TRAFFIC DOCUMENTS AND EMBARKATION Sample Clauses

TRAFFIC DOCUMENTS AND EMBARKATION. 5.1 SaxonAir shall procure that the Carrier shall supply the Traffic Documents and all other necessary documents relating to the carriage undertaken pursuant to this Agreement and the Charterer shall provide to SaxonAir all necessary information and assistance to complete such documents as soon as possible after the making of this Agreement and, in any event, in sufficient time to be completed for issue to passengers.
AutoNDA by SimpleDocs

Related to TRAFFIC DOCUMENTS AND EMBARKATION

  • Secure Information Handling and Transfers 7.1 Physical and electronic handling, processing and transferring of DWP Data, including secure access to systems and the use of encryption where appropriate.

  • Contractor Certification regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code], Contractor certifies Contractor is not engaged in business with Iran, Sudan, or a foreign terrorist organization. Contractor acknowledges this Agreement may be terminated and payment withheld if this certification is inaccurate.

  • Audit and Inspection of Plants, Places of Business and Records (a) The State and its agents, including, but not limited to, the Connecticut Auditors of Public Accounts, Attorney General and State’s Attorney and their respective agents, may, at reasonable hours, inspect and examine all of the parts of the Contractor’s and Contractor Parties’ plants and places of business which, in any way, are related to, or involved in, the performance of this Contract.

  • Documents and Records Seller shall deliver to Servicer, and Servicer shall hold in trust for Seller and the Purchasers in accordance with their respective interests, all documents, instruments and records (including, without limitation, computer tapes or disks) that evidence or relate to Pool Receivables.

  • Compliance with Consensus Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-­‐policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”).

  • Use of State Facilities Resources and Equipment a. Meeting Space and Facilities. The Employer’s campuses and facilities may be used by the Union to hold meetings subject to the University’s policy and availability of the space. The Employer may provide private space for stewards and/or Union representatives to meet in confidence with those they represent on a space available basis. Staff representatives may reserve and utilize meeting rooms in accordance with University policy and procedure. Such requests will be subject to availability and all applicable fees.

  • END USER AGREEMENTS (“EUA H-GAC acknowledges that the END USER may choose to enter into an End User Agreement (“EUA) with the Contractor through this Agreement, and that the term of the EUA may exceed the term of the current H-GAC Agreement. H-GAC’s acknowledgement is not an endorsement or approval of the End User Agreement’s terms and conditions. Contractor agrees not to offer, agree to or accept from the END USER, any terms or conditions that conflict with those in Contractor’s Agreement with H-GAC. Contractor affirms that termination of its Agreement with H-GAC for any reason shall not result in the termination of any underlying EUA, which shall in each instance, continue pursuant to the EUA’s stated terms and duration. Pursuant to the terms of this Agreement, termination of this Agreement will disallow the Contractor from entering into any new EUA with END USERS. Applicable H-GAC order processing charges will be due and payable to H-GAC

  • Incorporation of Prompt Payment Policy Statement into Contracts The provisions of this Exhibit shall apply to all Payments as they become due and owing pursuant to the terms and conditions of this Agreement, notwithstanding that NYSERDA may subsequently amend its Prompt Payment Policy by further rulemaking.

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

Time is Money Join Law Insider Premium to draft better contracts faster.