RETURN OF BID SECURITY Sample Clauses

RETURN OF BID SECURITY. Bid security of the lowest two or more Bidders may be retained until the Contract is executed or rejection made by the Owner. Other Bid security will be returned if requested only after the tabulation of Bids is completed.
AutoNDA by SimpleDocs
RETURN OF BID SECURITY. The Proposals of the three (3) lowest Bidders will be considered in awarding the Contract. The City Engineer will return all other Proposal securities promptly after the tabulation of Bids has been made. The Proposal securities retained will be returned after the successful Bidder has executed the Contract and the bonds accompanying the same are approved and filed.
RETURN OF BID SECURITY. Bid Security submitted in the form of Cashier's Checks or Certified Checks will be returned within five days after execution of the Agreement by City. Bid Bonds will not be returned unless otherwise requested by Bidder.
RETURN OF BID SECURITY. 21.5.1. The bid security of the unsuccessful bidders will be returned to them after the contract has been signed, or previous to such time, at the discretion of the Strait Regional Centre for Education. 21.5.2. The above shall apply provided a contract is awarded within ninety (90) days from the closing date of the bid. 21.5.3. If no contract is awarded, all bid security will be returned.
RETURN OF BID SECURITY. (a) Within 10 days after the bid opening, DSNY will notify the Comptroller to return the deposits of all but the three lowest bidders. Within five days after the award, DSNY will notify the Comptroller to return the deposits of the remaining two unsuccessful bidders. (b) If the successful bidder is obligated to submit payment and performance bonds DSNY will notify the Comptroller to return the bid of the successful bidder DSNY bee, within five days after the execution of the Contract and DSNY’s acceptance of the Contractor’s bonds, whichever occurs later. (c) If the successful bidder is not obligated to submit payment and performance DSNY will notify the Comptroller to return the bid security of the successful bidder only after the amount retained under Article 6 of the Agreement equals the amount of the bid security. (d) If DSNY rejects all bids, DSNY will notify the Comptroller to return the deposits of the three lowest bidders at the time of rejection.
RETURN OF BID SECURITY. Unless otherwise agreed by the Parties, the Bid Security will be returned to Respondent upon the earlier of: (i) the delivery of performance security if NorthWestern and Respondent execute a [power purchase agreement (“CREP PPA”) or definitive build-transfer agreement (“Build-Transfer Agreement”)]; or (ii) within 10 days of NorthWestern’s execution of a power purchase agreement or build-transfer agreement with a third party; provided NorthWestern terminates negotiations with Respondent. Notwithstanding the foregoing, if, after the expiration of 120 days following the date of this Agreement (such period subject to extension upon mutual agreement of the Parties) the Parties have not executed a [CREP PPA or a Build-Transfer Agreement], and such failure did not arise out of or result from bid forfeiture conduct set forth in Section 3 below, NorthWestern shall return the Bid Security. Respondent shall provide specific instructions specifying the name and address of the person or entity to properly receive the returned Bid Security. Absent such information, NorthWestern will mail the Bid Security to the address provided in Respondent’s CREP RFP proposal.
RETURN OF BID SECURITY. Within 15 days after the award of the Contract, the VILLAGE will return the Bid securities to all BIDDERS whose Proposals are not to be further considered in awarding the Contract. Retained bid securities will be held until the Contract has been finally executed, after which all bid securities, other than BIDDERS' bonds and any guarantees which have been forfeited, will be returned to the respective BIDDERS whose proposals they accompanied.
AutoNDA by SimpleDocs

Related to RETURN OF BID SECURITY

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid. 2.1.1 Bid security, if required, shall be in the amount specified on the bid. The bid security must be scanned and attached to the “Response Attachments” section of your response or it can be faxed to the Purchasing Office at 000-000-0000. The original bid security should then be sent or delivered to the office of the Purchasing Division, 000 X. 0xx Xx., Xxx. 000, Xxxxxxx, XX 00000 to be received within three (3) days of bid closing. 2.1.2 If bid security is not received in the Office of the Purchasing Division as stated above, the vendor may be determined to be non-responsive. 2.2 If alternates are submitted, only one bid security will be required, provided the bid security is based on the amount of the highest gross bid. 2.3 Such bid security will be returned to the unsuccessful Bidders when the award of bid is made. 2.4 Bid security will be returned to the successful Bidder(s) as follows: 2.4.1 For single order bids with specified quantities: upon the delivery of all equipment or merchandise, and upon final acceptance by the Owners. 2.4.2 For all other contracts: upon approval by the Owners of the executed contract and bonds. 2.5 Owners shall have the right to retain the bid security of Bidders to whom an award is being considered until either: 2.5.1 A contract has been executed and bonds have been furnished. 2.5.2 The specified time has elapsed so that the bids may be withdrawn. 2.5.3 All bids have been rejected. 2.6 Bid security will be forfeited to the Owners as full liquidated damages, but not as a penalty, for any of the following reasons, as pertains to this specification document: 2.6.1 If the Bidder fails or refuses to enter into a contract on forms provided by the Owners, and/or if the Bidder fails to provide sufficient bonds or insurance within the time period as established in this specification document.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Actively Traded Security The Common Stock is an “actively traded security” excepted from the requirements of Rule 101 of Regulation M under the Exchange Act by subsection (c)(1) of such rule.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • BENEFICIAL INTEREST IN AN UNRESTRICTED GLOBAL NOTE In connection with the Owner's Exchange of a Restricted Definitive Note for a beneficial interest in an Unrestricted Global Note, the Owner hereby certifies (i) the beneficial interest is being acquired for the Owner's own account without transfer, (ii) such Exchange has been effected in compliance with the transfer restrictions applicable to Restricted Definitive Notes and pursuant to and in accordance with the Securities Act, (iii) the restrictions on transfer contained in the Indenture and the Private Placement Legend are not required in order to maintain compliance with the Securities Act and (iv) the beneficial interest is being acquired in compliance with any applicable blue sky securities laws of any state of the United States.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Lost or Mutilated Note If this Note shall be mutilated, lost, stolen or destroyed, the Company shall execute and deliver, in exchange and substitution for and upon cancellation of a mutilated Note, or in lieu of or in substitution for a lost, stolen or destroyed Note, a new Note for the principal amount of this Note so mutilated, lost, stolen or destroyed, but only upon receipt of evidence of such loss, theft or destruction of such Note, and of the ownership hereof, reasonably satisfactory to the Company.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!