RISK IDENTIFICATION, MANAGEMENT, AND ALLOCATION Sample Clauses

RISK IDENTIFICATION, MANAGEMENT, AND ALLOCATION. 12.1 RISK IDENTIFICATION
AutoNDA by SimpleDocs

Related to RISK IDENTIFICATION, MANAGEMENT, AND ALLOCATION

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Your Member Identification Card Your BCBSRI member ID card is your key to getting healthcare coverage. It shows your healthcare provider that you’re part of the nation’s most trusted health plan. All BCBSRI members receive ID cards, which provide important information about your coverage. This card is for identification only, and you must show it whenever you receive healthcare services. Please note you must be a current member to receive covered services. Tips for keeping your card safe: • Carry it with you at all times. • Keep it in a safe location, just as you would with a credit card or money. • Let BCBSRI know right away if it is lost or stolen.

  • Contractor’s Staff Identification Contractor shall provide, at Contractor’s expense, all staff providing services under this Contract with a photo identification badge.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • User Identification 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • National Item Identification Number (NIIN) The number assigned to each approved Item Identification under the Federal Cataloging Program. It consists of nine numeric characters, the first two of which are the National Codification Bureau (NCB) Code. The remaining positions consist of a seven digit non-significant number.

  • Employer Identification Number The Administrator shall have and use its own Employer Identification Number for purposes of calculating payroll tax withholdings and providing reports state and federal tax authorities.

  • Personal Identification Number (PIN) 4.B.2.1. The Bank also provides the Cardholder with a Personal Identification Number (PIN), which is equivalent to the Cardholder’s signature. Although the Cardholder may change the PIN as many times as he wishes by inserting his Card in any ATM of the Bank (or anywhere else that the Bank may announce in the future) and following the instructions displayed on the screen, this number is strictly personal and the Cardholder must memorize it, refrain from recording it on the Card or any other document, even in disguised form, hide the ATM or EFT/POS keyboard when typing the PIN, avoid revealing it or giving it to third parties and generally prevent it from being revealed to any third party. It constitutes gross negligence on the Cardholder’s part to keep the PIN in any readable form. The PIN is produced electronically under strictly controlled security conditions that make its reproduction absolutely impossible and is notified to the Cardholder through one of the means stated in the letter accompanying the Card. The PIN can be used only with the Card for which it was issued.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!