Enforcement Multi-Media Database Sample Clauses

Enforcement Multi-Media Database. To complete work on and implement the Office of Enforcement multi-media database and to ensure that the database is made available to compliance, program and enforcement staff throughout IDEM. Implementation and dissemination of new system (Completion Date: November 30, 1999) Status: 100% complete
AutoNDA by SimpleDocs

Related to Enforcement Multi-Media Database

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Enforcement Rights (a) At any time following the occurrence and during the continuation of a Termination Event: (i) the Administrator may direct the Obligors that payment of all amounts payable under any Pool Receivable is to be made directly to the Administrator or its designee, (ii) the Administrator may instruct the Seller or the Servicer to give notice of the Purchaser Groups’ interest in Pool Receivables to each Obligor, which notice shall direct that payments be made directly to the Administrator or its designee (on behalf of such Purchaser Groups), and the Seller or the Servicer, as the case may be, shall give such notice at the expense of the Seller or the Servicer, as the case may be; provided, that if the Seller or the Servicer, as the case may be, fails to so notify each Obligor, the Administrator (at the Seller’s or the Servicer’s, as the case may be, expense) may so notify the Obligors, (iii) the Administrator may request the Servicer to, and upon such request the Servicer shall: (A) assemble all of the records necessary or desirable to collect the Pool Receivables and the Related Security, and transfer or license to a successor Servicer the use of all software necessary or desirable to collect the Pool Receivables and the Related Security, and make the same available to the Administrator or its designee (for the benefit of the Purchasers) at a place selected by the Administrator, and (B) segregate all cash, checks and other instruments received by it from time to time constituting Collections in a manner acceptable to the Administrator and, promptly upon receipt, remit all such cash, checks and instruments, duly endorsed or with duly executed instruments of transfer, to the Administrator or its designee, and (iv) the Administrator may collect any amounts due from any Originator under the Sale Agreement. (b) The Seller hereby authorizes the Administrator (on behalf of each Purchaser Group), and irrevocably appoints the Administrator as its attorney-in-fact with full power of substitution and with full authority in the place and stead of the Seller, which appointment is coupled with an interest, to take any and all steps in the name of the Seller and on behalf of the Seller necessary or desirable, in the determination of the Administrator, after the occurrence and during the continuation of a Termination Event, to collect any and all amounts or portions thereof due under any and all Pool Assets, including endorsing the name of the Seller on checks and other instruments representing Collections and enforcing such Pool Assets. Notwithstanding anything to the contrary contained in this Section 4.4(b), none of the powers conferred upon such attorney-in-fact pursuant to the preceding sentence shall subject such attorney-in-fact to any liability if any action taken by it shall prove to be inadequate or invalid, nor shall they confer any obligations upon such attorney-in-fact in any manner whatsoever.

  • Government End Users The Apple Software and related documentation are “Commercial Items”, as that term is defined at 48 C.F.R. §2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation”, as such terms are used in 48 C.F.R. §12.212 or 48

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format:

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Posting licensed content on any Website The following terms and conditions apply as follows: Licensing material from an Elsevier journal: All content posted to the web site must maintain the copyright information line on the bottom of each image; A hyper-text must be included to the Homepage of the journal from which you are licensing at xxxx://xxx.xxxxxxxxxxxxx.xxx/science/journal/xxxxx or the Elsevier homepage for books at xxxx://xxx.xxxxxxxx.xxx; Central Storage: This license does not include permission for a scanned version of the material to be stored in a central repository such as that provided by Heron/XanEdu. Licensing material from an Elsevier book: A hyper-text link must be included to the Elsevier homepage at xxxx://xxx.xxxxxxxx.xxx . All content posted to the web site must maintain the copyright information line on the bottom of each image.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Enforcement of Intellectual Property Rights I will cooperate fully with the Company, both during and after my employment with the Company, with respect to the procurement, maintenance and enforcement of Intellectual Property Rights in Company-Related Developments. I will sign, both during and after the term of this Agreement, all papers, including without limitation copyright applications, patent applications, declarations, oaths, assignments of priority rights, and powers of attorney, which the Company may deem necessary or desirable in order to protect its rights and interests in any Company-Related Development. If the Company is unable, after reasonable effort, to secure my signature on any such papers, I hereby irrevocably designate and appoint each officer of the Company as my agent and attorney-in-fact to execute any such papers on my behalf, and to take any and all actions as the Company may deem necessary or desirable in order to protect its rights and interests in any Company-Related Development.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!