TRAFFIC DOCUMENTS AND RELATED PROCEDURES Sample Clauses

TRAFFIC DOCUMENTS AND RELATED PROCEDURES. To the extent that the parties subsequently agree that SKYW will handle traffic documents or passenger handling services in connection with any Delta Connection Flights, the following terms and conditions shall apply: A. Pursuant to mutually acceptable procedures, Delta will provide SKYW with, Delta machine and manual ticket stock, miscellaneous charges orders, credit card refund drafts, credit card refund vouchers, FIMS, expense vouchers, expense checks, travel credit vouchers and other related documents (collectively referred to as “Traffic Documents”). Delta will maintain a supply of Traffic Documents at a suitable location and, upon written request from SKYW, will provide SKYW with appropriate supplies of Traffic Documents. B. Unless otherwise agreed to by Delta in writing, Traffic Documents may be used, completed, validated and issued only by SKYW and only in connection with transactions related to Delta Connection Flights and for no other purpose. C. SKYW will promptly surrender and return all Traffic Documents to Delta upon Delta’s written request. D. SKYW will maintain records of the Traffic Documents in a manner and format acceptable to Delta. SKYW will acknowledge receipt in writing of all Traffic Documents in the manner prescribed by Delta. E. SKYW will conform with and abide by all of Delta’s rules and regulations regarding the Traffic Documents. F. SKYW will take all reasonable and necessary measures to safeguard the Traffic Documents as of the time of receipt and thereafter and will maintain the Traffic Documents in accordance with mutually agreed upon security procedures. SKYW shall be responsible for all risk of loss, use, misuse, misappropriation or theft of Traffic Documents as of the time SKYW takes possession of the Traffic Documents.
TRAFFIC DOCUMENTS AND RELATED PROCEDURES. To the extent that the parties subsequently agree that ASA will handle traffic documents or passenger handling services in connection with any Delta Connection Flights, the following terms and conditions shall apply: A. Pursuant to mutually acceptable procedures, Delta will provide ASA with, Delta machine and manual ticket stock, miscellaneous charges orders, credit card refund drafts, credit card refund vouchers, FIMS, expense vouchers, expense checks, travel credit vouchers and other related documents (collectively referred to as “Traffic Documents”). Delta will maintain a supply of Traffic Documents at a suitable location and, upon written request from ASA, will provide ASA with appropriate supplies of Traffic Documents. B. Unless otherwise agreed to by Delta in writing, Traffic Documents may be used, completed, validated and issued only by ASA and only in connection with transactions related to Delta Connection Flights and for no other purpose. C. ASA will promptly surrender and return all Traffic Documents to Delta upon Delta’s written request. D. ASA will maintain records of the Traffic Documents in a manner and format acceptable to Delta. ASA will acknowledge receipt in writing of all Traffic Documents in the manner prescribed by Delta. E. ASA will conform with and abide by all of Delta’s rules and regulations regarding the Traffic Documents. F. ASA will take all reasonable and necessary measures to safeguard the Traffic Documents as of the time of receipt and thereafter and will maintain the Traffic Documents in accordance with mutually agreed upon security procedures. ASA shall be responsible for all risk of loss, use, misuse, misappropriation or theft of Traffic Documents as of the time ASA takes possession of the Traffic Documents.
TRAFFIC DOCUMENTS AND RELATED PROCEDURES. A. Pursuant to mutually acceptable procedures, Delta will periodically provide ASA with Delta machine and manual ticket stock, miscellaneous charges orders, credit card refund drafts, credit card refund vouchers and other related documents (collectively referred to as "Traffic Documents"). Delta will maintain a supply of Traffic Documents at Delta's General Offices in Atlanta and, upon written request from ASA, will supply ASA with appropriate supplies of Traffic Documents. B. Unless otherwise agreed to by Delta in writing, Traffic Documents may be used, completed, validated, and issued only by ASA. C. ASA will promptly surrender and return all Traffic Documents to Delta upon Delta's written request. D. ASA will maintain records of the Traffic Documents in a manner and format acceptable to Delta. ASA will acknowledge receipt in writing of all Traffic Documents in the manner prescribed by Delta. E. ASA will conform with and abide by all of Delta's rules and regulations regarding the Traffic Documents.
TRAFFIC DOCUMENTS AND RELATED PROCEDURES. A. Pursuant to mutually acceptable procedures, Delta will periodically provide Comair with Delta machine and manual ticket stock, miscellaneous charge orders, credit card refund drafts, credit card refund vouchers and other related documents (collectively referred to as "Traffic Documents"). Delta will maintain a supply of Traffic Documents at a suitable location and, upon written request from Comair, will provide Comair with appropriate supplies of Traffic Documents. B. Unless otherwise agreed to by Delta in writing, Traffic Documents may be used, completed, validated and issued only by Comair. C. Comair will promptly surrender and return all Traffic Documents to Delta upon Delta's written request. D. Comair will maintain records of the Traffic Documents in a manner and format acceptable to Delta. Comair will acknowledge receipt in writing of all Traffic Documents in the manner prescribed by Delta. E. Comair will conform with and abide by all of Delta's rules and regulations regarding the Traffic Documents. F. Comair will take all reasonable and necessary measures to safeguard the Traffic Documents as of the time of receipt and thereafter and will maintain the Traffic Documents in accordance with mutually agreed upon security procedures. Comair is responsible for all risk of loss, use, misuse, misappropriation or theft of Traffic Documents as of the time Comair takes possession of the Traffic Documents.

