Security Permit Application Sample Clauses

Security Permit Application 
AutoNDA by SimpleDocs

Related to Security Permit Application

  • Credit Approval All orders are subject to credit approval by Siemens. Siemens may modify, suspend or withdraw the credit amount or payment terms at any time. If there is doubt as to Buyer’s financial condition, Siemens may withhold performance of Services, require cash payments or advance payments, or require other satisfactory financial security before performance of Services.

  • Credit Approval and Deposits Initial and ongoing delivery of Services may be subject to credit approval. Customer shall provide Comcast with credit information requested by Comcast. Customer authorizes Comcast to make inquiries and to receive information about Customer’s credit history from others and to enter this information in Customer’s records. Customer represents and warrants that all credit information that it provides to Comcast will be true and correct. Comcast, in its sole discretion, may deny the Services based upon an unsatisfactory credit history. Additionally, subject to applicable regulations, Comcast may require Customer to make a deposit (in an amount not to exceed an estimated two-month's charge for the Services) as a condition to Comcast’s provision of the Services, or as a condition to Comcast’s continuation of the Services. The deposit will not, unless explicitly required by law, bear interest and shall be held by Comcast as security for payment of Customer's charges. If the provision of Service to Customer is terminated, or if Comcast determines in its sole discretion that such deposit is no longer necessary, then the amount of the deposit will be credited to Customer's account or will be refunded to Customer, as determined by Comcast.

  • Inspection of Goods 8.1 The Buyer shall inspect the goods upon delivery.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Technical documents Not applicable.

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • Mandate Letter language The Funder will receive a Mandate Letter from the Ministry annually. Each Mandate Letter articulates areas of focus for the Funder, and the Ministry’s expectation that the Funder and health service providers it funds will collaborate to advance these areas of focus. To assist the HSP in its collaborative efforts with the Funder, the Funder will share each relevant Mandate Letter with the HSP. The Funder may also add local obligations to Schedule D as appropriate to further advance any priorities set put in a Mandate Letter.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Technical Documentation Prior to commencement of the Tests on Completion, the Contractor shall supply to the Engineer the technical documentation as specified in the Employer’s Requirements. The Works or Section shall not be considered to be completed for the purposes of taking- over under sub-clause 10.1 [Taking Over of the Works and Sections] until the Engineer has received the technical documentation as defined in this sub-clause 5.7, the "history file" including design calculations and certain certification as well as any other documents required to meet the CE Marking requirements.

Time is Money Join Law Insider Premium to draft better contracts faster.