We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

SPAM and Blacklists Sample Clauses

SPAM and Blacklists. As part of this agreement, we only assure that your server is not an open relay. Dealing with any other issues relating to inbound or outbound spam may result in additional fees. For inbound spam, the support only covers default SPAM solutions included with your system’s control panel. We provide support to determine if your SPAM software is working. We do not include any support related to the accuracy of the spam system. Any work required to tune the system for improved accuracy will require a paid support ticket. For outbound spam, we will do a security check to assure your server is not an open relay. If the spam is originating from an end-user or from a web script, the investigation of the issue is not covered by this agreement. For any outbound spam investigations, you may be charged a spam investigation fee at our prevailing hourly rates.
SPAM and Blacklists. As part of this Agreement, we only assure that your server is not an open relay (publicly accessible by any email sender). Dealing with any other issues relating to inbound or outbound spam may result in additional fees. For inbound spam, the support only covers default SPAM solutions included with your system’s control panel. We provide support to determine if your SPAM software is working. We do not include any support related to the accuracy of the SPAM system. Any work required to tune the system for improved accuracy will require case- based support. For outbound SPAM, we will do a security check to assure that your server is not an open relay. If the SPAM is originating from an end-user or from a web script on your server, the investigation of the issue is not covered by this agreement. For any outbound spam investigations, you may be charged a SPAM investigation fee at our prevailing hourly rates and your service may be suspended or terminated at EndLayer’s discretion in order to protect the EndLayer network.

Related to SPAM and Blacklists

  • Training and Orientation (a) No employee shall be required to work on any job or operate any piece of equipment until he/she has received proper training and instruction. (b) The Employer shall provide sufficient and adequate training and/or orientation to any employee working in a new or unfamiliar work area or position.

  • Training and Promotion a. The contractor will assist in locating, qualifying, and increasing the skills of minorities and women who are applicants for employment or current employees. Such efforts should be aimed at developing full journey level status employees in the type of trade or job classification involved. b. Consistent with the contractor's work force requirements and as permissible under Federal and State regulations, the contractor shall make full use of training programs, i.e., apprenticeship, and on-the-job training programs for the geographical area of contract performance. In the event a special provision for training is provided under this contract, this subparagraph will be superseded as indicated in the special provision. The contracting agency may reserve training positions for persons who receive welfare assistance in accordance with 23 U.S.C. 140(a). c. The contractor will advise employees and applicants for employment of available training programs and entrance requirements for each. d. The contractor will periodically review the training and promotion potential of employees who are minorities and women and will encourage eligible employees to apply for such training and promotion.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Employee Orientation Each and every person working for a contractor, including sub- contractors, will be given an orientation to familiarize them with the site safety program. Unless otherwise specified, each sub-contractor is responsible for the orientation of their workers.

  • Felling and Bucking Felling shall be done to minimize breakage of Included Timber and dam- age to residual timber. Unless agreed otherwise, felling shall be done by saws or shears. Bucking shall be done to permit removal of all minimum pieces set forth in A2. B6.411 Felling in Clearings. Insofar as ground conditions, tree lean, and shape of clearings per- mit, trees shall be felled so that their tops do not extend outside Clearcutting Units, construction clearings, and ar- eas of regeneration cutting. B6.000 Xxxxx Xxxxxxx. Stumps shall not exceed, on the side adjacent to the highest ground, the maximum heights set forth in A6, except that occasional stumps of greater heights are acceptable when Purchaser determines that they are necessary for safe and efficient conduct of logging. Unless otherwise agreed, Purchaser shall re-cut high stumps so they will not exceed heights specified in A6 and shall dispose of severed portions in the same manner as other logging debris. The xxxxx heights shown in A6 were selected with the objective of maximum reasonable utilization of the timber, unless Sale Area Map shows special areas where xxxxx heights are lower for aesthetic, land treatment, or silvicultural rea- sons.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Supplier Code of Conduct At all times during the term of this Agreement, Seller will comply with the Apple Supplier Code of Conduct ("Code of Conduct"), as amended by Apple from time-to-time, available from Apple’s public website at xxxxx://xxx.xxxxx.xxx/supplier-responsibility/. Notwithstanding anything to the contrary herein, Seller will: (i) allow Apple and a third party representative, retained by or representing Apple (collectively, the "Auditor"), to assess Seller’s compliance with the Code of Conduct by inspecting Seller’s facilities and/or reviewing Seller’s practices, policies, and relevant records without notice, and/or by interviewing Seller’s personnel without monitoring, solely to verify Seller’s compliance with the Code of Conduct (collectively, an "Assessment"); (ii) promptly provide the Auditor with access to any relevant facilities and personnel without disruption or interference, in connection with any Assessment; (iii) promptly provide complete and accurate information and documentation in response to the Auditor’s requests, (iv) allow the Auditor to review and assess working hours and conditions, remuneration and benefits, personnel practices, production, dormitory, and dining facilities, business conduct, and health, safety, and environmental practices, as applicable, in connection with any Assessment; (v) not request or encourage, directly or indirectly, any Seller personnel to furnish false or incomplete information in connection with any Assessment; (vi) not take retaliatory action against any Seller personnel interviewed during an Assessment; and

  • Access to Personnel File Each employee shall have reasonable access to his/her personnel file for the purpose of reviewing any evaluations or formal disciplinary notations contained therein, in the presence of the Director of Personnel or designate. An employee has the right to request copies of any evaluations in this file.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.