Receipt of Data Sample Clauses

Receipt of Data. PURCHASER represents that it has had the opportunity to perform due diligence on the Oil & Gas Interests that PURCHASER wishes to purchase, which includes physical inspection(s), environmental assessment(s), reviewing well data and other files, and performing all necessary tasks involved in evaluating the Oil & Gas Interests.
Receipt of Data. Pursuant to Section 7.1, Purchaser has had or will have the opportunity to perform adequate due diligence on the Assets by reviewing the Data Exchange and performing a Pre-Acquisition Review.
Receipt of Data. 3.1 Distributor is licensed to receive Data either directly from the Supplier or from the Vendor(s) specified in this Agreement. Distributor must obtain prior permission from the Supplier to receive Data from any other source for the purpose of distribution in accordance with this Agreement. 3.2 From time to time the Supplier may add, delete or alter Data depending on its operational requirements. In accordance with industry good practice, the Supplier will use reasonable efforts to provide advance written notice (e.g. Email, Fax etc.) of such changes to Data, changes to the form in which or the means of access by which the Data is received by the Distributor. If Distributor has reason to believe any such changes significantly alter the nature of the Data or reduce Data quality then, for a period of 1 month after the date Distributor being notified of such changes, Distributor may terminate its right to receive Data without liability by written notice. Any such termination will take effect within 20 (twenty) days of the date of written notice being received by the Supplier. 3.3 Distributor owns and is solely responsible for the management and operation of the communication infrastructure (routers, leased line) from the LAN interface up to his site location. Distributor connects his equipment to an interface provided by the supplier or third party. 3.4 Distributor shall be responsible at its own expense for the installation, operation and maintenance of telecommunication lines, equipment and software in accordance with the User Specifications published by the Supplier from time to time as necessary to enable Distributor to distribute the Data in any manner permitted by this Agreement. 3.5 At the request of the Distributor, the Supplier or recommended third party shall assist the Distributor during the order process of such telecommunication lines, equipment and software as are necessary to enable the Distributor to receive the Data. Distributor shall promptly reimburse the Supplier or third party nominated by EXFEED Ltd. for the costs of the same, provided that the Supplier or third party has notified the Distributor of the estimated cost of such installation, prior to any request or reimbursement and the Distributor has agreed the same. 3.6 Distributor shall ensure at its own expense that all items which Distributor is responsible for providing to enable receipt and distribution of Data are compatible with the User Specification issued by the Supplier. The...
Receipt of Data. Purchaser has had the opportunity to perform due diligence on the Oil & Gas Interests, which includes physical inspection(s), environmental assessment(s), reviewing well data and other files requested by Purchaser, making inquiries of Seller and performing all necessary tasks involved in evaluating the Oil & Gas Interests.
Receipt of Data. Subject to Seller’s compliance with Section 7.1, and absent Fraud by Seller, such Purchaser has had or will have the opportunity to perform adequate due diligence on the Assets by reviewing the Data Room and performing a Pre-Acquisition Review.
Receipt of Data. 4.1. The Supplier will be informed via e-mail as soon as Preh places data in the Web Portal. The data can be accessed by clicking on the link included in the e-mail. 4.2. The Supplier undertakes to check for e-mails at least once a day during normal business hours (Monday to Friday, 7.00 am – 5.00 pm). 4.3. Data shall be deemed delivered as soon as the data recipient is able to acknowledge it under normal circumstances. This is the case when the Supplier receives notice that it can access data on the data interchange server. 4.4. If data is deemed received in accordance with section 4.3 outside normal business hours, it is deemed delivered as of the start of normal business hours the next working day. 4.5. If, in exercising due diligence in everyday business, the Supplier recognises that the wrong data has been transferred, it shall notify the other Party in writing without delay by letter, fax or e- mail. 4.6. Unless otherwise advised by the Supplier in writing within 5 working days of receipt of the data, the transferred data is deemed delivered at the end of this period and is thus binding.
Receipt of Data. HES represents that it has had the opportunity to perform due diligence on the Subject Interests, which includes physical inspection(s), environmental assessment(s), reviewing well data and other files, and performing all necessary tasks involved in evaluating the Subject Interests.

Related to Receipt of Data

  • DESTRUCTION OF STATE DATA At any time during the term of this Contract within thirty days of (i) the State’s written request or (ii) termination or expiration of this Contract for any reason, Contractor shall securely dispose of all copies, whether in written, electronic or other form or media, of State Data according to National Institute of Standards and Technology (NIST) approved methods, and certify in writing to the State that such State Data has been disposed of securely. Further, upon the relocation of State Data, Contractor shall securely dispose of such copies from the former data location according to National Institute of Standards and Technology (NIST) approved methods and certify in writing to the State that such State Data has been disposed of securely. Contractor shall comply with all reasonable directions provided by the State with respect to the disposal of State Data.

