HOW WE WANT TO LIVE AND SHARE NONVIOLENT COMMUNICATION Sample Clauses

HOW WE WANT TO LIVE AND SHARE NONVIOLENT COMMUNICATION. By signing this agreement, as a CT I agree to align my actions with the CNVC Mission Statement, Code of Ethics, and Goals: 1. Mission Statement and Code of Ethics CNVC strives for all of our operations, activities, and programs to be based on mutual consideration of human needs in harmony with the consciousness of Nonviolent Communication. Therefore, CNVC longs for all relationships with Certified Trainers and participants to be based on honesty and empathy within the context of keeping to this Trainer Agreement.

Related to HOW WE WANT TO LIVE AND SHARE NONVIOLENT COMMUNICATION

  • Incident Event and Communications Management a. Incident Management/Notification of Breach - DST shall develop, implement and maintain an incident response plan that specifies actions to be taken when DST or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following: i. Escalation Procedures - An escalation procedure that includes notification to senior managers and appropriate reporting to regulatory and law enforcement agencies. This procedure shall provide for reporting of incidents that compromise the confidentiality of Fund Data (including backed up data) to Fund via telephone or email (and provide a confirmatory notice in writing as soon as practicable); provided that the foregoing notice obligation is excused for such period of time as DST is prohibited by law, rule, regulation or other governmental authority from notifying Fund. ii. Incident Reporting - DST will use commercially reasonable efforts to promptly furnish to Fund information that DST has regarding the general circumstances and extent of such unauthorized access to the Fund Data.

  • LICENSE HOLDER CONTACT INFORMATION This notice is being provided for information purposes. It does not create an obligation for you to use the broker’s services. Please acknowledge receipt of this notice below and retain a copy for your records.

  • Proxies and Notices; Compliance with the Shareholders Communication Act of 1985 The Custodian shall deliver or cause to be delivered to the appropriate Fund, or its designated agent or proxy service provider, all forms of proxies, all notices of meetings, and any other notices or announcements affecting or relating to Securities owned by such Fund that are received by the Custodian and, upon receipt of Instructions, the Custodian shall execute and deliver, or cause a Subcustodian or nominee to execute and deliver such proxies or other authorizations as may be required. Except as directed pursuant to Instructions, the Custodian shall not vote upon any such Securities, or execute any proxy to vote thereon, or give any consent or take any other action with respect thereto. The Custodian will not release the identity of any Fund to an issuer which requests such information pursuant to the Shareholder Communications Act of 1985 for the specific purpose of direct communications between such issuer and any such Fund unless a particular Fund directs the Custodian otherwise pursuant to Instructions.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Testing-the-Waters Communications If at any time following the distribution of any Written Testing-the-Waters Communication there occurred or occurs an event or development as a result of which such Written Testing-the-Waters Communication included or would include an untrue statement of a material fact or omitted or would omit to state a material fact necessary in order to make the statements therein, in the light of the circumstances existing at that subsequent time, not misleading, the Company shall promptly notify the Representative and shall promptly amend or supplement, at its own expense, such Written Testing-the-Waters Communication to eliminate or correct such untrue statement or omission.

  • Subpoenas Directed to BellSouth Where BellSouth provides resold services or local switching for <<customer_name>>, BellSouth shall respond to subpoenas and court ordered requests delivered directly to BellSouth for the purpose of providing call detail records when the targeted telephone numbers belong to <<customer_name>> end users. Billing for such requests will be generated by BellSouth and directed to the law enforcement agency initiating the request. BellSouth shall maintain such information for <<customer_name>> end users for the same length of time it maintains such information for its own end users.

  • Consent to Emails and Automated Text Messages By participating as a Zelle User, you represent that you are the owner of the email address, mobile phone number, and/or other alias you enroll, or that you have the delegated legal authority to act on behalf of the owner of such email address, mobile phone number and/or other alias to send or receive money as described in this Agreement. You consent to the receipt of emails or text messages from us, from Zelle, from other Users that are sending you money or requesting money from you, and from other Network Banks or their agents regarding the Zelle Service or related transfers between Network Banks and you. You agree that we, Zelle, or either of our agents may use automatic telephone dialing systems in connection with text messages sent to any mobile phone number you enroll. You further acknowledge and agree: ▪ You are responsible for any fees or other charges that your wireless carrier may charge for any related data, text or other message services, including without limitation for short message service. Please check your mobile service agreement for details or applicable fees. ▪ You will immediately notify us if any email address or mobile phone number you have enrolled is (i) surrendered by you, or (ii) changed by you. ▪ In the case of any messages that you may send through either us or Zelle or that we may send or Zelle may send on your behalf to an email address or mobile phone number, you represent that you have obtained the consent of the recipient of such emails or automated text messages to send such emails or text messages to the recipient. You understand and agree that any emails or text messages that we send or that Xxxxx sends on your behalf may include your name. ▪ Your wireless carrier is not liable for any delay or failure to deliver any message sent to or from us or Zelle, including messages that you may send through us or through Zelle or that we may send or Zelle may send on your behalf. ▪ To cancel text messaging from us, text STOP to 20736. For help or information regarding text messaging, text HELP to 20736 or contact our customer service at 0.000.000.0000 or 0.000.000.0000. You expressly consent to receipt of a text message to confirm your “STOP” request. ▪ Our Zelle notifications are supported by many carriers, such as AT&T, Verizon Wireless, T- Mobile, and Sprint. Check with your individual carrier to confirm availability. ▪ We or Zelle may use information on file with your wireless operator to further verify your identity and to protect against or prevent actual or potential fraud or unauthorized use of the Zelle Service. By using the Zelle Service, you authorize your wireless operator (AT&T, Sprint, T-Mobile, US Cellular, Verizon, or any other branded wireless operator) to disclose your mobile number, name, address, email, network status, customer type, customer role, billing type, mobile device identifiers (IMSI and IMEI) and other subscriber status and device details, if available, to our third party service provider solely to allow verification of your identity and to compare information you have provided to us or to Zelle with your wireless operator account profile information for the duration of our business relationship. See Xxxxx’x Privacy Policy [xxxxx://xxx.xxxxxxxx.xxx/privacy-policy] for how it treats your data. Please review our Privacy Policy for more information.

