Exception Handling. 16.1. While it is expected the Service Levels will be applied to all portfolio transfer activity, there may be times when the Participants decide to ‘opt out’ of some aspects. If the activity relates to one of the exceptions listed in section 6 (Exception Handling), such as dealing with a bulk client portfolio transfer request, then the process in section 6 will apply. If the Participants want to opt out of complying with the Service Levels in any other circumstance, this can only be done in accordance with the Contract Terms (which includes notifying TeX of the agreement to opt out within 2 Business Days).
Exception Handling. Notwithstanding anything to the contrary set forth in Section 4.1(a), if there is a Material Adverse Exception Event, then the rules and procedures set forth in this clause “(4.2)” shall determine the rights and obligations of the DAO Members relating to the DAO Property.
Exception Handling. 6.1.Where a Participant receives a request that cannot be processed (for instance due to invalid customer details), a reject notification should be issued to the sending party within the stated service level.
Exception Handling. Recovery and Back up BMP stores all information about a job in its database. At a restart, BMP starts from the last unprocessed file. For example, if a job consists of ten files and an error occurs at file three, BMP starts with file four at start-up. BMP also features on-line back up using internal BMP features. [LOGO OF CAP GEMINI ERNST & YOUNG] [LOGO OF EUROTEL] -------------------------------------------------------------------------------- Appendix III BMP 4.1 Product Description
Exception Handling. Requests for an exception to this Policy must include a documented business justification that is approved by business unit management and submitted to the Chief Risk Officer or designee for review. The Chief Risk Officer or designee will inform the approving department head of a decision within two business days of receiving the request. Approvals Policy Owners: Xxxx Xxxxxx, Managing Director and Chief Risk Officer Xxxxx Xxxxxx, Managing Director of Operations and Information Technology Effective Date: June 30, 2012 Table of Contents Acronyms & Definitions 3 Acceptable Use of Electronic Resources and the Internet Standard 5 Electronic Mail (E-Mail) Services Standard 6 Social Media Standard 7 Physical Security Standard 10 Proprietary Information Standard 12 Personally Identifiable Information Protection Standard 13 Servers, Laptops, Desktops Standard 15 Encryption Standard 17 Data Destruction Standard 18 Authentication and Verification Standard 21 Remote Access Standard 23 Access Rights Standard 25 Monitoring and Notification Standard 26 Online Student Loan Application Access Standard 28 Roles and Responsibilities Standard 29 Acronyms & Definitions Access Administrator - an authorized Workforce Member responsible for creating and managing system access accounts. Application Owner - the application’s largest stakeholder, usually the owner of the primary business functions served by the application. Auto- forward rule - setting up parameters in Microsoft Outlook to facilitate automated forwarding or redirection of any message, which matches specific characteristics, to another e-mail account. Chain email or letter - email sent to successive people. Typically the body of the note has direction to send out multiple copies of the note and promises good luck or money if the direction is followed. Data owner - person who can authorize or deny access to certain data and is responsible for its accuracy, integrity, and timeliness. Email - the electronic transmission of information through a mail protocol such as SMTP or IMAP. Encryption - process of making data unreadable except to those who have a way to decrypt it using a special process, usually referred to as a key. GRC - Governance, Risk & Compliance Intellectual Property - includes, but is not limited to, inventions, improvements, discoveries, methods, developments, software, and works of authorship, whether patentable, trademarkable, copyrightable or not, which are created, made, conceived or reduced to pract...
Exception Handling. 6.5 例外事項の取扱い
Exception Handling. 8.1. Exceptions Due to Errant CIS/AMS Data or Data that Can Not be Verified Exception events that result from errant CIS data will be handled in the following manner:
Exception Handling. Analysis of the capacity incidents/events to take the necessary measures to prevent their new occurrence • Early detection of capacity events • Periodical review with technical teams
Exception Handling. Exceptions to policy typically require a formal documentation process including a formal acceptance by the corporate owner of the system or process.
Exception Handling. Exceptions to this Policy must be approved by the Compliance Officer, or a designated person. All exceptions must be documented, with reasons for the exceptions, including expiration or review date and, wherever necessary, include an action plan and timelines for compliance with the policy. No accounts will be opened by UAB "MangoKing" for any User who appears on the United Nations Security Council’s ISIL (Xx’xxx) & Al-Qaida Sanctions List, or on its 1988 Sanctions List.