Travel Authority Privileges (Cards) Sample Clauses

Travel Authority Privileges (Cards). Northwest shall have the sole authority to issue travel authority privileges for travel on Northwest Flights (which by definition includes Northwest coded flights operated by Mesaba and Pinnacle). Mesaba and XXXX will not be entitled to issue travel authority privileges on Northwest Flights; however, Mesaba or XXXX may submit a request for travel on Northwest to the Northwest Pass Bureau and Northwest, in its sole discretion, shall determine whether or not to grant any such request.
AutoNDA by SimpleDocs

Related to Travel Authority Privileges (Cards)

  • E1 Authority Data E1.1 The Contractor shall not delete or remove any proprietary notices contained within or relating to the Authority Data.

  • Network Authorization For services that cannot be provided by a network provider, you can request a network authorization to seek services from a non-network provider. With an approved network authorization, the network benefit level will apply to the authorized covered healthcare service. If we approve a network authorization for you to receive services from a non- network provider, our reimbursement will be based on the lesser of our allowance, the non-network provider’s charge, or the benefit limit. For more information, please see the How Non-Network Providers Are Paid section.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Power; Authority It has all requisite power and authority to enter into this Agreement, to perform its obligations hereunder and to consummate the transactions contemplated hereby. The execution, delivery and performance of this Agreement, the purchase of the Transferred Assets and the consummation of the transactions provided for herein have been duly authorized by all necessary action on the part of the Buyer. This Agreement has been duly executed and delivered by the Buyer and constitutes the legal, valid and binding obligation of the Buyer enforceable against the Buyer in accordance with its terms, except as such enforceability may be limited by bankruptcy, insolvency, reorganization, moratorium or other laws affecting creditors’ rights and by general principles of equity (whether applied in a proceeding at law or in equity).

  • Developer Authority Consistent with Good Utility Practice and this Agreement, the Developer may take whatever actions or inactions with regard to the Large Generating Facility or the Developer Attachment Facilities during an Emergency State in order to (i) preserve public health and safety, (ii) preserve the reliability of the Large Generating Facility or the Developer Attachment Facilities, (iii) limit or prevent damage, and (iv) expedite restoration of service. Developer shall use Reasonable Efforts to minimize the effect of such actions or inactions on the New York State Transmission System and the Connecting Transmission Owner’s Attachment Facilities. NYISO and Connecting Transmission Owner shall use Reasonable Efforts to assist Developer in such actions.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Outage Authority and Coordination Developer and Connecting Transmission Owner may each, in accordance with NYISO procedures and Good Utility Practice and in coordination with the other Party, remove from service any of its respective Attachment Facilities or System Upgrade Facilities and System Deliverability Upgrades that may impact the other Party’s facilities as necessary to perform maintenance or testing or to install or replace equipment. Absent an Emergency State, the Party scheduling a removal of such facility(ies) from service will use Reasonable Efforts to schedule such removal on a date and time mutually acceptable to both the Developer and the Connecting Transmission Owner. In all circumstances either Party planning to remove such facility(ies) from service shall use Reasonable Efforts to minimize the effect on the other Party of such removal.

  • Power, Authority, Consents The Borrower has the power to execute, deliver and perform this Loan Agreement, the Promissory Note and Pledge Agreement, all of which have been duly authorized by all necessary and proper corporate or other action.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!