Electronic Data Interchange (EDI This standard establishes the data contents of the Invoice Transaction Set (810) for use within the context of an EDI environment. This transaction set can be used for invoicing via the AN for catalog and non-catalog goods and services.
Electronic Data Interchange If both Parties elect to facilitate business activities hereunder by electronically sending and receiving data in agreed formats (also referred to as Electronic Data Interchange or “EDI”) in substitution for conventional paper-based documents, the terms and conditions of this Agreement shall apply to such EDI activities.
Electronic Data 7.1.1 The parties recognize that Contract Documents, including drawings, specifications and three-dimensional modeling (such as Building Information Models) and other Work Product may be transmitted among Owner, Design-Builder and others in electronic media as an alternative to paper hard copies (collectively “Electronic Data”).
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Non-State Agencies Participation in Centralized Contracts New York State political subdivisions and others authorized by New York State law may participate in Centralized Contracts. These include, but are not limited to local governments, public authorities, public school and fire districts, public and nonprofit libraries, and certain other nonpublic/nonprofit organizations. See "Participation in Centralized Contracts" in Appendix B, General Specifications January 2015 22772 Project Based Information Technology Consulting (Statewide). Upon request, all eligible non-State agencies must furnish Contractors with the proper tax exemption certificates and documentation certifying eligibility to use State contracts. Questions regarding an organization's eligibility to purchase from New York State Contracts may also be directed to OGS Customer Services at 000-000-0000.
Electronic Funds Transfer (EFT) The recipient/cooperator shall designate a financial institution or an authorized payment agent through which a federal payment may be made in accordance with US Treasury Regulations, Money and Finance at 00 XXX 000, which requires that federal payments are to be made by EFT to the maximum extent possible. A waiver may be requested and payments received by check by certifying in writing that one of the following situations apply: 1. The payment recipient does not have an account at a financial institution. 2. EFT creates a financial hardship because direct deposit will cost the payment recipient more than receiving a check. 3. The payment recipient has a physical or mental disability, or a geographic, language, or literacy barrier. In order to receive EFT payments the recipient/cooperator shall register in the System for Award Management (XXX). You may register by going to xxx.xxx.gov and following the instructions provided online. For assistance, contact the XXX User Help by contacting the supporting Federal Service Desk at (000)000-0000 or xxx.xxx.xxx .
Securities Transactions The Subadviser and any affiliated person of the Subadviser will not purchase securities or other instruments from or sell securities or other instruments to the Fund; provided, however, the Subadviser or any affiliated person of the Subadviser may purchase securities or other instruments from or sell securities or other instruments to the Fund if such transaction is permissible under applicable laws and regulations, including, without limitation, the 1940 Act and the Advisers Act and the rules and regulations promulgated thereunder. The Subadviser, on its own behalf and with respect to its Access Persons (as defined in subsection (e) of Rule 17j-1 under the 1940 Act), agrees to observe and comply with Rule 17j-1 and its Code of Ethics (which shall comply in all material respects with Rule 17j-1), as the same may be amended from time to time. On at least an annual basis, the Subadviser will comply with the reporting requirements of Rule 17j-1, which may include either (i) certifying to the Adviser that the Subadviser and its Access Persons have complied with the Subadviser’s Code of Ethics with respect to the Subadviser Assets or (ii) identifying any violations which have occurred with respect to the Subadviser Assets. The Subadviser will have also submitted its Code of Ethics for its initial approval by the Board of Trustees no later than the date of execution of this agreement and subsequently within six months of any material change thereto.
ELECTRONIC WORKFLOW SYSTEM OGS reserves the right to incorporate an electronic workflow system that may include elements of the Authorized User RFQ process. OGS reserves the right to post Authorized User Contract usage of Centralized Contracts. For Lot 4 only, when provided for in the RFQ and resultant Authorized User Agreement, the Authorized Users may reimburse travel expenses. All rules and regulations associated with this travel can be found at xxxx://xxx.xxxxx.xx.xx/agencies/travel/travel.htm. In no case will any travel reimbursement be charged that exceeds these rates. All travel will be paid only as specified within the Authorized User Agreement and must be billed with the associated services on the same Invoice with receipts attached. The Contractor shall receive prior approval from the Authorized User for any travel that occurs during the term of an Authorized User Agreement. Parking fees and/or parking tickets shall not be paid by an Authorized User. Unless otherwise specified in writing by the Authorized User, a vehicle will not be provided by Authorized User to the Contractor for travel. Therefore, the Contractor will be responsible for ensuring that the Contractor has access to an appropriate vehicle (e.g., personal vehicle or rental vehicle) or common carrier with which to carry out any necessary travel. For the Contractor to obtain reimbursement for the use of a rental vehicle, such use must be justified as the most cost- effective mode of transportation under the circumstances (including consideration of the most effective use of time). The Contractor is responsible for keeping adequate records to substantiate any claims for travel reimbursement. All services provided under the resultant Authorized User Agreement must be performed within CONUS. There are no BONDS for this Contract. However, an Authorized User may require in an RFQ a performance, payment or Bid bond, or negotiable irrevocable letter of credit or other form of security for the faithful performance for the resultant Authorized User Agreement. Pursuant to New York State Executive Law Article 15-A and Parts 140-145 of Title 5 of the New York Codes, Rules and Regulations (“NYCRR”), the New York State Office of General Services (“OGS”) is required to promote opportunities for the maximum feasible participation of New York State-certified Minority- and Women-owned Business Enterprises (“MWBEs”) and the employment of minority group members and women in the performance of OGS contracts.
Electronic Check Conversion/Electronic Returned Check Fees If you pay for purchases or bills with a check or draft, you may authorize your check or draft to be converted to an electronic fund transfer. You may also authorize merchants or other payees to electronically debit your account for returned check fees. You are considered to have authorized these electronic fund transfers if you complete the transaction after being told (orally or by a notice posted or sent to you) that the transfer may be processed electronically or if you sign a written authorization.
Electronic Check Transactions You authorize us to honor any electronic check conversion transaction and re-presented check fee debit transactions you authorize ("Electronic Check Transactions"). You agree that your authorization for an electronic check transaction occurs when you initiate such a transaction after receiving any notice regarding the merchant's right to process the transaction, including any written sign provided by the merchant at the time of your transaction. All terms governing electronic funds transfer services will apply to electronic check transactions, except the $50 and $500 limits of liability for unauthorized transactions in Section 9. You remain responsible for notifying us of any unauthorized electronic check transaction shown on your statement.