Weed Control The tenant shall control all noxious weeds on the subject lands and maintain any summerfallow in a reasonably weed free condition.
Fraud Control BellSouth will provide seven days per week, 24-hours per day, fraud monitoring on Calling Cards, xxxx-to-third and collect calls made to numbers in BellSouth’s LIDB, provided that such information is included in the LIDB query. BellSouth will establish fraud alert thresholds and will notify <<customer_name>> of fraud alerts so that <<customer_name>> may take action it deems appropriate.
Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.
Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer.
OGS Centralized Contract Terms and Conditions have been renumbered as depicted in the following chart: Current Amended Section Title 4.25 4.26 Severability 4.26 4.27 Entire Agreement
Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins
Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
Puts Within 30 Days After Bank Closing During the thirty (30)-day period following Bank Closing and only during such period (which thirty (30)-day period may be extended in writing in the sole absolute discretion of the Receiver for any Loan), in accordance with this Section 3.4, the Assuming Institution shall be entitled to require the Receiver to purchase any Deposit Secured Loan transferred to the Assuming Institution pursuant to Section 3.1 which is not fully secured by Assumed Deposits or deposits at other insured depository institutions due to either insufficient Assumed Deposit or deposit collateral or deficient documentation regarding such collateral; provided with regard to any Deposit Secured Loan secured by an Assumed Deposit, no such purchase may be required until any Deposit setoff determination, whether voluntary or involuntary, has been made; and, at the end of the thirty (30)-day period following Bank Closing and at that time only, in accordance with this Section 3.4, the Assuming Institution shall be entitled to require the Receiver to purchase any remaining overdraft transferred to the Assuming Institution pursuant to 3.1 which both was made after the Bid Valuation Date and was not made pursuant to an overdraft protection plan or similar extension of credit. Notwithstanding the foregoing, the Assuming Institution shall not have the right to require the Receiver to purchase any Loan if (i) the Obligor with respect to such Loan is an Acquired Subsidiary, or (ii) the Assuming Institution has: (A) made any advance in accordance with the terms of a Commitment or otherwise with respect to such Loan; (B) taken any action that increased the amount of a Related Liability with respect to such Loan over the amount of such liability immediately prior to the time of such action; (C) created or permitted to be created any Lien on such Loan which secures indebtedness for money borrowed or which constitutes a conditional sales agreement, capital lease or other title retention agreement; (D) entered into, agreed to make, grant or permit, or made, granted or permitted any modification or amendment to, any waiver or extension with respect to, or any renewal, refinancing or refunding of, such Loan or related Credit Documents or collateral, including, without limitation, any act or omission which diminished such collateral; or (E) sold, assigned or transferred all or a portion of such Loan to a third party (whether with or without recourse). The Assuming Institution shall transfer all such Assets to the Receiver without recourse, and shall indemnify the Receiver against any and all claims of any Person claiming by, through or under the Assuming Institution with respect to any such Asset, as provided in Section 12.4.
Availability Control Personal Data will be protected against accidental or unauthorized destruction or loss.
EVENTS OUTSIDE OUR CONTROL 10.1 We will not be liable or responsible for any failure to perform, or delay in performance of, any of our obligations under this XXXX that is caused by any act or event beyond our reasonable control, including failure of public or private telecommunications networks (Event Outside Our Control). 10.2 If an Event Outside Our Control takes place that affects the performance of our obligations under this XXXX: (a) our obligations under this XXXX will be suspended and the time for performance of our obligations will be extended for the duration of the Event Outside Our Control; and (b) we will use our reasonable endeavours to find a solution by which our obligations under this XXXX may be performed despite the Event Outside Our Control.