meminta nasihat daripada Pihak Xxxxxx dalam semua perkara berkenaan dengan jualan lelongan, termasuk Syarat-syarat Jualan (iii) membuat carian Hakmilik Xxxxx xxxxxx rasmi di Pejabat Tanah xxx/atau xxxx-xxxx Pihak-pihak Berkuasa yang berkenaan xxx (iv) membuat pertanyaan dengan Pihak Berkuasa yang berkenaan samada jualan ini terbuka kepada semua bangsa atau kaum Bumiputra Warganegara Malaysia sahaja atau melayu sahaja xxx juga mengenai persetujuan untuk jualan ini sebelum jualan lelong.Penawar yang berjaya ("Pembeli") dikehendaki dengan segera memohon xxx mendapatkan kebenaran pindahmilik (jika ada) daripada Pihak Pemaju xxx/atau Pihak Tuanpunya xxx/atau Pihak Berkuasa Negeri atau badan-badan berkenaan (v) memeriksa xxx memastikan samada jualan ini dikenakan cukai. HAKMILIK : Hakmilik strata bagi hartanah ini masih belum dikeluarkan HAKMILIK INDUK / NO. LOT : Pajakan Negeri 35263, Lot No.29096 MUKIM/DAERAH/NEGERI : Setapak / Kuala Lumpur / Wilayah Persekutuan Kuala Lumpur PEGANGAN : Pajakan selama 82-tahun berakhir pada 08/08/2085 KELUASAN LANTAI : 81.104 meter persegi ( 873 kaki persegi ) PEMAJU/PENJUAL : Mega Planner Jaya Sdn Bhd (326287-W)(Dalam Likuidasi) TUANPUNYA : Datuk Bandar Kuala Lumpur PEMBELI : Xxxxxxxx Bin Xxxxx @ Xxxx BEBANAN : Diserahhak kepada RHB Bank Berhad [196501000373 (6171-M)] Hartanah tersebut terletak di tingkat 9 pada bangunan apartment 14-tingkat terletak di Melati Impian Apartment, Setapak Fasa 1, Kuala Lumpur. Hartanah tersebut adalah sebuah unit apartment 3 xxxxx dikenali sebaga Xxxxx Pemaju No. 9, Tingkat No.9, Pembangunan dikenali sebagai Melati Impian Apartment Setapak Fasa 1, Kuala Lumpur xxx mempunyai alamat surat-xxxxxxxx xx Xxxx Xx. 0-0, Xxxxxx Impian Apartment, Xxxxx 0/00X, Xxxxx Xxxxxx, 00000 Xxxxx Xxxxxx, Xxxxxxx Xxxxxxxxxxx Xxxxx Xxxxxx. Harta ini dijual “keadaan seperti mana sediada” dengan harga rizab sebanyak RM 300,000.00 (RINGGIT MALAYSIA: TIGA RATUS RIBU SAHAJA) xxx tertakluk kepada syarat-syarat Jualan xxx melalui penyerahan hakkan dari Pemegang Serahak, tertakluk kepada kelulusan di perolehi oleh pihak Pembeli daripada pihak berkuasa, jika ada, termasuk semua terma, syarat xxx perjanjian yang dikenakan xxx mungkin dikenakan oleh Pihak Berkuasa yang berkenaan. Pembeli bertanggungjawab sepenuhnya untuk memperolehi xxx mematuhi syarat-syarat berkenaan daripada Pihak Berkuasa yang berkenaan, jika ada xxx semua xxx xxx perbelanjaan ditanggung xxx dibayar oleh Xxxxx Xxxxxxx.Pembeli atas talian (online) juga tertakluk kepada terma-terma xxx syarat-syarat terkandung dalam xxx.xxxxxxxxxxxxxxxx.xxx Pembeli yang berminat adalah dikehendaki mendeposit kepada Pelelong 10% daripada harga rizab dalam bentuk Bank Draf atau Cashier’s Order di atas nama RHB Bank Berhad sebelum lelongan awam xxx xxxx xxxx xxxxxx hendaklah dibayar dalam tempoh sembilan puluh (90) hari dari tarikh lelongan kepada RHB Bank Berhad melalui Bank Draf / XXXXXX. Butir-butir pembayaran melalui XXXXXX, xxxx berhubung dengan Tetuan Zahrin Emrad & Sujaihah. Untuk maklumat lanjut, xxxx berhubung dengan TETUAN ZAHRIN EMRAD & SUJIAHAH, yang beralamat di Suite 10.3, 10th Floor, Xxx Xxxx Building, Xx.00, Xxxxx Xxxx Xxxxxx, 00000 Xxxxx Xxxxxx. Tel: 00-0000 0000 / Fax: 00-0000 0000. [ Ruj: ZES/ZHR/RHB-FC/16250-17/0614-pae ], peguamcara bagi pihak pemegang xxxxx xxx atau pelelong yang tersebut dibawah.
