of the Discipline The Local Church acknowledges that the Annual Conference has no control over the voting approval of the voting delegates and the voting approval is subject to the will and voting of the body. Should either of the above conditions not occur, this Disaffiliation Agreement shall immediately become null and void.
Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.
Provisioning 2.4.1 BellSouth shall provision services during its regular working hours. To the extent OneTone requests provisioning of service to be performed outside BellSouth’s regular working hours, or the work so requested requires BellSouth’s technicians or project managers to work outside of regular working hours, overtime charges set forth in BellSouth’s intrastate Access Services Tariff, Section E13.2, shall apply. Notwithstanding the foregoing, if such work is performed outside of regular working hours by a BellSouth technician or project manager during his or her scheduled shift and BellSouth does not incur any overtime charges in performing the work on behalf of OneTone, BellSouth will not assess OneTone additional charges beyond the rates and charges specified in this Agreement. 2.4.2 In the event BellSouth must dispatch to the End User’s location more than once due to incorrect or incomplete information provided by OneTone (e.g., incomplete address, incorrect contact name/number, etc.), BellSouth will xxxx OneTone for each additional dispatch required to provision the circuit due to the incorrect/incomplete information provided. BellSouth will assess the applicable Maintenance of Service rates from BellSouth’s XXX Xx. 0 Xxxxxx, Xxxxxxx 13.3.1.
Timeliness of Submitting Orders You are obliged to date and indicate the time of receipt of all orders you receive from your customers and to transmit promptly all orders to us in time to provide for processing at the price next determined after receipt by you, in accordance with the Prospectuses. You are not to withhold placing with us orders received from any customers for the purchase of shares. You shall not purchase shares through us except for the purpose of covering purchase orders already received by you, or for your bona fide investment.
Safe Workplace A) The Employer and employees recognize the need for a safe and healthful workplace and agree to take appropriate measures in order that risks of accidents and/or occupational disease are reduced and/or eliminated. Employers will take all reasonable steps to eliminate, reduce and/or minimize threats to the safety of employees. B) An employee performing visitation to clients in the community shall have the right to request backup to attend where there is reasonable cause to expect a violent situation and will have access to appropriate communication equipment. C) When the Employer is aware that a patient/resident/client has a history of violent behaviour, the Employer shall make such information available to the employee. Upon admission or transfer the Employer will make every reasonable effort to identify the potential for aggressive behaviour. In- services and/or instruction in caring for the violent patient will be provided by the Employer. D) The Employer will provide orientation and/or in-service which is necessary for the safe performance of work including universal precautions, the safe use of equipment, safe techniques for lifting and supporting patients/residents/clients and the safe handling of materials and products. The Employer will also make readily available information, manuals and procedures for these purposes. The Employer will provide appropriate safety clothing and equipment.
Rectification Where the surface irregularity of sub-grade and the various pavement course fall outside the specified tolerances contractor shall be liable .to rectify these in the manner described below and to the satisfaction of the Engineer - in-charge. .
Unsafe Working Conditions Employees shall be recognized by the Employer to have the competence to determine what constitutes unsafe working conditions within their discipline. No employee shall be disciplined for refusal to work in a situation which is deemed unsafe beyond the reasonable requirements of the employee's job.
Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.
Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case. 2. Nothing in this Article and Articles 25A to 25G shall affect the fulfilment of wider obligations with respect to the arbitration of unresolved issues arising in the context of a mutual agreement procedure resulting from other conventions to which the Contracting States are or will become parties.”.
Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.