ELECTRONIC CONTRACTING The parties agree that if this Contract is transmitted electronically neither party shall contest the validity of this Contract, or any acknowledgement thereof, on the basis that this Contract or acknowledgement contains an electronic signature.
Electronic Check Transactions You authorize us to honor any electronic check conversion transaction and re-presented check fee debit transactions you authorize ("Electronic Check Transactions"). You agree that your authorization for an electronic check transaction occurs when you initiate such a transaction after receiving any notice regarding the merchant's right to process the transaction, including any written sign provided by the merchant at the time of your transaction. All terms governing electronic funds transfer services will apply to electronic check transactions, except the $50 and $500 limits of liability for unauthorized transactions in Section 9. You remain responsible for notifying us of any unauthorized electronic check transaction shown on your statement.
Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.
Posting of Approved Electronic Communications (a) Each of the Agents, the Lenders, the Issuers and Group and the Borrower agree, and Group shall cause each other Loan Party to agree, that the Administrative Agent and the Collateral Agent may, but shall not be obligated to, make the Approved Electronic Communications available to the Lenders and Issuers by posting such Approved Electronic Communications on IntraLinks™ or a substantially similar electronic platform chosen by the Facility Agents to be their electronic transmission system (the “Approved Electronic Platform”). (b) Although the Approved Electronic Platform and its primary web portal are secured with generally-applicable security procedures and policies implemented or modified by the Facility Agents from time to time (including, as of the Closing Date, a dual firewall and a User ID/Password Authorization System) and the Approved Electronic Platform is secured through a single-user-per-deal authorization method whereby each user may access the Approved Electronic Platform only on a deal-by-deal basis, each of the Lenders, the Issuers, Group and the Borrower acknowledges and agrees, and Group shall cause each other Loan Party to acknowledge and agree, that the distribution of material through an electronic medium is not necessarily secure and that there are confidentiality and other risks associated with such distribution. In consideration for the convenience and other benefits afforded by such distribution and for the other consideration provided hereunder, the receipt and sufficiency of which is hereby acknowledged, each of the Facility Agents, the Lenders, the Issuers, Group and the Borrower hereby approves, and Group shall cause each other Loan Party to approve, distribution of the Approved Electronic Communications through the Approved Electronic Platform and understands and assumes, and Group shall cause each other Loan Party to understand and assume, the risks of such distribution. (c) THE APPROVED ELECTRONIC PLATFORM AND THE APPROVED ELECTRONIC COMMUNICATIONS ARE PROVIDED “AS IS” AND “AS AVAILABLE”. NONE OF THE FACILITY AGENTS OR ANY OF THEIR AFFILIATES OR ANY OF THEIR RESPECTIVE OFFICERS, DIRECTORS, EMPLOYEES, AGENTS, ADVISORS OR REPRESENTATIVES (THE “AGENT AFFILIATES”) WARRANT THE ACCURACY, ADEQUACY OR COMPLETENESS OF THE APPROVED ELECTRONIC COMMUNICATIONS OR THE APPROVED ELECTRONIC PLATFORM AND EACH EXPRESSLY DISCLAIMS LIABILITY FOR ERRORS OR OMISSIONS IN THE APPROVED ELECTRONIC PLATFORM AND THE APPROVED ELECTRONIC COMMUNICATIONS. NO WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT OF THIRD PARTY RIGHTS OR FREEDOM FROM VIRUSES OR OTHER CODE DEFECTS, IS MADE BY ANY OF THE AGENT AFFILIATES IN CONNECTION WITH THE APPROVED ELECTRONIC PLATFORM OR THE APPROVED ELECTRONIC COMMUNICATIONS. (d) Each of the Lenders, the Issuers, Group and the Borrower agrees, and Group shall cause each other Loan Party to agree, that each Facility Agent may, but (except as may be required by applicable law) shall not be obligated to, store the Approved Electronic Communications on the Approved Electronic Platform in accordance with such Agent’s generally-applicable document retention procedures and policies.
Electronic Commerce Supplier agrees to participate in Xxxxx’s current and future electronic commerce applications and initiatives. For purposes of this Order, each electronic message sent between the parties within such applications or initiatives shall be deemed: (a) ”written” and a “writing”;
Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.
Subsidy Requests and Reporting Requirements 1. The Grantee or Management Company shall complete a CRF Subsidy Request Report - Recap of Tenant Income Certification, which provides a unit-by-unit listing of all units in the Development for whom assistance is being requested and gives detailed information including the occupants’ eligibility, set-aside requirements, amount of household rent paid, utility allowance and amount of CRF Rental Subsidy requested. 2. The CRF Subsidy Request Report - Recap of Tenant Income Certification shall be prepared as of the last day of each calendar month during the period of performance and shall be submitted to XXXXxxxxxxxx@XxxxxxxXxxxxxx.xxx and Florida Housing’s monitoring agent no later than the 15th day of the following month. The December 2020 request will be due on or before December 15th. The Grantee will submit executed Coronavirus Relief Fund Rental Assistance Applications and supporting documentation to Florida Housing’s monitoring agent within 5 days upon the monitoring agent’s request.
Money Market Fund Compliance Testing and Reporting Services Subject to the authorization and direction of the Trust and, in each case where appropriate, the review and comment by the Trust’s independent accountants and legal counsel, and in accordance with procedures that may be established from time to time between the Trust and the Administrator, the Administrator will:
ELECTRONIC WORKFLOW SYSTEM OGS reserves the right to incorporate an electronic workflow system that may include elements of the Authorized User RFQ process. OGS reserves the right to post Authorized User Contract usage of Centralized Contracts. For Lot 4 only, when provided for in the RFQ and resultant Authorized User Agreement, the Authorized Users may reimburse travel expenses. All rules and regulations associated with this travel can be found at xxxx://xxx.xxxxx.xx.xx/agencies/travel/travel.htm. In no case will any travel reimbursement be charged that exceeds these rates. All travel will be paid only as specified within the Authorized User Agreement and must be billed with the associated services on the same Invoice with receipts attached. The Contractor shall receive prior approval from the Authorized User for any travel that occurs during the term of an Authorized User Agreement. Parking fees and/or parking tickets shall not be paid by an Authorized User. Unless otherwise specified in writing by the Authorized User, a vehicle will not be provided by Authorized User to the Contractor for travel. Therefore, the Contractor will be responsible for ensuring that the Contractor has access to an appropriate vehicle (e.g., personal vehicle or rental vehicle) or common carrier with which to carry out any necessary travel. For the Contractor to obtain reimbursement for the use of a rental vehicle, such use must be justified as the most cost- effective mode of transportation under the circumstances (including consideration of the most effective use of time). The Contractor is responsible for keeping adequate records to substantiate any claims for travel reimbursement. All services provided under the resultant Authorized User Agreement must be performed within CONUS. There are no BONDS for this Contract. However, an Authorized User may require in an RFQ a performance, payment or Bid bond, or negotiable irrevocable letter of credit or other form of security for the faithful performance for the resultant Authorized User Agreement. Pursuant to New York State Executive Law Article 15-A and Parts 140-145 of Title 5 of the New York Codes, Rules and Regulations (“NYCRR”), the New York State Office of General Services (“OGS”) is required to promote opportunities for the maximum feasible participation of New York State-certified Minority- and Women-owned Business Enterprises (“MWBEs”) and the employment of minority group members and women in the performance of OGS contracts.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.