Fifth Amended and Restated Limited Liability Company Operating Agreement Dated as of November 30, 2012
NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.
COVID-19 Vaccine Passports Pursuant to Texas Health and Safety Code, Section 161.0085(c), Contractor certifies that it does not require its customers to provide any documentation certifying the customer’s COVID-19 vaccination or post-transmission recovery on entry to, to gain access to, or to receive service from the Contractor’s business. Contractor acknowledges that such a vaccine or recovery requirement would make Contractor ineligible for a state-funded contract.
Cloud storage DSHS Confidential Information requires protections equal to or greater than those specified elsewhere within this exhibit. Cloud storage of Data is problematic as neither DSHS nor the Contractor has control of the environment in which the Data is stored. For this reason: (1) DSHS Data will not be stored in any consumer grade Cloud solution, unless all of the following conditions are met: (a) Contractor has written procedures in place governing use of the Cloud storage and Contractor attests in writing that all such procedures will be uniformly followed. (b) The Data will be Encrypted while within the Contractor network. (c) The Data will remain Encrypted during transmission to the Cloud. (d) The Data will remain Encrypted at all times while residing within the Cloud storage solution. (e) The Contractor will possess a decryption key for the Data, and the decryption key will be possessed only by the Contractor and/or DSHS. (f) The Data will not be downloaded to non-authorized systems, meaning systems that are not on either the DSHS or Contractor networks. (g) The Data will not be decrypted until downloaded onto a computer within the control of an Authorized User and within either the DSHS or Contractor’s network. (2) Data will not be stored on an Enterprise Cloud storage solution unless either: (a) The Cloud storage provider is treated as any other Sub-Contractor, and agrees in writing to all of the requirements within this exhibit; or, (b) The Cloud storage solution used is FedRAMP certified. (3) If the Data includes protected health information covered by the Health Insurance Portability and Accountability Act (HIPAA), the Cloud provider must sign a Business Associate Agreement prior to Data being stored in their Cloud solution.
Environmental Management (a) The Operator must, prior to the commencement of any Train Services (including any new or varied Train Services): (i) cause a suitably qualified person reasonably acceptable to both Parties to prepare a report (“Environmental Investigation and Risk Management Report”) containing an environmental investigation component and an environmental risk management component which respectively identify: (A) possible risks of Environmental Harm arising out of the proposed use of the Nominated Network by the Operator, including risks associated with those matters identified in Part 3 of Schedule 6; and (B) the manner in which the Operator proposes to address the possible risks of Environmental Harm identified in the Environmental Investigation and Risk Management Report as well as the roles and responsibilities, including financial responsibility, for the control measures proposed and an audit regime, provided that if the Operator has an existing Environmental Management System it proposes to use in connection with the proposed Train Services on the Nominated Network, the Environmental Investigation and Risk Management Report should also detail the extent to which the Operator believes its existing Environmental Management System addresses the risks identified in the Environmental Investigation and Risk Management Report; and (ii) provide a copy of the Environmental Investigation and Risk Management Report to Aurizon Network for its consideration and, if requested by Aurizon Network, a copy of the relevant parts of the Operator’s existing Environmental Management System referred to in the Environmental Investigation and Risk Management Report. (b) If the Environmental Investigation and Risk Management Report discloses areas of risk which, in the reasonable opinion of Aurizon Network, cannot be adequately managed by the proposals set out in the Environmental Investigation and Risk Management Report or, in the reasonable opinion of Aurizon Network, fails to identify and adequately deal with additional relevant environmental risks, then Aurizon Network may give notice to that effect to the Operator within thirty (30) days after the date on which the Environmental Investigation and Risk Management Report was received by Aurizon Network (or such other period as the Parties, acting reasonably, may agree), detailing the risks not so adequately managed or not so identified or adequately dealt with. If Aurizon Network does not give such notice, the Environmental Investigation and Risk Management Report, subject to Clause 9.1(k), shall be included in Part 1 of Schedule 9 and amendments made to this Agreement [(including variations to the Base Access Charges)] if applicable. [Bracketed text is only included where Operator pays non-TOP Access Charges] (c) If Aurizon Network gives notice pursuant to Clause 9.1 (b) the Operator may respond, by a date agreed by the Parties, with a written proposal which demonstrates how the Operator proposes to manage those risks (“Operator’s Proposal”). The Operator’s Proposal must: (i) contain an investigation of the areas of risk and/or additional relevant environmental risks referred to in Clause 9.1(b); (A) specify risk abatement or attenuation measures which the Operator