Private defence Sample Clauses

Private defence. §1. Authorisation for the thesis defence is given jointly by the two partner Establishments, according to the statutory and regulatory provisions in force in those Establishments.
AutoNDA by SimpleDocs

Related to Private defence

  • Internal Investigations (A) The parties recognize that Florida Highway Patrol personnel occupy a special place in American society. Therefore, it is understood that the state has the right to expect that a professional standard of conduct be adhered to by all Florida Highway Patrol personnel regardless of rank or assignment. Since internal investigations may be undertaken to inquire into complaints of Florida Highway Patrol misconduct, the state reserves the right to conduct such investigations to uncover the facts in each case, but expressly agrees to carefully guard and protect the rights and dignity of accused personnel. In the course of an internal investigation, the investigative methods employed will be consistent with the law (including but not limited to section 112.532, Florida Statutes) and this agreement; nothing in this agreement, however, shall be deemed to diminish the rights of employees under applicable law.

  • Audit Cooperation In the event either Party is audited by a taxing authority, the other Party agrees to cooperate fully with the Party being audited in order to respond to any audit inquiries in a proper and timely manner so that the audit and/or any resulting controversy may be resolved expeditiously.

  • Account Monitoring Merchant acknowledges that Servicer will monitor Merchant’s daily deposit activity. Servicer may upon reasonable grounds suspend disbursement of Merchant's funds for any reasonable period of time required to investigate suspicious or unusual deposit activity. Servicer will make good faith efforts to notify Merchant promptly following suspension. Servicer is not liable to Merchant for any loss, either direct or indirect, which Merchant may attribute to any suspension of funds disbursement.

  • Information Technologies Cooperation 1. The aims of cooperation in Information Technologies sectors, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to focus on cooperative activities towards information technology areas where mutual and complementary interests exists; and (b) to build on existing agreements and arrangements already in place between the Parties. 2. Information Technologies cooperation may include, but not be limited to: (a) scientific and technical cooperation for the Software Industry of the Parties and encouraging cooperation in software development for populations with specific needs; (b) facilitate the cooperation on academic, industrial and entrepreneurial networks in the area of Information Technology; (c) encouraging exchange of experience on management and research and development for Information Technology Parks; (d) research and development on Information Technology products and services, integrating television, multimedia, and cellular telephones; and (e) encouraging exchange of experience for research and development in networks and telecommunications.

  • Supply Chain Security Supplier shall implement and maintain a written security program that consists of physical and procedural controls: to (a) prevent unauthorized access to Supplier’s facilities; (b) prevent finished goods or equipment from being tampered with, stolen or damaged prior to Supplier’s delivery in accordance with the terms of this Order; and (c) detect when malicious activity has occurred (the “Supply Chain Security Program”). Supplier’s Supply Chain Security Program shall align to the World Customs Organization’s SAFE Framework of Standards to Secure and Facilitate Global Trade (“SAFE Framework”) or other global security programs recognized by the World Customs Organization. Supplier shall flow down and verify the requirements of its Supply Chain Security Program to its sub-tier suppliers, if applicable. Supplier shall test its Supply Chain Security Program at least annually or whenever there are material changes in Supplier’s operations, risks or business practices. Upon Buyer’s written and reasonable request, Supplier shall provide Buyer with: (i) a copy of Supplier’s Supply Chain Security Program; (ii) an executive summary of test results and a report of corrective actions (including the timing for implementation) to be taken to remedy any deficiencies identified by such testing; and (iii) any audit results or findings resulting from Supplier’s periodic audit or testing of its sub-tier suppliers’ security programs.

  • Supply Chain Monitoring A copy of the supply chain monitoring process, which should include details of the process for monitoring the financial viability of the supply chain (including timing), together with any known risks to supply chain stability and material changes to the supply chain. This should include extracts from Board level meetings, risk registers etc where any of the above items have been discussed. Annex 1 1 Information from Contractors who are not required to submit form AR01 to Companies House

  • STUDENTS AND BUSINESS APPRENTICES A student or business apprentice who is present in a Contracting State solely for the purpose of his education or training and who is, or immediately before being so present was, a resident of the other Contracting State, shall be exempt from tax in the first-mentioned State on payments received from outside that first-mentioned State for the purposes of his maintenance, education or training.

  • PROCUREMENT LOBBYING To the extent this agreement is a "procurement contract" as defined by State Finance Law Sections 139-j and 139-k, by signing this agreement the contractor certifies and affirms that all disclosures made in accordance with State Finance Law Sections 139-j and 139-k are complete, true and accurate. In the event such certification is found to be intentionally false or intentionally incomplete, the State may terminate the agreement by providing written notification to the Contractor in accordance with the terms of the agreement.

  • Monitoring and Management Information C10.1 The Contractor shall comply with the monitoring arrangements set out in the Monitoring Schedule including, but not limited to, providing such data and information as the Contractor may be required to produce under the Contract.

  • Academic Policies and Student Support Services X. Xxxx College courses offered as dual credit, regardless of where they are taught, follow the same syllabus, course outline, textbook, grading method, and other academic policies and procedures as the courses outlined in the Hill College policy manual, catalog, and student handbook. [TAC 19, Part 1, Chapter 4, Subchapter D, 4.85(g)(1)]

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!