Immobilisation Sample Clauses

Immobilisation. A collision (impact against a fixed or moving object) causing overturning, swerving off the road or fire involving the insured vehicle, whether or not it was in traffic, with the direct consequence that the vehicle can no longer be driven or that driving it would constitute a danger as defined by the rules of the road.
AutoNDA by SimpleDocs

Related to Immobilisation

  • RECEIPTS AND BILLS OF LADING If requested by SHIPPER, BROKER agrees to provide SHIPPER with proof of acceptance and delivery of shipments in the form of a signed Xxxx of Lading or Proof of Delivery via US Mail, courier, or electronically by fax or email. SHIPPER’s insertion of BROKER’s name on the xxxx of lading shall be for SHIPPER convenience only and shall not change BROKER’s status as a property broker. The terms and conditions of any freight documentation used by BROKER or carrier selected by BROKER may not supplement, alter, or modify the terms of this Agreement.

  • BILLS OF LADING CARRIER shall sign a xxxx of lading, produced by shipper or CARRIER in compliance with 49 C.F.R. §373.101 (and any amendments thereto), for the property it receives for transportation under this Agreement. Unless otherwise agreed in writing, CARRIER shall become fully responsible/liable for the freight when it takes/receives possession thereof, and the trailer(s) is loaded, regardless of whether a xxxx of lading has been issued, and/or signed, and/or delivered to CARRIER, and which responsibility/liability shall continue until delivery of the shipment to the consignee and the consignee signs the xxxx of lading or delivery receipt. Any terms of the xxxx of lading (including but not limited to payment and credit terms, released rates or released value) inconsistent with the terms of this Agreement shall be ineffective. Failure to issue a xxxx of lading, or sign a xxxx of lading acknowledging receipt of the cargo, by CARRIER, shall not affect the liability of CARRIER.

  • Authorised Users individuals who are authorised by the Institution to access the Institution's information services whether on-site or off-site via Secure Authentication and who are affiliated to the Institution as a current student (including but not limited to undergraduates, postgraduates and guest students), member of staff (whether on a permanent or temporary basis including retired members of staff and any teacher who teaches Authorised Users) or contractor or registered user of the Institution. Persons who are not currently a student, member of staff, contractor or registered user of the Institution, but who are permitted to access the Institution's information services from computer terminals or otherwise within the physical premises of the Institution ["Walk-In Users"] are also deemed to be Authorised Users, only for the time they are within the physical premises of the Institution.

  • Onboarding The parties acknowledge that the City provides a new employee orientation (onboarding) to each new employee hired by the City. As such, the Union will be provided with not less than 10 calendar days’ advanced notice of the time, date, and location of the onboarding of any new employee represented by the Union. The Union will be given 30- minutes at the start of the new employee onboarding in a room designated by the City for no more than one (1) representative to present Union membership information. The City representative will excuse him or herself during the Union portion of the onboarding. The Union agrees in its portion of the onboarding not to engage in speech that could cause disruption or material interference with City activities. The City will provide 30 minutes of Union Release Time to the Union representative presenting the Union membership information during the scheduled onboarding. The Union shall provide the Union representative’s immediate supervisor with the Union representative’s name at least five (5) days prior to the onboarding. The Union representative shall be released for this purpose unless unusual operation needs interfere with such release in which case the Union representative’s immediate supervisor will provide a written explanation of why release could not be approved. If the Union representative is not released due to department operational needs, the Union representative may arrange an alternative date and time to meet with the newly hired employee within the first two

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • CONTRACTOR SUPERVISION Contractor shall provide competent supervision of personnel employed on the job Site, use of equipment, and quality of workmanship.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Requisition During any requisition for use or hire of the Aircraft, any Engine or Part which does not constitute an Event of Loss:

Time is Money Join Law Insider Premium to draft better contracts faster.