Mirror Trader Sample Clauses

Mirror Trader. 19.4.1 Tradency servers keep track of strategy developers’ “buy” and “sell” signals. By using the Mirror Trader platform, Clients can view, analyze and evaluate signals sent by Strategy Providers and execute the signals in their own trading account with the Company.
AutoNDA by SimpleDocs

Related to Mirror Trader

  • Stabling Without prejudice to Network Rail’s obligations, if any, under Schedule 5 to provide Stabling, Network Rail shall use all reasonable endeavours to provide such Stabling facilities as are necessary or expedient for or in connection with the provision of the Services in accordance with the Working Timetable.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Student Medication 1. Except in emergency situations, teachers will only be required to administer medication to students (including supervision of self-administration) after the following conditions have been met:

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Use of Private Vehicles Whenever practicable, State-owned or contracted vehicles shall be made available to ASF Members required to travel on behalf of the Employer. The Employer may elect to allow ASF Members to utilize personal vehicles on a case-by-case basis and reimburse the mileage resulting at the rates provided under the travel regulations. Except for emergency circumstances, or when defined by the Employer as a condition of employment, an ASF Member shall not be required to use a personal vehicle for university purposes.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Password Protection Contractor agrees that any portable or laptop computer that has access to the Eligible Users or State of Utah networks, or stores any Public Data is equipped with strong and secure password protection.

  • Protection of Watershed PURCHASER shall take all necessary precautions to prevent damage to stream banks, any stream course, lake, reservoir, or forested wetland within or adjacent to the timber sale area. Definitions of Type F, Type D, and Type N streams contained in the Forest Practices Act apply to this contract. In addition to other protective measures required, PURCHASER shall discontinue all or part of the operations under this contract upon notice from STATE that operations will cause excessive damage to the watershed.

  • Ownership and Reuse of Documents All documents, data, reports, research, graphic presentation materials, etc., developed by Contractor as a part of its work under this Agreement, shall become the property of County upon completion of this Agreement, or in the event of termination or cancellation thereof, at the time of payment under Section 3 for work performed. Contractor shall promptly furnish all such data and material to County on request.

Time is Money Join Law Insider Premium to draft better contracts faster.