Questionable Intelligence Activity (QIA) Sample Clauses

Questionable Intelligence Activity (QIA). Any Intelligence or Intelligence-related activity when there is reason to believe such activity may be unlawful or contrary to an Executive Order, Presidential Directive, Intelligence Community Directive, or applicable DoD policy governing that activity.
AutoNDA by SimpleDocs

Related to Questionable Intelligence Activity (QIA)

  • What Will Happen After We Receive Your Letter When we receive your letter, we must do two things:

  • Service Jointly Provisioned with an Independent Company or Competitive Local Exchange Company Areas 4.5.1 BellSouth will in some instances provision resold services in accordance with the General Subscriber Services Tariff and Private Line Tariffs jointly with an Independent Company or other Competitive Local Exchange Carrier.

  • TECHNOLOGY/KNOWLEDGE TRANSFER ACTIVITIES The goal of this task is to develop a plan to make the knowledge gained, experimental results, and lessons learned available to the public and key decision makers. The Recipient shall: • Prepare an Initial Fact Sheet at start of the project that describes the project. Use the format provided by the CAM. • Prepare a Final Project Fact Sheet at the project’s conclusion that discusses results. Use the format provided by the CAM. • Prepare a Technology/Knowledge Transfer Plan that includes: o An explanation of how the knowledge gained from the project will be made available to the public, including the targeted market sector and potential outreach to end users, utilities, regulatory agencies, and others.

  • Relationship Manager Inquiry for Actual Knowledge In addition to the electronic and paper record searches described above, the Reporting Financial Institution must treat as Reportable Accounts any High Value Accounts assigned to a relationship manager (including any accounts aggregated with such account) if the relationship manager, has actual knowledge that the Account Holder is a Specified Person.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

  • Education and Specialized Knowledge Preferably secondary school graduation; a good working knowledge of the Motor Vehicle Act and Regulations; a good knowledge of safety rules and regulations as they pertain to the driving and/or operation of the vehicles, equipment and machinery involved; preferably graduation from a defensive driving course and/or a recognized training program in the driving and operation of commercial type vehicle or heavy equipment.

  • Processing of Company Personal Data 2.1 Processor shall:

  • INFORMATION ABOUT US AND HOW TO CONTACT US 2.1. Who we are. We are PayrNet Limited, an EMI as described above.

  • Reporting Unauthorized Transactions You should notify us immediately if you believe your Access Codes or any Access Devices have been lost or stolen, that someone has gained access to the Security Procedure, or that someone has transferred or may transfer money from your Account without your permission or if you suspect any fraudulent activity on your Account. To notify us, call us at the number provided in Section 9.6 between 8:00 a.m. to 4:30 p.m. Central Time during a Business Day.

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

Time is Money Join Law Insider Premium to draft better contracts faster.