Handouts to Interstate Batteries Authorized Warranty Dealers Sample Clauses

Handouts to Interstate Batteries Authorized Warranty Dealers. On December 2, 2011, in accordance with the Court’s December 1, 2011 Order preliminarily approving the Original Settlement Agreement, Interstate Batteries posted an 8½ by 11 inch handout in its Memo Binder. That handout announced the proposed settlement and the Interstate Batteries Settlement Program and provided the URL for the Class Settlement Website.
AutoNDA by SimpleDocs
Handouts to Interstate Batteries Authorized Warranty Dealers. No later than 30 days after the entry of the Court’s new Preliminary Approval Order, Interstate Batteries will coordinate an outreach program for disseminating a new 8½ by 11 inch handout to more than 50,000 Interstate Batteries authorized warranty dealers. The Court-approved handout will announce the proposed settlement and the Interstate Batteries Settlement Program, and provide the URL for the Class Settlement Website. A proposed form of the handout is attached as Exhibit C. Interstate Batteries will post the handout, with accompanying instructions, in its electronic Memo Binder and request its distributors to print the handout and have the distributors’ route men and women deliver the handouts to Interstate Batteries authorized warranty dealers (in the United States and the District of Columbia) within the distributors’ territories. Interstate Batteries cannot compel its independent distributors or authorized warranty dealers to distribute or post handouts or provide Settlement Class Members with information about the settlement, but Interstate Batteries will request and encourage its distributors and authorized warranty dealers to do so. The instructions with the handout will request Interstate Batteries authorized warranty dealers to have the handout available in their stores until at least December 31, 2019, and to provide the handouts to anyone who asks about the Interstate Batteries class action settlement, expresses concern about the pro-rata warranty, or returns a failed original battery and wants to obtain a new Replacement Battery under the Previous Interstate Batteries’ Pro-Rata Warranty. Whether before or after the Final Judgment and Order, Interstate Batteries will have the right to make periodic, non-material modifications and changes to the handout, subject to approval by Class Counsel, which shall not be unreasonably withheld.
Handouts to Interstate Batteries Authorized Warranty Dealers. After 2012, Interstate Batteries will continue its outreach program for disseminating an 8½ by 11 inch handout to its authorized warranty dealers, as described in Section V.C.8. Each year from 2013 through 2019, Interstate Batteries will remind its distributors and authorized warranty dealers that the Interstate Batteries Settlement Program remains in existence and that eligible Settlement Class Members are still able to participate in that program. Interstate Batteries will use its Memo Binder and the dealers’ Application Guide to make this annual reminder of the Interstate Batteries Settlement Program and to urge authorized warranty dealers to follow the recommended procedures set forth in Section V.C.8.

Related to Handouts to Interstate Batteries Authorized Warranty Dealers

  • Bulk Registration Data Access to Icann Periodic Access to Thin Registration Data. In order to verify and ensure the operational stability of Registry Services as well as to facilitate compliance checks on accredited registrars, Registry Operator will provide ICANN on a weekly basis (the day to be designated by ICANN) with up-to-date Registration Data as specified below. Data will include data committed as of 00:00:00 UTC on the day previous to the one designated for retrieval by ICANN.

  • Vendor’s Authorized Resellers TIPS recognizes that many vendors operate in the open market through the use of resellers or dealers. For that reason, TIPS permits Vendor to authorize Authorized Resellers within its Vendor Portal and make TIPS Sales through the Authorized Reseller(s). Once authorized by Vendor in the Vendor Portal, the Authorized Reseller(s) may make TIPS sales to TIPS Members. However, all purchase documents must include: (1) Authorized Reseller’s Name; (2) Vendor’s Name, as known to TIPS, and; (3) Vendor’s TIPS Contract Name and Number under which it is making the TIPS Sale. Either Vendor or Reseller may report the sale pursuant to the terms herein. However, Xxxxxx agrees that it is legally responsible for all reporting and fee payment as described herein for TIPS Sales made by Authorized Resellers. The TIPS Administration Fee is assessed on the amount paid by the TIPS Member, not on the Vendor’s cost or on the amount for which the Vendor sold the item to a dealer or Authorized Reseller. The Parties intend that Vendor shall be responsible and liable for TIPS Sales made by Vendor’s Authorized Resellers. Vendor agrees that it is voluntarily authorizing this Authorized Reseller and in doing so, Xxxxxx agrees that it is doing so at its own risk and agrees to protect, indemnify, and hold TIPS harmless in accordance with Sections 14-17 above related to Authorized Reseller TIPS Sales made pursuant to this Agreement or purporting to be made pursuant to this Agreement that may be asserted against Vendor whether rightfully brought or otherwise. The Parties further agree that it is no defense to Vendor’s breach of this Agreement that an Authorized Reseller caused Vendor of breach this Agreement.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Communications Relating to Portfolio Securities Subject to the provisions of Section 2.3, the Custodian shall transmit promptly to the Fund for each Portfolio all written information (including, without limitation, pendency of calls and maturities of domestic securities and expirations of rights in connection therewith and notices of exercise of call and put options written by the Fund on behalf of the Portfolio and the maturity of futures contracts purchased or sold by the Portfolio) received by the Custodian from issuers of the securities being held for the Portfolio. With respect to tender or exchange offers, the Custodian shall transmit promptly to the Portfolio all written information received by the Custodian from issuers of the securities whose tender or exchange is sought and from the party (or his agents) making the tender or exchange offer. If the Portfolio desires to take action with respect to any tender offer, exchange offer or any other similar transaction, the Portfolio shall notify the Custodian at least three business days prior to the date on which the Custodian is to take such action.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • WASHINGTON’S ELECTRONIC BUSINESS SOLUTION (WEBS). Contractor represents and warrants that it is registered in Washington’s Electronic Business Solution (WEBS), Washington’s contract registration system and that, all of its information therein is current and accurate and that throughout the term of this Master Contract, Contractor shall maintain an accurate profile in WEBS.

  • Authorized Sub-processors Customer agrees that MailChimp may engage Sub-processors to process Customer Data on Customer's behalf. The Sub-processors currently engaged by MailChimp and authorized by Customer are listed in Annex A.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • Certification of Meeting or Exceeding Tobacco-Free Workplace Policy Minimum Standards A. Grantee certifies that it has adopted and enforces a Tobacco-Free Workplace Policy that meets or exceeds all of the following minimum standards of: i. Prohibiting the use of all forms of tobacco products, including but not limited to cigarettes, cigars, pipes, water pipes (hookah), bidis, kreteks, electronic cigarettes, smokeless tobacco, snuff and chewing tobacco; ii. Designating the property to which this Policy applies as a "designated area,” which must at least comprise all buildings and structures where activities funded under this Grant Agreement are taking place, as well as Grantee owned, leased, or controlled sidewalks, parking lots, walkways, and attached parking structures immediately adjacent to this designated area; iii. Applying to all employees and visitors in this designated area; and iv. Providing for or referring its employees to tobacco use cessation services. B. If Grantee cannot meet these minimum standards, it must obtain a waiver from the System Agency.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!