Inclusion in FIA Sample Clauses

Inclusion in FIA. (1) When barriers are identified during assessment, removal or management of the barrier shall be part of the FIA from the beginning.
AutoNDA by SimpleDocs

Related to Inclusion in FIA

  • Inclusion in Subcontracts To the extent any of the services required of CONTRACTOR under this Agreement are subcontracted to a third party, CONTRACTOR shall include all of the provisions of this Paragraph 19 in all such subcontracts as obligations of the subcontractor.

  • Qualification in State Each of the Company and any Sponsor Affiliates warrant that it is duly qualified to do business in the State, and covenants that it will continue to be so qualified so long as it operates any portion of the Project.

  • Inclusion and accessibility The institution will provide support to incoming mobile participants with fewer opportunities, according to the requirements of the Erasmus Charter for Higher Education. Information and assistance can be provided by the following contact points and information sources: Country Available infrastructure adjusted for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- xxxx://xxx.xxxxxxxxx.xxxx.xx/?la ng=en Country Available support services for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- ---

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • Inclusions Confidential Information includes, without limitation, the following information (including without limitation, compilations or collections of information) relating or belonging to any Company Party (as well as their clients, customers and/or vendors) and created, prepared, accessed, used or reviewed by the Executive during or after the Employment Period: (1) product and manufacturing information, such as ingredients, combinations of ingredients and manufacturing processes; (2) scientific and technical information, such as research and development, tests and test results, formulae and formulations, studies and analysis; (3) financial and cost information, such as operating and production costs, costs of goods sold, costs of supplies and manufacturing materials, non-public financial statements and reports, profit and loss information, margin information and financial performance information; (4) customer related information, such as customer related contracts, engagement and scope of work letters, proposals and presentations, customer-related contacts, lists, identities and prospects, practices, plans, histories, requirements and needs, price information and formulae and information concerning client or customer products, services, businesses or equipment specifications; (5) vendor and supplier related information, such as the identities, practices, history or services of any vendors or suppliers and vendor or supplier contacts; (6) sales, marketing and price information, such as marketing and sales programs and related data, sales and marketing strategies and plans, sales and marketing procedures and processes, pricing methods, practices and techniques and pricing schedules and lists; (7) database, software and other computer related information, such as computer programs, data, compilations of information and records, software and computer files, presentation software and computer-stored or backed-up information including, but not limited to, e-mails, databases, word processed documents, spreadsheets, notes, schedules, task lists, images and video; (8) employee-related information, such as lists or directories identifying employees, representatives and contractors, and information regarding the competencies (knowledge, skill, experience), compensation and needs of employees, representatives and contractors and training methods; and (9) business- and operation-related information, such as operating methods, procedures, techniques, practices and processes, information about acquisitions, corporate or business opportunities, information about partners and potential investors, strategies, projections and related documents, contracts and licenses and business records, files, equipment, notebooks, documents, memoranda, reports, notes, sample books, correspondence, lists and other written and graphic business records.

  • Certification as Small Contractor or Minority Business Enterprise This paragraph was intentionally left blank.

  • Removal After Your Tax Filing Deadline If you are correcting an excess contribution after your tax filing deadline, including extensions, remove only the amount of the excess contribution. The six percent excess contribution penalty tax will be imposed on the excess contribution for each year it remains in the IRA. An excess withdrawal under this method will only be taxable to you if the total contributions made in the year of the excess exceed the annual applicable contribution limit.

  • Cooperation in Drafting The Parties have cooperated in the drafting and preparation of this Agreement. This Agreement will not be construed against any Party on the basis that the Party was the drafter or participated in the drafting.

  • COOPERATION IN IMPLEMENTATION On demand of the other Spouse and without undue delay or expense, each Spouse shall execute, acknowledge, or deliver any instrument, furnish any information, or perform any other acts reasonably necessary to carry out the provisions of this Agreement. If a Spouse fails to execute any document as required by this provision, the court may appoint the court clerk or his or her authorized designee to execute the document on that Xxxxxx’s behalf.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

Time is Money Join Law Insider Premium to draft better contracts faster.