Sorting of Data Sample Clauses

Sorting of Data. The Service Providers is expected to have in-place suitable ‘Collating and Sorting software’ which is capable of collating and sorting the electronic data to ensure high efficiencies in printing and dispatch of PVC Cards, Policy Documents, Welcome Letters, Envelope and Ration Vitran Panjika. For Cards, Welcome letters and Policy Documents, The Service Providers is required to sort the received data Village/Gram Panchayat wise in case of Rural and Xxxx- xxxx in case of Urban. For Ration Vitran Panjika, received data need to be sorted and bundled FPS wise of the respective district The other variables for sorting of data may be specified by RISL from time to time and the same needs to be complied by the Service Providers. In-addition, a unique Card tracking number shall be provided or specified, as the case may be, by RISL to the Service Providers and which needs to be printed on every PVC Cards, Policy Documents, Welcome Letters, Envelope and Ration Vitran Panjika. The Service Providers shall be allotted a series of such codes/barcodes separately. The Service Providers are to ensure the uniqueness of PVC Cards, Policy Documents, Welcome Letters, Envelope and Ration Vitran Panjika - barcode. Any non-unique relationships shall be treated as duplicate printing, unless otherwise specified/communicated/agreed by RISL. Rate contract for Printing and Delivery of PVC Cards and other documents (Before Pre-Bid)
AutoNDA by SimpleDocs

Related to Sorting of Data

  • Marking of Data Pursuant to Paragraph A above, any Data delivered under this Agreement shall be marked with the following legend: Use, duplication, or disclosure is subject to the restrictions as stated in Agreement HR0011-XX-9-XXXX between the Government and the Performer.

  • Processing of Data You acknowledge and agree that with each use of the Service initiated by your xxxxxxxxxx.xxx authenticated Users the Service will access Your xxxxxxxxxx.xxx account to retrieve, store, manipulate, process and modify Customer Data based on Your configuration of the Service (“Process”) and You expressly consent to such access solely as is necessary to provide the Service or Support Services. If the Service cannot for any reason access Your xxxxxxxxxx.xxx account, Conga will be excused from any nonperformance of the Service. You acknowledge that to provide the Service, Customer Data leaves the xxxxxxxxxx.xxx system. Xxxxxxxxxx.xxx is not responsible for Customer Data when it is outside of the xxxxxxxxxx.xxx system.

  • Source of Data A description of (1) the process used to identify Paid Claims in the Population and (2) the specific documentation relied upon by the IRO when performing the Claims Review (e.g., medical records, physician orders, certificates of medical necessity, requisition forms, local medical review policies (including title and policy number), CMS program memoranda (including title and issuance number), Medicare carrier or intermediary manual or bulletins (including issue and date), other policies, regulations, or directives).‌‌‌

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Information and Data 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

  • Use of Data (a) In connection with the provision of the services and the discharge of its other obligations under this Agreement, State Street (which term for purposes of this Section XXIX includes each of its parent company, branches and affiliates (''Affiliates")) may collect and store information regarding a Trust and share such information with its Affiliates, agents and service providers in order and to the extent reasonably necessary (i) to carry out the provision of services contemplated under this Agreement and other agreements between the Trusts and State Street or any of its Affiliates and (ii) to carry out management of its businesses, including, but not limited to, financial and operational management and reporting, risk management, legal and regulatory compliance and client service management.

  • Removal of Data County PHI or PI must not be removed from the premises of the Contractor except with express written permission of County.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Account Information Disclosure We will disclose information to third parties about your account or the transfers you make: - As necessary to complete transfers; - To verify the existence of sufficient funds to cover specific transactions upon the request of a third party, such as a credit bureau or merchant; - If your account is eligible for emergency cash and/or emergency card replacement services and you request such services, you agree that we may provide personal information about you and your account that is necessary to provide you with the requested service(s); - To comply with government agency or court orders; or - If you give us your written permission.

Time is Money Join Law Insider Premium to draft better contracts faster.