Management of Information System Sample Clauses

Management of Information System. MIS for Maintaining records of trainings A week before the inception of classes under intimation to the FoundationEstablishment of MIS for reporting trainees’ registration, attendance and periodic progress, etc. to the Foundation as per guided procedure in both hard and soft form (through email and uploading at web portal). • Liaison with the Foundation /BBSYDP to ensure that no trainee is already registered or self-duplicate. • Handing over an entire record of graduates to Foundation /BBSYDP (in hard and soft) form. • Filling and reporting daily attendance of the trainees within 2 hours of commencement of the class daily.
AutoNDA by SimpleDocs

Related to Management of Information System

  • Treatment of Information (a) Certain of the Lenders may enter into this Agreement and take or not take action hereunder or under the other Loan Documents on the basis of information that does not contain material non-public information with respect to any of the Loan Parties or their securities (“Restricting Information”). Other Lenders may enter into this Agreement and take or not take action hereunder or under the other Loan Documents on the basis of information that may contain Restricting Information. Each Lender acknowledges that United States federal and state securities laws prohibit any person from purchasing or selling securities on the basis of material, non-public information concerning the issuer of such securities or, subject to certain limited exceptions, from communicating such information to any other Person. Neither the Administrative Agent nor any of its Affiliates shall, by making any Communications (including Restricting Information) available to a Lender, by participating in any conversations or other interactions with a Lender or otherwise, make or be deemed to make any statement with regard to or otherwise warrant that any such information or Communication does or does not contain Restricting Information nor shall the Administrative Agent or any of its Affiliates be responsible or liable in any way for any decision a Lender may make to limit or to not limit its access to Restricting Information. In particular, none of the Administrative Agent nor any of its Affiliates (i) shall have, and the Administrative Agent, on behalf of itself and each of its Affiliates, hereby disclaims, any duty to ascertain or inquire as to whether or not a Lender has or has not limited its access to Restricting Information, such Lender’s policies or procedures regarding the safeguarding of material, nonpublic information or such Lender’s compliance with applicable laws related thereto or (ii) shall have, or incur, any liability to any Loan Party or Lender or any of their respective Affiliates arising out of or relating to the Administrative Agent or any of its Affiliates providing or not providing Restricting Information to any Lender. (b) Each Lender acknowledges that circumstances may arise that require it to refer to Communications that might contain Restricting Information. Accordingly, each Lender agrees that it will nominate at least one designee to receive Communications (including Restricting Information) on its behalf and identify such designee (including such designee’s contact information) on such Lender’s Administrative Questionnaire. Each Lender agrees to notify the Administrative Agent from time to time of such Lender’s designee’s e-mail address to which notice of the availability of Restricting Information may be sent by electronic transmission. (c) Each Lender acknowledges that Communications delivered hereunder and under the other Loan Documents may contain Restricting Information and that such Communications are available to all Lenders generally. Each Lender that elects not to take access to Restricting Information does so voluntarily and, by such election, acknowledges and agrees that the Administrative Agent and other Lenders may have access to Restricting Information that is not available to such electing Lender. None of the Administrative Agent nor any Lender with access to Restricting Information shall have any duty to disclose such Restricting Information to such electing Lender or to use such Restricting Information on behalf of such electing Lender, and shall not be liable for the failure to so disclose or use, such Restricting Information. (d) The provisions of the foregoing clauses of this Section 10.09 are designed to assist the Administrative Agent, the Lenders and the Loan Parties, in complying with their respective contractual obligations and applicable law in circumstances where certain Lenders express a desire not to receive Restricting Information notwithstanding that certain Communications hereunder or under the other Loan Documents or other information provided to the Lenders hereunder or thereunder may contain Restricting Information. Neither the Administrative Agent nor any of its Affiliates warrants or makes any other statement with respect to the adequacy of such provisions to achieve such purpose nor does the Administrative Agent or any of its Affiliates warrant or make any other statement to the effect that an Loan Party’s or Lender’s adherence to such provisions will be sufficient to ensure compliance by such Loan Party or Lender with its contractual obligations or its duties under applicable law in respect of Restricting Information and each of the Lenders and each Loan Party assumes the risks associated therewith.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a D&E Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by D&E, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. D&E shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 D&E shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow D&E to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. 5.4 D&E shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from D&E Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, D&E shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow D&E to route information services traffic originated on its network to Verizon.

  • Supply of Information The Republic agrees to deliver or cause to be delivered to each Stock Exchange copies of such documents as may be reasonably required for the purpose of obtaining such listing.

  • Management Information To be Supplied to CCS no later than the 7th of each month without fail. Report are to be submitted via MISO CCS Review 100% Failure to submit will fall in line with FA KPI FROM THE FOLLOWING, PLEASE SELECT AND OUTLINE YOUR CHARGING MECHANISM FOR THIS SOW. WHERE A CHARGING MECHANISM IS NOT REQUIRED, PLEASE REMOVE TEXT AND REPLACE WITH “UNUSED”. 5.1 CAPPED TIME AND MATERIAL CHARGES 5.2 PRICE PER STORY POINT CHARGES 5.3 TIME AND MATERIALS CHARGES

  • E5 Freedom of Information The Contractor acknowledges that the Authority is subject to the requirements of the FOIA and the Environmental Information Regulations and shall assist and cooperate with the Authority to enable the Authority to comply with its Information disclosure obligations.

  • Information Management Information and Records

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!