EMERGENCY CITIZEN INFORMATION CENTER Sample Clauses

EMERGENCY CITIZEN INFORMATION CENTER. During times of declared emergencies, the County operates a citizen call center, the Citizen Information Center (“CIC”) which is staffed by County employees. Sheriff may elect, in his sole discretion, to provide Sheriff Employees to assist at the CIC. If the Sheriff elects to provide any Sheriff Employees to the CIC, the Sheriff shall cover all costs incurred to provide such employees from his existing budget.
AutoNDA by SimpleDocs
EMERGENCY CITIZEN INFORMATION CENTER. During times of declared emergencies, the County operates a citizen call center, the Citizen Information Center (“CIC”) which is staffed by County employees. Property Appraiser may elect, in his sole discretion, to provide Property Appraiser Employees to assist at the CIC. If the Property Appraiser elects to provide any Property Appraiser Employees to the CIC, the Property Appraiser shall cover all costs incurred to provide such employees from his existing budget.

Related to EMERGENCY CITIZEN INFORMATION CENTER

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Emergency Contact Information Resident must complete and provide to University an emergency contact information form provided by University Housing before Resident will be allowed to move into the Residence Facility.

  • Project Information Except for confidential information designated by the City as information not to be shared, Consultant agrees to share Project information with, and to fully cooperate with, those corporations, firms, contractors, public utilities, governmental entities, and persons involved in or associated with the Project. No information, news, or press releases related to the Project, whether made to representatives of newspapers, magazines, or television and radio stations, shall be made without the written authorization of the City’s Project Manager.

  • Emergency Care If you need emergency care, call 911 or go to the nearest hospital emergency room. If you are traveling outside our service area and need urgent care, call the Customer Service number provided in the chart above or visit our website and use the “Find A Doctor” feature to find a BlueCard provider.

  • How Do I Get More Information? This Notice summarizes the Action, the terms of the Settlements, and your rights and options in connection with the Settlements. More details are in the Settlement Agreements, which are available for your review at xxx.XxxxxxxxxXxxXxxxxxxxxXxxxxxxxxx.xxx. The Settlement Website also has the Second Amended Complaint and other documents relating to the Settlements. You may also call toll-free 0-000-000-0000 or write the Claims Administrator at: Financial Aid Antitrust Settlements, c/o Claims Administrator, 0000 Xxxx Xxxxxx, Xxxxx 0000, Xxxxxxxxxxxx, XX 00000. To: Settlement Class Member Email Address From: Claims Administrator Subject: Notice of Proposed Class Action Settlement – Xxxxx, et al. x. Xxxxx University, et al. Please visit xxx.XxxxxxxxxXxxXxxxxxxxxXxxxxxxxxx.xxx for more information. • The Court has preliminarily approved proposed settlements (“Settlements”) with the following ten schools: Brown University, the University of Chicago, the Trustees of Columbia University in the City of New York, Trustees of Dartmouth College, Duke University, Emory University, Northwestern University, Xxxxxxx Xxxxx Xxxx University, Vanderbilt University, and Yale University (collectively the “Settling Universities”). • The Court has also preliminarily approved a class of students who attended one or more of the Settling Universities during certain time periods. This is referred to as the “Settlement Class,” which is defined in more detail below.

  • DEFECTIVE MANAGEMENT INFORMATION 5.1 The Supplier acknowledges that it is essential that the Authority receives timely and accurate Management Information pursuant to this Framework Agreement because Management Information is used by the Authority to inform strategic decision making and allows it to calculate the Management Charge.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Basic Financial Information and Reporting (a) The Company will maintain true books and records of account in which full and correct entries will be made of all its business transactions pursuant to a system of accounting established and administered in accordance with generally accepted accounting principles consistently applied, and will set aside on its books all such proper accruals and reserves as shall be required under generally accepted accounting principles consistently applied. (b) As soon as practicable after the end of each fiscal year of the Company, and in any event within one hundred twenty (120) days thereafter, the Company will furnish each Investor a balance sheet of the Company, as at the end of such fiscal year, and a statement of income and a statement of cash flows of the Company, for such year, all prepared in accordance with generally accepted accounting principles consistently applied and setting forth in each case in comparative form the figures for the previous fiscal year, all in reasonable detail. Such financial statements shall be accompanied by a report and opinion thereon by independent public accountants of national standing selected by the Company's Board of Directors. (c) The Company will furnish each Investor, as soon as practicable after the end of the first, second and third quarterly accounting periods in each fiscal year of the Company, and in any event within forty-five (45) days thereafter, a balance sheet of the Company as of the end of each such quarterly period, and a statement of income and a statement of cash flows of the Company for such period and for the current fiscal year to date, prepared in accordance with generally accepted accounting principles, with the exception that no notes need be attached to such statements and year-end audit adjustments may not have been made. (d) So long as an Investor (with its Affiliates) shall own not less than five hundred thousand (500,000) shares of Registrable Securities (as adjusted for stock splits and combinations) (a "MAJOR INVESTOR"), the Company will furnish each such Major Investor (i) at least thirty (30) days prior to the beginning of each fiscal year an annual budget and operating plans for such fiscal year (and as soon as available, any subsequent revisions thereto); and (ii) as soon as practicable after the end of each month, and in any event within twenty (20) days thereafter, a balance sheet of the Company as of the end of each such month, and a statement of income and a statement of cash flows of the Company for such month and for the current fiscal year to date, including a comparison to plan figures for such period, prepared in accordance with generally accepted accounting principles consistently applied, with the exception that no notes need be attached to such statements and year-end audit adjustments may not have been made. (e) So long as any Series B Investor (with its Affiliates) owns any shares of Registrable Securities, the Company will furnish to three (3) Investors appointed by Atlas (as designated in writing to the Company) (i) at least thirty (30) days prior to the beginning of each fiscal year an annual budget and operating plans for such fiscal year (and as soon as available, any subsequent revisions thereto); and (ii) as soon as practicable after the end of each month, and in any event within twenty (20) days thereafter, a balance sheet of the Company as of the end of each such month, and a statement of income and a statement of cash flows of the Company for such month and for the current fiscal year to date, including a comparison to plan figures for such period, prepared in accordance with generally accepted accounting principles consistently applied, with the exception that no notes need be attached to such statements and year end audit adjustments may not have been made; provided, however, that after the termination of that certain Consulting Agreement (the "Consulting Agreement") between the Company and Atlas, dated as of April 19, 1999, Investors who are holders of Registrable Securities issued or issuable upon conversion of Series B Stock, or upon exercise of the Warrants, shall only be furnished with balance sheets and statements of income pursuant to this subsection (e).

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!