Name of Grantors Sample Clauses

Name of Grantors. The names and address of the Grantors to the Trust are: Grantor #1: Grantor #2: (“Grantors”).
AutoNDA by SimpleDocs

Related to Name of Grantors

  • Name of Felon(s) 2. The named person's role in the firm, and

  • Xxxxxxxxx and X Xxxxxxx. A

  • Xxxxxxxx and X X. Xxxxx. 1930. Checklist of the fishes and fishlike vertebrates of North and Middle America north of the northern boundary of Venezuela and Columbia. Rept. U.S. Fish Comm. 1928(2):1-670. Jordan, D.S. and X.X. Xxxxxxxx. 1896. The fishes of North and Middle America. Part 1. U.S. Natl. Mus. Bul. 47:1-1240. Xxxxx, S. and X. Xxxxxx. 2005..Hydrogeologic setting of the snake valley hydrologic basin, Xxxxxxx County, Utah, and White Pine and Lincoln Counties, Nevada – implications for possible effects of proposed water xxxxx. Report of investigation 254, Utah Geological Survey. Xxxxxxx, M.C. 1982. Status report of three Bonneville basin endemic fishes. Prepared for the U.S. Fish and Wildlife Service. 27 pp. May, B. E. and X. X. Xxxxx. 1981. Comparative effects of sheep and cattle grazing on the Xxxxx Creek drainage. Transactions of the Bonneville Chapter American Fisheries Society. 1981:48-62. Xxxxx, X.X. 1985. Predation and species replacement in American Southwestern fishes: a case study. Southwestern Naturalist. 30:173-187. Xxxxxx, X. X. and X. X. Xxxxxx. 1985. Two New Intergeneric Cyprinid Hybrids from the Bonneville Basin, Utah. Copeia, 1985(2):509-515. Xxxxxx, X.X. 1972. Threatened freshwater fishes of the United States. Trans. Amer, Fish. Soc. 101(2):239-252.

  • Name of Xxxxx(s) 2. The named person's role in the firm, and

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Role of the Central Parties and Crown a) The central parties shall each have the following rights:

  • Yours sincerely Legislation relating to EOT All references are to the Tax Administration Act 1994 (TAA).

  • Eindgebruikers binnen de Amerikaanse overheid De Apple software en de bijbehorende documentatie zijn “Commercial Items”, zoals omschreven in 48 C.F.R. §2.101, en bestaan uit “Commercial Computer Software” en “Commercial Computer Software Documentation”, zoals beschreven in 48 C.F.R. §12.212 of 48 C.F.R. §227.7202, afhankelijk xxx xxxxx paragraaf van toepassing is. Overeenkomstig 48 C.F.R. §12.212 of 48 C.F.R. §227.7202-1 tot en met 227.7202-4, afhankelijk xxx xxxxx paragraaf van toepassing is, xxxxxx de “Commercial Computer Software” en “Commercial Computer Software Documentation” aan eindgebruikers binnen de Amerikaanse overheid (a) alleen als “Commercial Items” in licentie gegeven en (b) alleen met de rechten die xxxxxx verleend aan alle andere eindgebruikers conform de voorwaarden die hierin xxxxxx genoemd. Ongepubliceerd: rechten voorbehouden krachtens de auteursrechtwetgeving van de Verenigde Staten.

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • Záznamy The Institution and the Investigator shall maintain accurate, complete and current records of all Study Data, including the Case Report Forms (or equivalent electronic data), relevant source documents and any other essential documents or materials as required by the Protocol, the Applicable Regulatory Requirements and PSI’s and the Sponsor’s instructions (collectively the "Records"). The Institution and the Investigator shall keep all the Records in a safe and secure location for the period required by the Applicable Regulatory Requirements, or for a period of fifteen (15) years following the completion of the Study, whichever is longer. The Institution and/or the Investigator may destroy the Records at the end of the Records keeping period on the condition that the Institution and/or the Investigator sends written notice to the Sponsor at least sixty (60) days prior to the date deletion/disposal will occur, and, if requested by the Sponsor, cooperates with the Sponsor in extending the Record keeping period or shipping the Records to another facility for storage, at the Sponsor’s reasonable expense. Zdravotnické zařízení a Hlavní zkoušející povedou přesné, úplné a aktuální záznamy o všech Studijních údajích, které budou zahrnovat Záznamy subjektů hodnocení (nebo odpovídající údaje v elektronické podobě), příslušné zdrojové dokumenty a jakékoli další nezbytné dokumenty nebo materiály dle požadavků Protokolu, Platných regulačních požadavků a pokynů PSI a Zadavatele (dále jen „Záznamy“). Zdravotnické zařízení a Hlavní zkoušející budou Záznamy uchovávat na bezpečném a zabezpečením místě xx xxxx xxxxxxxxxxx Xxxxxxxx regulačními požadavky nebo po dobu patnácti (15) let od dokončení Studie (kterákoli doba bude delší). Zdravotnické zařízení a/nebo Hlavní zkoušející mohou Záznamy po uplynutí lhůty pro uchovávání Záznamů zlikvidovat za podmínky, že Zdravotnické zařízení a/nebo Hlavní zkoušející zašlou Zadavateli oznámení alespoň šedesát (60) dnů před datem vymazání/likvidace Záznamů a na žádost Zadavatele s ním budou spolupracovat na prodloužení lhůty pro uchovávání Záznamů nebo zaslání Záznamů do jiného zařízení, kde budou uloženy, a to na přiměřené náklady Zadavatele.

Time is Money Join Law Insider Premium to draft better contracts faster.