Disguising Origin Sample Clauses

Disguising Origin you will not forge headers or otherwise manipulate identifiers to disguise the origin of any content transmitted through the Service.
AutoNDA by SimpleDocs

Related to Disguising Origin

  • Fire Prevention LESSEE agrees to use every reasonable precaution against fire and agrees to provide and maintain approved, labeled fire extinguishers, emergency lighting equipment, and exit signs and complete any other modifications within the leased premises as required or recommended by the Insurance Services Office (or successor organization), OSHA, the local Fire Department, or any similar body.

  • Privacy Protection The Grantee shall comply with all applicable federal and state privacy laws, including Section 631 of the Cable Act and regulations adopted pursuant thereto.

  • Privacy Act If performance involves design, development or operation of a system of records on individuals, this Agreement incorporates by reference FAR 52.224-1 Privacy Act Notification (Apr 1984) and FAR 52.224-2 Privacy Act (Apr 1984).

  • Human Trafficking Prohibition Under Section 2155.0061 of the Texas Government Code, Contractor certifies that the individual or business entity named in this Contract is not ineligible to receive this Contract and acknowledges that this Contract may be terminated and payment withheld if this certification is inaccurate.

  • STUDENT DISCIPLINE AND TEACHER PROTECTION A. The Board recognizes its responsibility to give all reasonable support and assistance to teachers with respect to the maintenance of control and discipline in the classroom. Whenever it appears that a particular pupil requires the attention of special counselors, social workers, law enforcement personnel, physicians, or other professional persons, the principal shall be notified. The Board feels that the teacher and the specialists indicated above should work together to improve the case. B. It is recognized that discipline problems are less likely to occur in classes where a high level of student interest is maintained. It is likewise recognized that when discipline problems occur, they may most constructively be dealt with by encouragement, praise and emphasis upon a child’s desirable characteristics. A teacher may use such force as is necessary, according to the law, to protect himself/herself from attack or to prevent injury to another student. C. A teacher may ask the principal to exclude a pupil from class when the grossness of the offense, the persistence of the misbehavior, or the disruptive effect of the violation makes the continued presence of the student in the classroom intolerable. In such cases, the teacher will furnish the principal, as promptly as his/her teaching obligations will allow, full particulars of the incident in writing. D. Procedure for suspension of students from school shall be distributed to students and teachers each year. E. Any case of assault upon a teacher while on duty should be promptly reported to the Board or its designated representative. The Board will provide legal counsel to advise the teacher of his/her rights and obligations with respect to such assault and shall promptly render all reasonable assistance to the teacher in connection with handling of the incident by law enforcement and judicial authorities. F. If any teacher is complained against or sued as a result of any action taken by the teacher while in pursuit of his/her employment, the Board may provide legal counsel and render all necessary assistance to the teacher in his/her defense. G. Time lost by a teacher in connection with any incident mentioned in this Article shall not be charged against the teacher. X. The Board will reimburse teachers for any loss, damages or destruction of clothing or personal property of the teacher while on duty in the school or on school premises in those cases where the school could have reasonably prevented the loss. I. No action shall be taken upon any complaint by a parent of the student directed toward the teacher nor shall any notice thereof be included in said teacher’s personnel file unless such matter is promptly reported in writing to the teacher concerned. J. Teachers shall be expected to exercise reasonable care with respect to the safety of pupils and property, but shall not be individually liable, except in the case of gross neglect of duty, for any damage or loss to person or property.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Government End Users The Apple Software and related documentation are “Commercial Items”, as that term is defined at 48 C.F.R. §2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation”, as such terms are used in 48 C.F.R. §12.212 or 48

  • Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA. (b) If the HSP is not subject to the procurement provisions of the BPSAA, the HSP will have a procurement policy in place that requires the acquisition of supplies, equipment or services valued at over $25,000 through a competitive process that ensures the best value for funds expended. If the HSP acquires supplies, equipment or services with the Funding it will do so through a process that is consistent with this policy.

  • Illicit Code Except for the functions and features expressly disclosed in Supplier's documentation made available to Accenture, Deliverables will be free of any programs, subroutines, code, instructions, data or functions, (including but not limited to viruses, malware, worms, date bombs, time bombs, shut-down devices, keys, authorization codes, back doors or passwords allowing Supplier access) that may result in any inoperability, damage, interruption, or interference of the Deliverables or any equipment on which the Deliverables reside or with which the Deliverables are capable of communicating.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!