Non-smoker Sample Clauses

Non-smoker. A person who meets the Insurer’s conditions for non-smoker status at the time the Status Statement is completed.
AutoNDA by SimpleDocs
Non-smoker. Issue Age No Substandard Rating Class A-D Class E-H -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 0 - 65 $30,000,000 $25,000,000 $15,000,000 -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 66 - 70 $25,000,000 $20,000,000 $13,000,000 -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 71 - 75 $15,000,000 $12,000,000 $10,000,000 -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 76 - 80 $13,000,000 $10,000,000 $7,000,000 -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 81 - 85 $9,000,000 $7,000,000 $5,000,000 -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 86 - 90 $4,000,000 $3,000,000 $2,000,000 -------------------- -------------------------- -------------------------- -------------------------- Smoker: -------------------- -------------------------- -------------------------- -------------------------- Issue Age No Substandard Rating Class A-D Class E-H -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 15 - 65 $20,000,000 $20,000,000 $15,000,000 -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 66 - 70 $15,000,000 $15,000,000 $12,000,000 -------------------- -------------------------- -------------------------- -------------------------- -------------------- -------------------------- -------------------------- -------------------------- 71 -...

Related to Non-smoker

  • NON-SMOKING UNIT ENTRY BY OWNER

  • Landlord and Storage Agreements Upon request, provide Agent with copies of all existing agreements, and promptly after execution thereof provide Agent with copies of all future agreements, between an Obligor and any landlord, warehouseman, processor, shipper, bailee or other Person that owns any premises at which any Collateral may be kept or that otherwise may possess or handle any Collateral.

  • AT&T-12STATE acknowledges that CLEC may have an embedded base of one-way trunks ordered and installed prior to the Effective Date of this Agreement that were used for termination of CLEC’s Section 251(b)(5)/IntraLATA Toll Traffic to AT&T-12STATE (Embedded Base). To the extent that CLEC has such an Embedded Base, CLEC shall only augment trunk groups in the Embedded Base with the mutual agreement of the Parties. CLEC shall not order any new one-way trunk groups following the Effective Date of this Agreement. Moreover, the Parties agree that the Embedded Base will be converted to two-way trunk groups under the following circumstances: 4.2.1.1 With reasonable notification from AT&T-12STATE and upon AT&T-12STATE’s request, CLEC shall convert all of its Embedded Base to two-way trunks. 4.2.1.2 At any time an Embedded Base trunk group (either originating or terminating) requires augmentation, AT&T-12STATE can require the associated originating and terminating trunks to be converted to a single two-way trunk group prior to the augmentation. 4.2.1.3 When any network changes are to be performed on a project basis (i.e., central office conversions, tandem re-homes, etc.), upon request and reasonable notice by AT&T-12STATE, CLEC will convert all of its Embedded Base affected by the project within the intervals and due dates required by the project parameters. 4.2.1.4 In addition to the foregoing, CLEC may choose, at any time, to convert its Embedded Base to two-way trunk groups. 4.2.1.5 The Parties will coordinate any trunk group migration, trunk group prioritization and implementation schedule. AT&T-12STATE agrees to develop a cutover plan within thirty (30) days of notification to CLEC of the need to convert pursuant to Section 4.2.1.1 above and Section 4.2.1.3 above.

  • Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors. (b) If the employer decides to engage subcontractors, the employer shall ensure that these contractors and their employees receive wages, allowances and conditions equal to or better than those contained in this agreement. (c) The use of sham sub contracting arrangements is a breach of this agreement. The contractor who engages subcontractors is responsible for ensuring the employees of sub- contractors receive wages, allowances and conditions equal to or better those contained in this agreement, this obligation extends to liability for all outstanding wages conditions and entitlements under this agreement.

  • Use of Sub-Contractors If the Applicant requires the use of a Sub-Contractor in order to adequately complete the Project, a collaboration letter, contract or agreement between the Applicant and the Sub-Contractor must be in place prior to the Applicant proceeding with any Milestone which requires assistance from the Sub-Contractor. Applicant shall: (a) identify the Sub-Contractor to Alberta Innovates; (b) provide a copy of such Sub- Contractor agreement to Alberta Innovates upon request, and on a strictly confidential basis; and (c) ensure that dealings with the Sub-Contractor are not prohibited under any Applicable Laws Including any Anti- Bribery, Anti-Corruption and Sanctions Laws or Export Control Laws. Alberta Innovates may request the Applicant to provide evidence that it has paid the Sub-Contractor for such services. If the Applicant is using a Sub-Contractor: (aa) nothing in this Investment Agreement creates any employment, contract, agency relationship, or other direct or indirect, relationship of any kind between Alberta Innovates and such Sub-Contractor; and (bb) the Applicant shall be solely responsible for all work, acts, claims, defaults and liabilities relating to the Sub-Contractor.

  • APARTMENT OWNERSHIP ACT The Promoter has assured the Allottees that the project in its entirety is in accordance with the provisions of the West Bengal Apartment Ownership Act, 1972. The Promoter showing compliance of various laws/regulations as applicable in the State of West Bengal.

  • Tenants Selection of Contractors Tenant shall retain Landlord’s contractor, Commerce Construction Co., L.P. (the “Contractor”), as general contractor for the performance of the Work.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • WILD AND SCENIC RIVERS The Wild and Scenic Rivers Act of 1968 (16 U.S.C. § 1271, et seq.) as amended, particularly sections 7(b) and (c) (16 U.S.C. § 1278(b) and (c)). AIR QUALITY The Clean Air Act (42 U.S.C. § 7401, et seq.) as amended, particularly sections 176(c) and (d) (42 U.S.C. §7506(c) and (d)). Determining Conformity of Federal Actions to State or Federal Implementation Plans (Environmental Protection Agency-40 C.F.R. Parts 6, 51, and 93).

  • AT&T-21STATE made an offer (the “Offer”) to all Telecommunications carriers to exchange Section 251(b)(5) Traffic, Non-toll VoIP-PSTN Traffic and ISP-Bound Traffic pursuant to the terms and conditions of the FCC’s interim ISP terminating compensation plan of the FCC’s Order on Remand and Report and Order, In the Matter of Implementation of the Local Competition Provisions in the Telecommunications Act of 1996, Intercarrier Compensation for ISP-Bound Traffic, FCC 01-131, CC Docket Nos. 96-98, 99-68 (rel. April 27, 2001)) (“FCC ISP Compensation Order”) which was remanded but not vacated in WorldCom, Inc. v. FCC, No. 01-1218 (D.C. Cir. 2002).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!