U.S. GOVERNMENT IDENTIFICATION Sample Clauses

U.S. GOVERNMENT IDENTIFICATION. Upon request by a technician, the full time xxxxxxx office will issue a U.S. Government identification card.
AutoNDA by SimpleDocs
U.S. GOVERNMENT IDENTIFICATION. The Agency will issue a U.S. Government I.D Card, (CAC) to all bargaining unit technicians.

Related to U.S. GOVERNMENT IDENTIFICATION

  • U.S. Government Users The Software is commercial computer software and commercial computer software documentation within the meaning of the applicable acquisition regulations. If acquired by or on behalf of a civilian agency of the United States government, the Software will be subject to terms of this Agreement as a “license customarily provided to the public” as specified in 48 C.F.R. ch. 1 Part 12.212 of the Federal Acquisition Regulations and its successors. If acquired by or on behalf of units of the Department of Defense, it will be subject to the terms of this Agreement as a “license customarily provided to the public “as specified in 48 C.F.R. ch. 1 Part 227.7202, DFAR Supplement and its successors. If Spirent receives a request from any Customer agency of the U.S. Government to provide Software with rights beyond those stated above, Spirent will promptly, in its sole discretion, accept or reject such request.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • U.S. Government End Users The Software is a "commercial item," as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of "commercial computer software" and "commercial computer software documentation," as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire the Software with only those rights set forth herein.

  • User Identification 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Product Identification Before removal from Sale Area, unless Contracting Officer determines that circumstances warrant a written waiver or adjustment, Purchaser shall:

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Notice to U.S. Government End Users The Licensed Software and Documentation are deemed to be “Commercial Items,” as defined at 48 C.F.R. §2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation,” as such terms are used in 48 C.F.R. §12.212 or 48 C.F.R. §227.7207, as applicable. Consistent with such sections, the Licensed Software and Documentation are licensed to U.S. Government end users (i) only as Commercial Items, and (ii) with only those rights as are granted pursuant to this License Agreement. Manufacturer is Micro Focus (US), Inc., 000 Xxxx Xxxx Xxxx., Xxxxx 000, Xxxxxxxxx, XX 00000 as or on behalf of Licensor.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Your Member Identification Card Your BCBSRI member ID card is your key to getting healthcare coverage. It shows your healthcare provider that you’re part of the nation’s most trusted health plan. All BCBSRI members receive ID cards, which provide important information about your coverage. This card is for identification only, and you must show it whenever you receive healthcare services. Please note you must be a current member to receive covered services. Tips for keeping your card safe: • Carry it with you at all times. • Keep it in a safe location, just as you would with a credit card or money. • Let BCBSRI know right away if it is lost or stolen.

Time is Money Join Law Insider Premium to draft better contracts faster.