Related to TRAFFIC DOCUMENTS AND RELATED PROCEDURES

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Transaction Procedures All series transactions for the Designated Series shall be consummated by payment to, or delivery by, the Custodian(s) from time to time designated by the Fund (the “Custodian”), or such depositories or agents as may be designated by the Custodian in writing, of all cash and/or securities due to or from the Series. The Subadviser shall not have possession or custody of such cash and/or securities or any responsibility or liability with respect to such custody. The Subadviser shall advise the Custodian and confirm in writing to the Fund all investment orders for the Designated Series placed by it with brokers and dealers at the time and in the manner set forth in Schedule A hereto (as amended from time to time). The Fund shall issue to the Custodian such instructions as may be appropriate in connection with the settlement of any transaction initiated by the Subadviser. The Fund shall be responsible for all custodial arrangements and the payment of all custodial charges and fees, and, upon giving proper instructions to the Custodian, the Subadviser shall have no responsibility or liability with respect to custodial arrangements or the act, omissions or other conduct of the Custodian.

  • Authority; Compliance With Other Agreements and Instruments and Government Regulations The execution, delivery and performance by Borrower and the Subsidiary Guarantors of the Loan Documents to which it is a Party have been duly authorized by all necessary corporate action, and do not and will not: (a) Require any consent or approval not heretofore obtained of any partner, director, stockholder, security holder or creditor of such Party; (b) Violate or conflict with any provision of such Party's charter, articles of incorporation or bylaws, as applicable; (c) Result in or require the creation or imposition of any Lien (other than pursuant to the Loan Documents) or Right of Others upon or with respect to any Property now owned or leased or hereafter acquired by such Party; (d) Violate any Requirement of Law applicable to such Party; (e) Result in a breach of or constitute a default under, or cause or permit the acceleration of any obligation owed under, any material indenture or loan or credit agreement or any other Contractual Obligation to which such Party is a party or by which such Party or any of its Property is bound or affected; and such Party is not in violation of, or default under, any Requirement of Law or Contractual Obligation, or any material indenture, loan or credit agreement described in Section 4.2(e), in any respect that constitutes a Material Adverse Effect.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Endorsements and Procedures Company agrees to place on the backside of each Check processed for collection at the Bank through this Service a restrictively endorsement which reads “Mobile Deposit to Central Bank”, or words to that effect as satisfactory to Bank. Endorsements must be made on the back of the Check within 1&1/2 inches from the top edge, although Bank may accept endorsements outside this space. Any loss Bank incurs from a delay or processing error resulting from an irregular endorsement or other markings by Company will be Company’s responsibility. Bank may reject any Check payable to co-payees, even if Company is one of the payees listed on the face of the Check. Bank will consider, but is not obligated to accept, Check’s listing Company as one of the co-payees, provided a) the image of the Check presented to Bank under the Service contains the legible signature endorsement of all co-payees to the instrument, including Company; and b) contains a restrictive endorsement above the co-payees signatures which reads “Mobile Deposit to account of [Company’s full name]”. If Company is a sole proprietorship, Checks written as payable in the name of the individual owner of Company may be deposited to Company’s Account at Bank through this Service so long Checks are presented in compliance with the Service’s terms and conditions. Company agrees to comply with any and all other procedures and instructions for use of the Mobile Deposit Service as the Bank may establish from time to time, such as within any applicable Users Guide (the “Procedures”). Cut-off Times for Deposits: Deposits made via Mobile Deposit must be