SHIPPING AND AIR TRANSPORT 1. Profits of an enterprise of a Contracting State from the operation of ships or aircraft in international traffic shall be taxable only in that State. 2. The provisions of paragraph 1 shall also apply to profits from the participation in a pool, a joint business or an international operating agency.
White Pages Listings 5.1 BellSouth shall provide <<customer_name>> and their customers access to white pages directory listings under the following terms:
Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.
Gold Open Access Articles May be shared according to the author-selected end-user license and should contain a CrossMark logo, the end user license, and a DOI link to the formal publication on ScienceDirect. Please refer to Elsevier's posting policy for further information.
DELIVERY, STORAGE, AND HANDLING The Contractor shall be responsible to inspect all components on delivery to ensure that no damage occurred during shipping or handling for furnish and installation projects. For equipment only purchases, the ordering entity shall be responsible to inspect all components on delivery. Materials must be stored in original undamaged packaging in such a manner to ensure proper ventilation and drainage, and to protect against damage, weather, vandalism, and theft until ready for installation.
Counterparts; Integration; Effectiveness; Electronic Execution This Agreement may be executed in counterparts (and by different parties hereto on different counterparts), each of which shall constitute an original, but all of which when taken together shall constitute a single contract. This Agreement, the other Loan Documents and any separate letter agreements with respect to fees payable to the Administrative Agent constitute the entire contract among the parties relating to the subject matter hereof and supersede any and all previous agreements and understandings, oral or written, relating to the subject matter hereof. Except as provided in Section 4.01, this Agreement shall become effective when it shall have been executed by the Administrative Agent and when the Administrative Agent shall have received counterparts hereof which, when taken together, bear the signatures of each of the other parties hereto, and thereafter shall be binding upon and inure to the benefit of the parties hereto and their respective successors and assigns. Delivery of an executed counterpart of a signature page of this Agreement by telecopy, e-mailed .pdf or any other electronic means that reproduces an image of the actual executed signature page shall be effective as delivery of a manually executed counterpart of this Agreement. The words “execution,” “signed,” “signature,” “delivery,” and words of like import in or relating to any document to be signed in connection with this Agreement and the transactions contemplated hereby shall be deemed to include Electronic Signatures, deliveries or the keeping of records in electronic form, each of which shall be of the same legal effect, validity or enforceability as a manually executed signature, physical delivery thereof or the use of a paper-based recordkeeping system, as the case may be, to the extent and as provided for in any applicable law, including the Federal Electronic Signatures in Global and National Commerce Act, the New York State Electronic Signatures and Records Act, or any other similar state laws based on the Uniform Electronic Transactions Act.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
DNSSEC Registry Operator shall sign its TLD zone files implementing Domain Name System Security Extensions (“DNSSEC”). During the Term, Registry Operator shall comply with RFCs 4033, 4034, 4035, 4509 and their successors, and follow the best practices described in RFC 4641 and its successors. If Registry Operator implements Hashed Authenticated Denial of Existence for DNS Security Extensions, it shall comply with RFC 5155 and its successors. Registry Operator shall accept public-‐key material from child domain names in a secure manner according to industry best practices. Registry shall also publish in its website the DNSSEC Practice Statements (DPS) describing critical security controls and procedures for key material storage, access and usage for its own keys and secure acceptance of registrants’ public-‐key material. Registry Operator shall publish its DPS following the format described in XXX 0000.
COVID-19 Employees of Contractor and/or persons working on its behalf, including, but not limited to, subcontractors (collectively, “Contractor Personnel”), while performing services under this Agreement and prior to interacting in person with City employees, contractors, volunteers, or members of the public (collectively, “In-Person Services”) must be fully vaccinated against the novel coronavirus 2019 (“COVID-19”). “Fully vaccinated” means that 14 or more days have passed since Contractor Personnel have received the final dose of a two-dose COVID-19 vaccine series (Moderna or Pfizer-BioNTech) or a single dose of a one-dose COVID-19 vaccine (Xxxxxxx & Xxxxxxx/Xxxxxxx) and all booster doses recommended by the Centers for Disease Control and Prevention. Prior to assigning Contractor Personnel to perform In-Person Services, Contractor shall obtain proof that such Contractor Personnel have been fully vaccinated. Contractor shall retain such proof for the document retention period set forth in this Agreement. Contractor shall grant medical or religious exemptions (“Exemptions”) to Contractor Personnel as required by law. If Contractor wishes to assign Contractor Personnel with Exemptions to perform In- Person Services, Contractor shall require such Contractor Personnel to undergo weekly COVID-19 testing, with the full cost of testing to be borne by Contractor. If Contractor Personnel test positive, they shall not be assigned to perform In-Person Services or, to the extent they have already been performing In-Person Services, shall be immediately removed from those assignments. Furthermore, Contractor shall immediately notify City if Contractor Personnel performing In-Person Services (1) have tested positive for or have been diagnosed with COVID-19, (2) have been informed by a medical professional that they are likely to have COVID-19, or (3) meet the criteria for isolation under applicable government orders.