  • Destruction of Data Provider shall destroy or delete all Personally Identifiable Data contained in Student Data and obtained under the DPA when it is no longer needed for the purpose for which it was obtained or transfer said data to LEA or LEA’s designee, according to a schedule and procedure as the parties may reasonable agree. Nothing in the DPA authorizes Provider to maintain personally identifiable data beyond the time period reasonably needed to complete the disposition.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Removal of Data County PHI or PI must not be removed from the premises of the Contractor except with express written permission of County.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA. (b) If applicable, once the transfer of PII has been accomplished in accordance with the EA’s written election to do so, Contractor agrees to return or destroy all PII when the purpose that necessitated its receipt by Contractor has been completed. Thereafter, with regard to all PII (including without limitation, all hard copies, archived copies, electronic versions, electronic imaging of hard copies) as well as any and all PII maintained on behalf of Contractor in a secure data center and/or cloud-based facilities that remain in the possession of Contractor or its Subcontractors, Contractor shall ensure that PII is securely deleted and/or destroyed in a manner that does not allow it to be retrieved or retrievable, read or reconstructed. Hard copy media must be shredded or destroyed such that PII cannot be read or otherwise reconstructed, and electronic media must be cleared, purged, or destroyed such that the PII cannot be retrieved. Only the destruction of paper PII, and not redaction, will satisfy the requirements for data destruction. Redaction is specifically excluded as a means of data destruction. (c) Contractor shall provide the EA with a written certification of the secure deletion and/or destruction of PII held by the Contractor or Subcontractors. (d) To the extent that Contractor and/or its subcontractors continue to be in possession of any de-identified data (i.e., data that has had all direct and indirect identifiers removed), they agree not to attempt to re-identify de-identified data and not to transfer de-identified data to any party.

  • Electronic Delivery of Certain Information Each Guarantor acknowledges and agrees that information regarding the Guarantor may be delivered electronically pursuant to Section 8.5. of the Credit Agreement.

  • Marking of Data Pursuant to Paragraph A above, any Data delivered under this Agreement shall be marked with the following legend: Use, duplication, or disclosure is subject to the restrictions as stated in Agreement HR0011-XX-9-XXXX between the Government and the Performer.

  • Loss of Data In the event of loss of any State data or records where such loss is due to the intentional act, omission, or negligence of the Contractor or any of its subcontractors or agents, the Contractor shall be responsible for recreating such lost data in the manner and on the schedule set by the Contract Manager. The Contractor shall ensure that all data is backed up and is recoverable by the Contractor.

  • Transmission of Data Customer understands that the technical processing and transmission of Customer’s Electronic Communications is fundamentally necessary to use of the Cloud Service. Customer is responsible for securing DSL, cable or another high speed Internet connection and up-to-date “browser” software in order to utilize the Cloud Service. Customer expressly consents to Oracle’s interception and storage of Electronic Communications and/or Customer Data as needed to provide the Services hereunder, and Customer acknowledges and understands that Customer’s Electronic Communications will involve transmission over the Internet, and over various networks, only part of which may be owned and/or operated by Oracle. Customer further acknowledges and understands that Electronic Communications may be accessed by unauthorized parties when communicated across the Internet, network communications facilities, telephone or other electronic means. Without limiting Oracle’s applicable obligations under the Security or Confidentiality Sections of this Agreement, Oracle is not responsible for any Electronic Communications and/or Customer Data which are delayed, lost, altered, intercepted or stored during the transmission of any data whatsoever across networks not owned and/or operated by Oracle, including, but not limited to, the Internet and Customer’s local network.

  • DISCONNECTION OF SUPPLY 14.1 When can we arrange for disconnection? (a) you do not pay your bill by the pay-by date and, if you are a residential customer, you: (i) fail to comply with the terms of an agreed payment plan; or (ii) do not agree to an offer to pay the bill by instalments, or having agreed, you fail to comply with the instalment arrangement; (b) you do not provide a security deposit we are entitled to require from you; or (c) you do not give access to your premises to read a meter (where relevant) for 3 consecutive meter reads; or (d) you fail to give us safe and unhindered access to the premises as required by clause 11 or any requirements under the energy laws; or (e) there has been illegal or fraudulent use of energy at your premises in breach of clause 16 of this contract; or (f) we are otherwise entitled or required to do so under the Rules or by law.