Poster 2 Sample Clauses

Poster 2. The second version of the Poster can be used in a variety of formats, even in smaller ones, and can also be printed in A4 format and delivered at any event with different audiences:
AutoNDA by SimpleDocs

Related to Poster 2

  • DS3 Loop DS3 Loop is a two-point digital transmission path which provides for simultaneous two-way transmission of serial, bipolar, return-to-zero isochronous digital electrical signals at a transmission rate of 44.736 megabits per second (Mbps) that is dedicated to the use of the ordering CLEC in its provisioning of local exchange and associated exchange access services. It may provide transport for twenty-eight (28) DS1 channels, each of which provides the digital equivalent of twenty-four (24) analog voice grade channels. The interface to unbundled dedicated DS3 transport is a metallic-based electrical interface.

  • White Pages Listings 5.1 BellSouth shall provide <<customer_name>> and their customers access to white pages directory listings under the following terms:

  • Agreement Xxx 0000 Part 3 Provisions relating to Balmoral South Iron Ore Project and certain other matters Division 2 Main provisions s. 14

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Publikace a) The Institution and the Investigator agree that the Sponsor shall have the sole and exclusive right to the first publication of the results of the Study. Such Sponsor publication is intended to be a multi-center publication of the Study results, collected from all investigators and institutions participating in the Study (the “Multi- Center Publication”). If the Investigator is interested in contributing to or participating in the Multi-Center Publication, he or she must contact the Sponsor. Selection of authors/participants will be governed by the Sponsor, considering individuals’ contribution to the Study.

  • Front 1.2)Back; 1.3)Left; 1.4)Right; 1.5)Top; 1.6)Bottom; 1.7)Perspective 1.1 1.2 1.3 1.4 1.5 1.6

  • xxx/Xxxxxx/XXXXX- 19_School_Manual_FINAL pdf -page 101-102 We will continue to use the guidelines reflected in the COVID-19 school manual.

  • DIR Logo Vendor may use the DIR logo in the promotion of the Contract to Customers with the following stipulations: (i) the logo may not be modified in any way, (ii) when displayed, the size of the DIR logo must be equal to or smaller than the Vendor logo,

  • Data Deletion As stated in the Student Data Transfer or Destruction Section of this Agreement, Provider shall ensure that all Student Data in its possession and in the possession of any subcontractors, or agents to whom Provider may have transferred Student Data, is destroyed or, as directed by the Board, transferred to the Board in a format determined by the Board within the time periods provided in the Student Data Transfer or Destruction Section of this Agreement.

  • EMBANKMENT WIDENING The minimum embankment widening is:  2 feet for embankment heights at centerline of 2 to 6 feet.  4 feet for embankment heights at centerline of greater than 6 feet. Purchaser shall apply embankment widening equally to both sides of the road to achieve the required width.

Time is Money Join Law Insider Premium to draft better contracts faster.