  • Your Rights and Our Responsibilities After We Receive Your Written Notice We must acknowledge your letter within 30 days, unless we have corrected the error by then. Within 90 days, we must either correct the error or explain why we believe the bill was correct. After we receive your letter, we cannot try to collect any amount you question, or report you as delinquent. We can continue to bill you for the amount you question, including finance charges and we can apply any unpaid amount against your credit limit. You do not have to pay any questioned amount while we are investigating, but you are still obligated to pay the parts of your bill that are not in question. If we find that we made a mistake on your bill, you will not have to pay any finance charges related to any questioned amount. If we didn’t make a mistake, you may have to pay finance charges, and you will have to make up any missed payments on the questioned amount. In either case, we will send you a statement of the amount you owe and the date that it is due. If you fail to pay the amount that we think you owe, we may report you as delinquent. However, if our explanation does not satisfy you and you write to us within ten days telling us that you still refuse to pay, we must tell anyone we report you to that you have a question about your bill. In addition, we must tell you the name of anyone we reported you to. Upon settlement of a disputed bill, we must notify anyone we reported you to that the matter has been settled. If we don’t follow these rules, we can’t collect the first $50 of the questioned amount, even if your bill was correct.

  • Authorization to Release and Transfer Necessary Personal Information The Grantee hereby explicitly and unambiguously consents to the collection, use and transfer, in electronic or other form, of the Grantee’s personal data by and among, as applicable, the Company and its Subsidiaries for the exclusive purpose of implementing, administering and managing the Grantee’s participation in the Plan. The Grantee understands that the Company may hold certain personal information about the Grantee, including, but not limited to, the Grantee’s name, home address and telephone number, date of birth, social security number (or any other social or national identification number), salary, nationality, job title, number of Award Units and/or shares of Common Stock held and the details of all Award Units or any other entitlement to shares of Common Stock awarded, cancelled, vested, unvested or outstanding for the purpose of implementing, administering and managing the Grantee’s participation in the Plan (the “Data”). The Grantee understands that the Data may be transferred to the Company or to any third parties assisting in the implementation, administration and management of the Plan, that these recipients may be located in the Grantee’s country or elsewhere, and that any recipient’s country (e.g., the United States) may have different data privacy laws and protections than the Grantee’s country. The Grantee understands that he or she may request a list with the names and addresses of any potential recipients of the Data by contacting his or her local human resources representative or the Company’s stock plan administrator. The Grantee authorizes the recipients to receive, possess, use, retain and transfer the Data, in electronic or other form, for the sole purpose of implementing, administering and managing the Grantee’s participation in the Plan, including any requisite transfer of such Data to a broker or other third party assisting with the administration of Award Units under the Plan or with whom shares of Common Stock acquired pursuant to the vesting of the Award Units or cash from the sale of such shares may be deposited. Furthermore, the Grantee acknowledges and understands that the transfer of the Data to the Company or to any third parties is necessary for the Grantee’s participation in the Plan. The Grantee understands that the Grantee may, at any time, view the Data, request additional information about the storage and processing of the Data, require any necessary amendments to the Data or refuse or withdraw the consents herein by contacting the Grantee’s local human resources representative or the Company’s stock plan administrator in writing. The Grantee further acknowledges that withdrawal of consent may affect his or her ability to vest in or realize benefits from the Award Units, and the Grantee’s ability to participate in the Plan. For more information on the consequences of refusal to consent or withdrawal of consent, the Grantee understands that he or she may contact his or her local human resources representative or the Company’s stock plan administrator.

  • Communications and Operations Management a. Network Penetration Testing - DST shall, on approximately an annual basis, contract with an independent third party to conduct a network penetration test on its network having access to or holding or containing Fund Data. DST shall have a process to review and evaluate high risk findings resulting from this testing.