Evidence Required Prior to execution of the Agreement, the Consultant shall file with the City evidence of insurance from an insurer or insurers certifying to the coverage of all insurance required herein. Such evidence shall include original copies of the ISO CG 00 01 (or insurer’s equivalent) signed by the insurer’s representative and Certificate of Insurance (Xxxxx Form 25-S or equivalent), together with required endorsements. All evidence of insurance shall be signed by a properly authorized officer, agent, or qualified representative of the insurer and shall certify the names of the insured, any additional insureds, where appropriate, the type and amount of the insurance, the location and operations to which the insurance applies, and the expiration date of such insurance.
Evidence and Conditions F19.9 An employee should discuss with their manager/supervisor, as soon as practicable, their intention to be absent on grandparental leave.
Evidence requirements An Employee taking sick leave will give the Employer evidence that would satisfy a reasonable person the Employee is absent due to personal illness or injury, in the case of leave taken to attend an appointment (see subclause 61.5(b)) evidence of attendance. Evidence that would satisfy a reasonable person that the Employee is absent due to personal illness or injury includes:
Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.
Requirements Pertaining Only to Federal Grants and Subrecipient Agreements If this Agreement is a grant that is funded in whole or in part by Federal funds:
Evidence In any prosecution under this Part an averment in the prosecution notice —
Requesting Paper Copies If you would like a paper copy of a Communication we previously sent you electronically, you may print it. You may also request that we send you a paper copy by calling, emailing or writing us via any of the methods set forth in the Contacting Us section (Section 4(j)) below. Such a request must identify the specific electronic Communication for which you want a paper copy.
Electronic Funds Transfer Agreement If you want to reverse an electronic re-presented check, you must give us an affidavit within 15 days after we send or make available to you the periodic statement that reflects payment of that electronic re-presented check. In your affidavit, you must declare and swear under oath that the electronic re-presented check was ineligible or unauthorized. If we receive a proper notice or affidavit from you within the 15-day period, we will recredit your account with the amount of the charge. If you wish to stop payment on any electronic re-presented check, you must follow the procedures contained in this Agreement for stopping payment of checks, not the procedures for stopping payment on electronic loan or xxxx payments. If you ask us to request the depositor’s bank to send us the original paper check or a copy of the paper check, and we provide it to you, you agree that you will not seek to have your account recredited due to a prior stop payment order or if the item is otherwise ineligible for collection.
Further Assurances and Corrective Instruments Issuer and Company agree that they will, from time to time, execute, acknowledge and deliver, or cause to be executed, acknowledged and delivered, such supplements hereto and such further instruments as may reasonably be required for carrying out the intention of or facilitating the performance of this Agreement.
Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.