No Data Vetting Sample Clauses

No Data Vetting. All data input into the Services will be routed to the Insurance Provider as-is. Company does not review any data for accuracy or appropriateness or otherwise modify or remove any data prior to sharing with the Insurance Provider. Customer should not transmit, disclose, or make available sensitive data to Company, such as payment card information or any other sensitive personal information.
AutoNDA by SimpleDocs

Related to No Data Vetting

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • PROCUREMENT OF RECOVERED MATERIAL H-GAC and the Respondent must comply with section 6002 of the Solid Waste Disposal Act, as amended by the Resource Conservation and Recovery Act. The requirements of Section 6002 include: (1) procuring only items designated in guidelines of the Environmental Protection Agency (EPA) at 40 CFR part 247 that contain the highest percentage of recovered materials practicable, consistent with maintaining a satisfactory level of competition, where the purchase price of the item exceeds $10,000 or the value of the quantity acquired during the preceding fiscal year exceeded $10,000; (2) procuring solid waste management services in a manner that maximizes energy and resource recovery; and (3) establishing an affirmative procurement program for procurement of recovered materials identified in the EPA guidelines. Pursuant to the Federal Rule above, as required by the Resource Conservation and Recovery Act of 1976 (42 U.S.C. § 6962(c)(3)(A)(i)), Respondent certifies that the percentage of recovered materials content for EPA-designated items to be delivered or used in the performance of the Contract will be at least the amount required by the applicable contract specifications or other contractual requirements. A RTICLE 40: XXXXXXXX “ANTI-KICKBACK” ACT Contractor shall comply with 18 U.S.C. § 874, 40 U.S.C. § 3145, and the requirements of 29 C.F.R. pt. 3 as may be applicable, which are incorporated by reference into the contract. The contractor or subcontractor shall insert in any subcontracts the clause above and such other clauses as appropriate agency instructions require, and also a clause requiring the subcontractors to include these clauses in any lower tier subcontracts. The prime contractor shall be responsible for the compliance by any subcontractor or lower tier subcontractor with all of these contract clauses. A breach of the contract clauses above may be grounds for termination of the Contract, and for debarment as a contractor and subcontractor as provided in 29 C.F.R. § 5.12.

  • Contract Data The Consultant is advised to read the NEC3 Professional Service Contract (Third edition with amendments of June 2006 and April 2013) and the relevant Guidance Notes and Flow Charts, published by the Institution of Civil Engineers, in order to understand the implications of this Data which is required. Copies of these documents may be obtained from the Engineering Contract Strategies (telephone (00) 000 000 0000). Each item of data given below is cross-referenced to the clause in the NEC3 Professional Service Contract to which it mainly applies.

  • Procurement of Recovered Materials (1) In the performance of this contract, the Contractor shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired

  • Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.

  • Encounter Data Party shall provide encounter data to the Agency of Human Services and/or its departments and ensure further that the data and services provided can be linked to and supported by enrollee eligibility files maintained by the State.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Customer Records Customer grants to Cisco and its independent accountants the right to examine Xxxxxxxx's books, records and accounts during Customer's normal business hours to verify compliance with this Agreement. In the event such audit discloses non-compliance with this Agreement, Customer shall promptly pay to Cisco the appropriate license fees, plus the reasonable cost of conducting the audit.

  • MARC Records When applicable to the Licensed Materials, at Licensee’s request, Licensor shall provide full OCLC-quality batched sets of MARC records incorporating Licensee specifications at no additional cost by the date of the execution of this License Agreement. Updates to existing records and new title records, matching the schedule of release and delivery of new publications, will be provided on a mutually agreed-upon schedule and in a format that renders them useful to the Licensee and/or the Participating Institutions.

  • Contract Migration Authorized Users holding individual Contracts with a Contractor at the time that Contractor is awarded a Centralized Contract for the same Products or services shall be permitted to migrate to that Centralized Contract effective with its commencement date. Such migration shall not operate to diminish, alter or eliminate any right that the Authorized User otherwise had under the terms and conditions of their individual Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.