Post-Installation Information Sample Clauses

Post-Installation Information. Each Cable Company shall provide cable as built installations, latitude and longitude in WGS 84 datum coordinates to the Fishermen and the Committee as soon as reasonably possible after the Cable Companies’ contractor for the installation of the cable delivers the information to Cable Companies. This data shall be provided in writing, electronically, and on navigational charts.
AutoNDA by SimpleDocs

Related to Post-Installation Information

  • Application Information Employees’ spouses, registered same-sex domestic partners and eligible dependents who choose to participate in the Student Fee Authorization Program must follow the University’s application and enrollment procedures.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Union Information On a quarterly basis, the Employer shall provide the Union with the name, address, telephone number, hire date, classification, employment status, and pay rate of bargaining unit members.

  • Verizon Information Upon request by CBB, Verizon shall make available to CBB the following information to the extent that Verizon provides such information to its own business offices: a directory list of relevant NXX codes, directory and Customer Guide close dates, and Yellow Pages headings. Verizon shall also make available to CBB, on Verizon’s Wholesale website (or, at Verizon’s option, in writing) Verizon’s directory listings standards and specifications.

  • Transaction Information The Adviser shall furnish to the Trust such information concerning portfolio transactions as may be necessary to enable the Trust or its designated agent to perform such compliance testing on the Funds and the Adviser’s services as the Trust may, in its sole discretion, determine to be appropriate. The provision of such information by the Adviser to the Trust or its designated agent in no way relieves the Adviser of its own responsibilities under this Agreement.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • ELECTRICITY INFORMATION EXCHANGE PROTOCOLS 31.1 Protocols for exchanging information: The Distributor and the Trader must, when exchanging information to which an EIEP listed in Schedule 3 relates, comply with that EIEP.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Respondent and Requisition Information Section 2 a. - Yes, I will be subcontracting portions of the contract.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.