 1.2 and 1.3 below). This also applies to visitor access. Guests and visitors to SAP buildings must register their names at reception and must be accompanied by authorized SAP personnel. • SAP employees and external personnel must wear their ID cards at all SAP locations.

  • Verification Bank may, from time to time, verify directly with the respective Account Debtors the validity, amount and other matters relating to the Accounts, either in the name of Borrower or Bank or such other name as Bank may choose.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Financial Capability At Closing, the Investor will have available funds necessary to consummate the Closing on the terms and conditions contemplated by this Agreement and has the ability to bear the economic risks of its prospective investment in the Purchased Shares and can afford the complete loss of such investment.

  • Access Registry Operator will have the file(s) ready for download as of 00:00:00 UTC on the day designated for retrieval by ICANN. The file(s) will be made available for download by SFTP, though ICANN may request other means in the future.

Time is Money Join Law Insider Premium to draft better contracts faster.