No Prof�t & Loss Control Sample Clauses

No Prof�t & Loss Control through Blue Su�sse The Customer �s obl�ged to control h�s/her own account and manage the prof�t and losses on h�s/her accounts by h�m/herself. Blue Su�sse w�ll not offer any types of r�sk control, such as marg�n mon�tor�ng �n real-t�me. Th�s means also that �f the Costumer uses th�rd part�es to manage h�s account (Agents), Blue Su�sse w�ll not be l�able for those agreements wh�ch are entered �nto between the Costumers and th�rd part�es.
AutoNDA by SimpleDocs

Related to No Prof�t & Loss Control

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • FOOD LOSS To receive coverage for food loss resulting from the failure of the covered refrigerator or freezer, the failure of Your refrigerator or freezer must be due to a defect in the components of the appliance, and not a power failure of any kind. You will be reimbursed up to two hundred dollars ($200) once during the coverage period. To receive payment, You must have the appliance repaired by a service center authorized by the Administrator and submit the following: a copy of the repair order, and itemized list of perishable food lost due to the lack of refrigeration, and proof of purchase for the replaced food.

  • DATA LOSS The Company does not accept responsibility for the security of Your account or content. You agree that Your use of the Website or Services is at Your own risk.

  • Statewide HUB Program Statewide Procurement Division Note: In order for State agencies and institutions of higher education (universities) to be credited for utilizing this business as a HUB, they must award payment under the Certificate/VID Number identified above. Agencies, universities and prime contractors are encouraged to verify the company’s HUB certification prior to issuing a notice of award by accessing the Internet (xxxxx://xxxxx.xxx.xxxxx.xx.xx/tpasscmblsearch/index.jsp) or by contacting the HUB Program at 000-000-0000 or toll-free in Texas at 0-000-000-0000.

  • SINGLE FAMILY SHARED-LOSS AGREEMENT This agreement for the reimbursement of loss sharing on certain single family residential mortgage loans (the “Single Family Shared-Loss Agreement”) shall apply when the Assuming Institution purchases Single Family Shared-Loss Loans as that term is defined herein. The terms hereof shall modify and supplement, as necessary, the terms of the Purchase and Assumption Agreement to which this Single Family Shared-Loss Agreement is attached as Exhibit 4.15A and incorporated therein. To the extent any inconsistencies may arise between the terms of the Purchase and Assumption Agreement and this Single Family Shared-Loss Agreement with respect to the subject matter of this Single Family Shared-Loss Agreement, the terms of this Single Family Shared-Loss Agreement shall control. References in this Single Family Shared- Loss Agreement to a particular Section shall be deemed to refer to a Section in this Single Family Shared-Loss Agreement, unless the context indicates that it is intended to be a reference to a Section of the Purchase and Assumption Agreement.

  • Weed Control The tenant shall control all noxious weeds on the subject lands and maintain all summerfallow in a reasonably weed-free condition.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Denial/Restoral OSS Charge In the event <<customer_name>> provides a list of customers to be denied and restored, rather than an LSR, each location on the list will require a separate PON and, therefore will be billed as one LSR per location. Cancellation OSS Charge <<customer_name>> will incur an OSS charge for an accepted LSR that is later canceled by <<customer_name>>. Note: Supplements or clarifications to a previously billed LSR will not incur another OSS charge. Threshold Billing Plan <<customer_name>> will incur the mechanized rate for all LSRs, both mechanized and manual, if the percentage of mechanized LSRs to total LSRs meets or exceeds the threshold percentages shown below: Year Ratio: Mechanized/Total LSRs 2000 80% 2001 90% The threshold plan will be discontinued in 2002. BellSouth will track the total LSR volume for each CLEC for each quarter. At the end of that time period, a Percent Electronic LSR calculation will be made for that quarter based on the LSR data tracked in the LCSC. If this percentage exceeds the threshold volume, all of that CLEC’s future manual LSRs for the following quarter will be billed at the mechanized LSR rate. To allow time for obtaining and analyzing the data and updating the billing system, this billing change will take place on the first day of the second month following the end of the quarter (e.g. May 1 for 1Q, Aug 1 for 2Q, etc.). There will be no adjustments to the amount billed for previously billed LSRs. Exclusions and Limitations On Services Available for Resale Attachment 1 Type of Service AL FL GA KY LA MS NC SC TN Resale Discount Resale Discount Resale Discount Resale Discount Resale Discount Resale Discount Resale Discount Resale Discount Resale Discount 1 Grandfathered Services (Note 1) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes 8 Mobile Services Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No 9 Federal Subscriber Line Charges Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No 11 End User Line Chg- Number Portability Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No 12 Public Telephone Access Svc(PTAS) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes No Yes Yes 13 Inside Wire Maint Service Plan Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No Applicable Notes:

  • Shared Loss Arrangement 1 2.1 Accounting for and Management of Shared-Loss Assets 1

  • Archival Back-Up and Disaster Recovery Licensee may use and copy the Product and related Documentation in connection with: i) reproducing a reasonable number of copies of the Product for archival backup and disaster recovery procedures in the event of destruction or corruption of the Product or disasters or emergencies which require Licensee to restore backup(s) or to initiate disaster recovery procedures for its platform or operating systems; ii) reproducing a reasonable number of copies of the Product and related Documentation for cold site storage. “Cold Site” storage shall be defined as a restorable back-up copy of the Product not to be installed until and after the declaration by the Licensee of a disaster; iii) reproducing a back-up copy of the Product to run for a reasonable period of time in conjunction with a documented consolidation or transfer otherwise allowed herein. “Disaster Recovery” shall be defined as the installation and storage of Product in ready-to-execute, back-up computer systems prior to disaster or breakdown which is not used for active production or development.

Time is Money Join Law Insider Premium to draft better contracts faster.