Limited Private Use Sample Clauses

Limited Private Use. Where the employee is entitled only to limited private use to the vehicle the benefit accruing to the employee is calculated as follows:
AutoNDA by SimpleDocs

Related to Limited Private Use

  • Use of Private Vehicles Whenever practicable, State-owned or contracted vehicles shall be made available to ASF Members required to travel on behalf of the Employer. The Employer may elect to allow ASF Members to utilize personal vehicles on a case-by-case basis and reimburse the mileage resulting at the rates provided under the travel regulations. Except for emergency circumstances, or when defined by the Employer as a condition of employment, an ASF Member shall not be required to use a personal vehicle for university purposes.

  • PRINCIPAL BUILDING AGREEMENT DEFINITIONS Definitions and interpretation (Clause 1). 1 F: ……….… V: ….……… T: ….……... Item

  • Local Number Portability Database 10.6.1 The Permanent Number Portability (PNP) database supplies routing numbers for calls involving numbers that have been ported from one local service provider to another. BellSouth agrees to provide access to the PNP database at rates, terms and conditions as set forth by BellSouth and in accordance with an effective FCC or Commission directive.

  • Purpose of Attachment Facilities Except as may be required by Applicable Laws and Regulations, or as otherwise agreed to among the Parties, the Attachment Facilities shall be constructed for the sole purpose of interconnecting the Large Generating Facility to the New York State Transmission System and shall be used for no other purpose.

  • Manner of Conveyance; Limited Warranty; Nonrecourse; Etc THE CONVEYANCE OF ALL ASSETS, INCLUDING REAL AND PERSONAL PROPERTY INTERESTS, PURCHASED BY THE ASSUMING INSTITUTION UNDER THIS AGREEMENT SHALL BE MADE, AS NECESSARY, BY RECEIVER'S DEED OR RECEIVER'S XXXX OF SALE, "AS IS", "WHERE IS", WITHOUT RECOURSE AND, EXCEPT AS OTHERWISE SPECIFICALLY PROVIDED IN THIS AGREEMENT, WITHOUT ANY WARRANTIES WHATSOEVER WITH RESPECT TO SUCH ASSETS, EXPRESS OR IMPLIED, WITH RESPECT TO TITLE, ENFORCEABILITY, COLLECTIBILITY, DOCUMENTATION OR FREEDOM FROM LIENS OR ENCUMBRANCES (IN WHOLE OR IN PART), OR ANY OTHER MATTERS.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Bulk Registration Data Access to Icann Periodic Access to Thin Registration Data. In order to verify and ensure the operational stability of Registry Services as well as to facilitate compliance checks on accredited registrars, Registry Operator will provide ICANN on a weekly basis (the day to be designated by ICANN) with up-to-date Registration Data as specified below. Data will include data committed as of 00:00:00 UTC on the day previous to the one designated for retrieval by ICANN.

  • Connecting Transmission Owner’s Attachment Facilities Construction The Connecting Transmission Owner’s Attachment Facilities shall be designed and constructed in accordance with Good Utility Practice. Upon request, within one hundred twenty (120) Calendar Days after the Commercial Operation Date, unless the Connecting Transmission Owner and Developer agree on another mutually acceptable deadline, the Connecting Transmission Owner shall deliver to the Developer “as-built” drawings, relay diagrams, information and documents for the Connecting Transmission Owner’s Attachment Facilities set forth in Appendix A. The Connecting Transmission Owner [shall/shall not] transfer operational control of the Connecting Transmission Owner’s Attachment Facilities and Stand Alone System Upgrade Facilities to the NYISO upon completion of such facilities.

  • Conversion of Live Telephone Exchange Service to Analog 2W Loops The following coordination procedures shall apply to “live” cutovers of VERIZON Customers who are converting their Telephone Exchange Services to SPRINT Telephone Exchange Services provisioned over Analog 2W unbundled Local Loops (“Analog 2W Loops”) to be provided by VERIZON to SPRINT.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.