Currently Available Existing as part of CenturyLink’s network at the time of a requested order or service. Currently Available does not include any service, Network Element, facility, feature, function or capability that CenturyLink either does not provide to itself or to its own End Users, does not have the capability to provide, or is not required to provide on a resold or unbundled basis under Applicable Law.
Information Available So long as the Registration Statement is effective covering the resale of Shares owned by the Investor, the Company will furnish to the Investor: (a) as soon as practicable after it is available, one copy of (i) its Annual Report to Stockholders (which Annual Report shall contain financial statements audited in accordance with generally accepted accounting principles by a national firm of certified public accountants) and (ii) if not included in substance in the Annual Report to Stockholders, its Annual Report on Form 10-K (the foregoing, in each case, excluding exhibits); (b) upon the reasonable request of the Investor, all exhibits excluded by the parenthetical to subparagraph (a)(ii) of this Section 7.5 as filed with the SEC and all other information that is made available to shareholders; and (c) upon the reasonable request of the Investor, an adequate number of copies of the Prospectuses to supply to any other party requiring such Prospectuses; and the Company, upon the reasonable request of the Investor, will meet with the Investor or a representative thereof at the Company's headquarters to discuss all information relevant for disclosure in the Registration Statement covering the Shares and will otherwise cooperate with any Investor conducting an investigation for the purpose of reducing or eliminating such Investor's exposure to liability under the Securities Act, including the reasonable production of information at the Company's headquarters; provided, that the Company shall not be required to disclose any confidential information to or meet at its headquarters with any Investor until and unless the Investor shall have entered into a confidentiality agreement in form and substance reasonably satisfactory to the Company with the Company with respect thereto.
Publicly Available Statements and Reports For a period of five (5) years from the Effective Date or until such earlier time that the Company is required to be liquidated or the Common Stock and Warrants cease to be publicly traded, the Company will furnish to the Representative such copies of financial statements and other periodic and special reports as the Company from time to time furnishes generally to holders of any class of its securities and such additional documents and information with respect to the Company as the Representative may from time to time reasonably request. Any financial statements and reports filed on the Commission’s XXXXX website or otherwise available on the Company’s website will be considered furnished for purposes of this section.
Testing-the-Waters Communications If at any time following the distribution of any Written Testing-the-Waters Communication there occurred or occurs an event or development as a result of which such Written Testing-the-Waters Communication included or would include an untrue statement of a material fact or omitted or would omit to state a material fact necessary in order to make the statements therein, in the light of the circumstances existing at that subsequent time, not misleading, the Company shall promptly notify the Representative and shall promptly amend or supplement, at its own expense, such Written Testing-the-Waters Communication to eliminate or correct such untrue statement or omission.
Services Available To help resolve employment relationship problems, the Ministry of Business, Innovation and Employment provides:
RDDS update time Refers to the time measured from the reception of an EPP confirmation to a transform command on a domain name, host or contact, up until the servers of the RDDS services reflect the changes made.
FALSE STATEMENTS CONCERNING HIGHWAY PROJECTS T h i s p r o v i s i o n i s applicable to all Federal-aid construction contracts and to all related subcontracts. In order to assure high quality and durable construction in conformity with approved plans and specifications and a high degree of reliability on statements and representations made by engineers, contractors, suppliers, and workers on Federal- aid highway projects, it is essential that all persons concerned with the project perform their functions as carefully, thoroughly, and honestly as possible. Willful falsification, distortion, or misrepresentation with respect to any facts related to the project is a violation of Federal law. To prevent any misunderstanding regarding the seriousness of these and similar acts, Form FHWA-1022 shall be posted on each Federal-aid highway project (23 CFR 635) in one or more places where it is readily available to all persons concerned with the project: 18 U.S.C. 1020 reads as follows: "Whoever, being an officer, agent, or employee of the United States, or of any State or Territory, or whoever, whether a person, association, firm, or corporation, knowingly makes any false statement, false representation, or false report as to the character, quality, quantity, or cost of the material used or to be used, or the quantity or quality of the work performed or to be performed, or the cost thereof in connection with the submission of plans, maps, specifications, contracts, or costs of construction on any highway or related project submitted for approval to the Secretary of Transportation; or Whoever knowingly makes any false statement, false representation, false report or false claim with respect to the character, quality, quantity, or cost of any work performed or to be performed, or materials furnished or to be furnished, in connection with the construction of any highway or related project approved by the Secretary of Transportation; or Whoever knowingly makes any false statement or false representation as to material fact in any statement, certificate, or report submitted pursuant to provisions of the Federal-aid Roads Act approved July 1, 1916, (39 Stat. 355), as amended and supplemented; Shall be fined under this title or imprisoned not more than 5 years or both."
Amendments to Clarify and Correct Errors and Defects The parties may amend this Agreement to clarify an ambiguity, correct an error or correct or supplement any term of this Agreement that may be defective or inconsistent with the other terms of this Agreement, in each case, without the consent of the Noteholders, the Certificateholders or any other Person. The parties may amend any term or provision of this Agreement from time to time for the purpose of conforming the terms of this Agreement to the description thereof in the Prospectus, without the consent of Noteholders, the Certificateholders or any other Person.
FACILITIES AVAILABLE WITH THE CARD 4.1 Use during validity period 4.2 Operating card account via TBS 4.3 Card transaction by mail / telephone / facsimile / electronic mail / internet 4.4 Cash advance within given limit 4.5 Cash advance subject to fees and charges
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.