made before 7:00 PM Eastern Standard Time on a Business Day in order to be considered deposited same day. Deposits made after 7:00 PM Eastern Standard Time on a Business Day will be considered deposited the next Business Day. Receipt of Items: Bank reserves the right to reject any item transmitted through Mobile Deposit, at Bank’s discretion, without liability to Company. Bank shall not be responsible for items Bank does not receive or for Check images that are dropped during transmission. An image of an item shall be deemed received when Company receives a confirmation from Bank that we have received the image. Receipt of such confirmation does not mean the transmission was error free or complete. Processing and/or transmission errors can occur after Bank acknowledges receipt that may impact transaction completion. Following receipt of such confirmation, the Bank will process the image by preparing a “substitute check” or clearing the item as an image. Availability of Funds: Once deposited, subject to the cut-off time described above, our policy, in most cases, is to make funds from Company’s Check deposits available to Company on the second Business Day after the day Bank receives the Check in compliance with this Service, unless a different or longer time period is required under Company’s Account Rules and Regulations’ Funds Availability Policy or should Bank decide to apply a longer hold period due to Company’s history of repeated overdrafts or grounds that Bank reasonably believes affects the ultimate collectability of the Check. In all cases, Company will receive full availability of the funds memorialized in Checks accepted by Bank under this Service by the seventh Business Day after Bank accepts the Check for deposit. If Company’s Account has been open 30 days or less, however, Company may not receive full availability until the ninth Business Day after the day of deposit. Disposal of Transmitted Items: After Company receive confirmation that Bank has received and accepted an image of a Check under this Service, and once Company receive full credit for the Check as manifested in Company’s Account balance as communicated by Bank, Company must and shall prominently marking the original Check “VOID” and then destroying that same Check by cross-cut shredding or another commercially acceptable means of destruction. Destroying the Check prevents it from being presented for deposit another time. After destruction of the original Check, the image will be the sole evidence of the original instrument. Company agree that Company will never re-present the original check, nor give the original Check to anyone else for any purpose other than its destruction.

  • Pending Procedures and Examinations The Registration Statement is not the subject of a pending proceeding or examination under Section 8(d) or 8(e) of the 1933 Act, and the Company is not the subject of a pending proceeding under Section 8A of the 1933 Act in connection with the offering of the Securities.

  • Personnel Requirements and Documentation Grantee will; 1. maintain current personnel documentation on each employee. All documents must be factual and accurate. Health-related information must be stored separately with restricted access as appropriate under Tex. Gov. Code §552.102. Training records may be stored separately from the main personnel file but must be easily accessible upon request. Required documentation includes the following, as applicable: i. A copy of the current job description signed by the employee; ii. Application or resume with documentation of required qualifications and verification of required credentials; iii. Verification of work experience; iv. Annual performance evaluations; v. Personnel data that includes date hired, rate of pay, and documentation of all pay increases and bonuses; vi. Documentation of appropriate screening and/or background checks, to include probation or parole documentation; vii. Signed documentation of initial and other required training; and viii. Records of any disciplinary actions. 2. document authentication must include signature, credentials when applicable, and date. If the document relates to past activity, the date of the activity must also be recorded. Documentation must be permanent and legible. When it is necessary to correct a required document, the error must be marked through with a single line, dated, and initialed by the writer.