Privacy or Proxy Service Requirements Sample Clauses

Privacy or Proxy Service Requirements. Customer shall ensure that the identity and contact information provided by the customer of any privacy or proxy registration service offered or made available by Customer in connection with each registration will be deposited with Xxxxxxxx.xxx or held in escrow or, alternatively, display a conspicuous notice to such customers at the time an election is made to utilize such privacy or proxy service that their data is not being escrowed. Where escrow is used, the escrow agreement will provide, at a minimum, that data will be released to Xxxxxxxx.xxx in the event Customer breaches the Agreement, and such breach is harmful to consumers or the public interest. In the event that ICANN makes available a program granting recognition to resellers that escrow privacy or proxy registration data as detailed above, and Customer meets any other criteria established by ICANN in accordance with its Bylaws, Customer shall be permitted to apply to ICANN for such recognition.
AutoNDA by SimpleDocs
Privacy or Proxy Service Requirements. Partner shall ensure that the identity and contact information provided by Partner of any privacy or proxy registration service offered or made available by Partner in connection with each registration will be deposited with Xxxxxxxx.xxx or held in escrow or, alternatively, display a conspicuous notice to such customers at the time an election is made to utilize such privacy or proxy service that their data is not being escrowed. Where escrow is used, the escrow agreement will provide, at a minimum, that data will be released to Xxxxxxxx.xxx in the event Partner breaches the Agreement, and such breach is harmful to consumers or the public interest. In the event that ICANN makes available a program granting recognition to resellers that escrow privacy or proxy registration data as detailed above, and Partner meets any other criteria established by ICANN in accordance with its Bylaws, Partner shall be permitted to apply to ICANN for such recognition.

Related to Privacy or Proxy Service Requirements

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Compliance with Texas Privacy Laws and Regulations In performing their respective obligations under the Agreement, the LEA and the Provider shall comply with all Texas laws and regulations pertaining to LEA data privacy and confidentiality, including but not limited to the Texas Education Code Chapter 32, and Texas Government Code Chapter 560.

  • Interface Requirements 9.3.1 BellSouth shall offer LIDB in accordance with the requirements of this subsection.

  • Service Requirements Grantee shall:

  • COMPLIANCE WITH THE CONTRACT WORK HOURS AND SAFETY STANDARDS ACT (1) Overtime requirements. No contractor or subcontractor contracting for any part of the contract work which may require or involve the employment of laborers or mechanics shall require or permit any such laborer or mechanic in any workweek in which he or she is employed on such work to work in excess of forty hours in such workweek unless such laborer or mechanic receives compensation at a rate not less than one and one-half times the basic rate of pay for all hours worked in excess of forty hours in such workweek.

  • HIPAA Requirements The Parties agree that the provisions under HIPAA Rules that are required by law to be incorporated into this Amendment are hereby incorporated into this Agreement.

  • DRUG-FREE WORKPLACE REQUIREMENTS Contractor will comply with the requirements of the Drug-Free Workplace Act of 1990 and will provide a drug-free workplace by taking the following actions:

  • Additional Service Requirements Grantee shall:

  • Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse.

  • Standards for Network Elements 1.8.1 BellSouth shall comply with the requirements set forth in the technical references, as well as any performance or other requirements identified in this Agreement, to the extent that they are consistent with the greater of BellSouth’s actual performance or applicable industry standards.

Time is Money Join Law Insider Premium to draft better contracts faster.