proposes to undertake in relation to them; and/or (B) specify how the Access Charges might contain a component reflecting the cost to Aurizon Network of assuming all or some portion of the risk; (ii) in relation to paragraph (ii)(A) specify a timeframe for implementation of those measures; and (iii) specify details of any public consultation the Operator proposes to undertake in connection with the implementation of any such measures. (d) Aurizon Network may, acting reasonably, accept or reject all or part of the Operator’s Proposal. (e) If Aurizon Network accepts the Operator’s Proposal, then it will be incorporated into and form part of the Environmental Investigation and Risk Management Report which, subject to Clause 9.1(k), shall be included in Part 1 of Schedule 9 and amendments made to the Agreement [(including variations to the Base Access Charges)] if applicable. [Bracketed text is only included where Operator pays non-TOP Access Charges] (f) If the Operator fails to submit to Aurizon Network an Operator’s Proposal by the date agreed by the Parties or if Aurizon Network rejects all or part of the Operator’s Proposal, Aurizon Network may advise the Operator of the risks not adequately managed or not identified or adequately dealt with and then either Party may refer the issue of whether the Environmental Investigation and Risk Management Report and/or the Operator’s Proposal does or does not adequately manage or does or does not identify or adequately deal with the relevant environmental risks to an expert for determination in accordance with Clause 18.3. (g) If the expert determines that the Environmental Investigation and Risk Management Report and/or Operator’s Proposal does adequately manage the risks or identifies and adequately deals with the risks, then the Environmental Investigation and Risk Management Report as modified by the Operator’s Proposal (if applicable) will, subject to Clause 9.1(k), be accepted and included in Part 1 of Schedule 9 and amendments made to this Agreement [(including variations to the Base Access Charges)] if applicable. [Bracketed text is only included where Operator pays non-TOP Access Charges] (h) If the expert determines that the Environmental Investigation and Risk Management Report and/or Operator’s Proposal does not adequately manage the risks or does not identify and adequately deal with the risks, then provided the Operator amends the Environmental Investigation and Risk Management Report in accordance with the expert’s determination and/or recommendations within the time frame specified by the expert, the Environmental Investigation and Risk Management Report as amended will, subject to Clause 9.1(k), be accepted and included in Part 1 of Schedule 9 and amendments made to the Agreement [(including variations to the Base Access Charges)] if applicable. [Bracketed text is only included where Operator pays non-TOP Access Charges] (i) If the expert determines that the Environmental Investigation and Risk Management Report and/or Operator’s Proposal does not adequately manage the risks or does not identify and adequately deal with the risks and the Operator fails to amend the Environmental Investigation and Risk Management Report in accordance with the expert’s determination and/or recommendations within the time frame specified by the expert, Aurizon Network may terminate this Agreement by written notice to the Operator and the End User. (j) The Parties agree to implement the determination of the expert. (k) If: (i) an Environmental Investigation and Risk Management Report is included in Part 1 of Schedule 9; and (ii) amendments (if any) are made to this Agreement as a result of or in connection with that inclusion of the Environmental Investigation and Risk Management Report, then the commencement of the amendment of this Agreement to include the Environmental Investigation and Risk Management Report and those amendments is subject to and conditional upon the Operator being notified by Aurizon Network that all necessary amendments (if any) to the End User Access Agreement (including variations to the amounts payable by the End User) have been made in respect of such matters and any relevant nomination of the Operator by the End User in accordance with the End User Access Agreement has, if necessary, been varied.
Cornerstone shall notify the LLC and confirm such advice in writing (i) when the filing of any post-effective amendment to the Registration Statement or supplement to the Prospectus is required, when the same is filed and, in the case of the Registration Statement and any post-effective amendment, when the same becomes effective, (ii) of any request by the Securities and Exchange Commission for any amendment of or supplement to the Registration Statement or the Prospectus or for additional information and (iii) of the entry of any stop order suspending the effectiveness of the Registration Statement or the initiation or threatening of any proceedings for that purpose, and, if such stop order shall be entered, Cornerstone shall use its best efforts promptly to obtain the lifting thereof.
Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.
Environmental Services 1. Preparation of Environmental Documentation (CEQA/NEPA) including but not limited to the following: a. Initial Study b. Categorical Exemption (CE) c. Notice of Exemption (XXX) d. Negative Declaration (ND) e. Mitigated Negative Declaration (MND) f. Notice of Preparation (NOP) g. Environmental Impact Report (EIR) i. Initial Document (Screen Check/Administrative Draft) ii. Addendum iii. Supplemental
Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.