(t) Sample Clauses

(t) num [1:1375] -8.13 6.96 -6.73 6.42 6.42 ...
AutoNDA by SimpleDocs
(t). In particular, if the network is asynchronous and there are up to ta corruptions, weak validity is achieved: any party that does not output has received at least n ts values with grade 2, and n ts ta > ta of those values correspond to the inputs of honest parties. Moreover, when the network is synchronous and up to ts parties are corrupted, there cannot be honest parties Pi and Pj that output different bits v and 1 − v, respectively. This is because 1) if Pi receives (1 − v, ·) up to ta times, then Pj cannot receive (1 − v, 2) more than ta times, and 2) if Pi receives (v, 2) at least n − ts times, then Pj receives (v, ·) at least n − ts > ta times. GBC We formally describe the protocol below. Let Πt be a gradecast protocol running in s GBC rounds. The n executions of Πt are to be run in parallel to preserve round-efficiency. Security is proven in Section C. WC GBC Protocol Πta,ts Πmax{ta,ts} We describe the protocol from the point of view of party Pj holding input vj. We denote by Πmax{ta,ts}(j) an execution of protocol Πmax{ta,ts} in which party Pj acts as the sender. GBC GBC
(t). PK8.DC.3. All Students: a. Shall always demonstrate kind and respectful behavior towards others when using electronic devices, network and Internet; following school policy agreements and anti-cyberbullying laws at the local, state and federal levels; b. Shall immediately report any known cyberbullying behavior to a teacher or supervising staff member; c. Shall protect the rights and privacy of others, by never photographing or filming an individual without consent, and never posting and/or distributing videos or photographs without consent of the school and the persons depicted; d. Shall behave in a safe manner when using technology by protecting and not sharing personal information and personal images in the public domain. While on school property, students will only use technology to communicate with individuals within the school community or organizations/experts approved by teachers. While on school grounds students shall only use communication platforms approved by the school and all communication shall be only for educational purposes; e. Shall abide by all copyright and intellectual property laws, avoiding plagiarism by using proper citations or permissions. Students shall only use work product that is their own, not taking credit of the work of others; f. Shall immediately report to a teacher or supervising staff member any inappropriate material or misuse of technology equipment of which the student becomes aware. 3. Students will manage their personal data to maintain digital privacy and security and are aware of data- collection technology used to track their navigation online. T.PK8.DC.4.
(t). °". , ��,r: :.�i\ Typed or Printed Na me of Authorized Representative Xxxxxxx Xxxxxxxx Title encumbered to pay this obligation, or that there is a sufficient balance in the appropriation cited to cover this obligation. I am aware that to knowingly make or allow false entries or alternations on a public record, or knowingly destroy, mutilate, suppress, conceal, remove or otherwise impair the variety, legibility or availability of a public record constitutes tampering with public records punishable under AS 11.56.815-.820. Other disciplinary action may be taken up to and including dismissal.
(t). PK8.DC.3. All Students:
(t). (c) Notwithstanding any other provision of this Agreement to the contrary, any indemnification under this Article XI shall not be subject to any (i) limitation under Article IX (except as provided in Section 9.9), including any Basket or Cap, or (ii) offset or reduction for any Tax items reflected on the Sweden Closing Balance Sheet, Norway Closing Balance Sheet or any other balance sheet of the Nordic Companies, except for any accrued Taxes that are reflected as a liability on the Sweden Closing Balance Sheet or the Norway Closing Balance Sheet, to the extent such Taxes reduce the Closing Net Working Capital.
AutoNDA by SimpleDocs
(t). (i) The Administrative Agent may direct the Collateral Agent to take any such incidental action hereunder. With respect to other actions which are incidental to the actions specifically delegated to the Collateral Agent hereunder, the Collateral Agent shall not be required to take any such incidental action hereunder, but shall be required to act or to refrain from acting (and shall be fully protected in acting or refraining from acting) upon the direction of the Administrative Agent; provided that the Collateral Agent shall not be required to take any action hereunder at the request of the Administrative Agent, any Secured Party or otherwise if the taking of such action, in the reasonable determination of the Collateral Agent, (A) shall be in violation of any Applicable Law or contrary to any provisions of this Agreement or (B) shall expose the Collateral Agent to liability hereunder or otherwise (unless it has received indemnity which it reasonably deems to be satisfactory with respect thereto). In the event the Collateral Agent requests the consent of the Administrative Agent and the Collateral Agent does not receive a consent (either positive or negative) from the Administrative Agent within 10 Business Days of its receipt of such request, then the Administrative Agent shall be deemed to have declined to consent to the relevant action.
(t). Notwithstanding anything to the contrary contained herein or in the other Financing Documents, Transfers of interests in Guarantor or in any Person having any direct or indirect legal or beneficial interest in Guarantor shall not be prohibited or restricted in any manner whatsoever, including by sale, merger, consolidation or otherwise.
(t). Section 1.2(t) of the Agreement is hereby deleted in its entirety and replaced with the following:
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!