Traffic Flow Signs Sample Clauses

Traffic Flow Signs. A. Directions B. Deliveries C. Visitors Design Guidelines for Suburban Office Buildings 18 of 31 Revised January, 2003 DIVISION 12 - FURNISHING
AutoNDA by SimpleDocs

Related to Traffic Flow Signs

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Programming Seller shall not make any material changes in the broadcast hours or in the percentages of types of programming broadcast by the Station, or make any other material change in the Station's programming policies, except such changes as in the good faith judgment of the Seller are required by the public interest.

  • Customer The term “Customer” includes all persons, firms or entities that are purchasers or end-users of services or products offered, provided, developed, designed, sold or leased by the Company during the relevant time periods, and all persons, firms or entities which control, or which are controlled by, the same person, firm or entity which controls such purchase.

  • Customer and Trade Relations As of the Closing Date, there exists no actual or, to the knowledge of any Credit Party, threatened termination or cancellation of, or any material adverse modification or change in: the business relationship of any Credit Party with any customer or group of customers whose purchases during the preceding 12 months caused them to be ranked among the ten largest customers of such Credit Party; or the business relationship of any Credit Party with any supplier essential to its operations.

  • Annual Physical The Executive may, if the Executive so elects, within the twelve (12) months following the Date of Termination, receive an annual physical at the Company’s expense consistent with the physical provided under, and subject to the requirements of, the Company’s annual physical program as in effect immediately prior to the Date of Termination.

  • Maintenance of Securities and Cash at Bank and Subcustodian Locations Unless Instructions specifically require another location acceptable to the Bank:

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • No Reliance on Administrative Agent’s Customer Identification Program Each Lender acknowledges and agrees that neither such Lender, nor any of its Affiliates, participants or assignees, may rely on the Administrative Agent to carry out such Lender’s, Affiliate’s, participant’s or assignee’s customer identification program, or other obligations required or imposed under or pursuant to the USA Patriot Act or the regulations thereunder, including the regulations contained in 31 CFR 103.121 (as hereafter amended or replaced, the “CIP Regulations”), or any other Anti-Terrorism Law, including any programs involving any of the following items relating to or in connection with any of the Loan Parties, their Affiliates or their agents, the Loan Documents or the transactions hereunder or contemplated hereby: (i) any identity verification procedures, (ii) any recordkeeping, (iii) comparisons with government lists, (iv) customer notices or (v) other procedures required under the CIP Regulations or such other Laws.

Time is Money Join Law Insider Premium to draft better contracts faster.