Pursuant to Applicable Sample Clauses

The "Pursuant to Applicable" clause establishes that certain actions, rights, or obligations within the agreement are governed by relevant laws, regulations, or standards. In practice, this means that the parties must comply with all legal requirements that pertain to the subject matter of the contract, such as data protection laws, industry regulations, or local statutes. This clause ensures that the contract remains legally compliant and adaptable to changes in the law, thereby reducing the risk of inadvertent violations and clarifying that legal compliance is a shared responsibility.
Pursuant to Applicable. Data Protection Legislation, the supplier and its represen- tatives are obliged to cooperate with the Data Protection Authority upon its request when the authority excercises its supvervi- ▇▇▇▇ ▇▇▇▇▇▇. The supplier undertakes to notify the customer without undue delay about any enquiries from the Data Protec- tion Authority or another supervisory au- thority that refer specifically to the pro- cessing of personal data under the Data Processing Agreement. The supplier shall not be entitled to represent the customer or act on the customer’s behalf in case of any enquiries. The supplier shall be entitled to reasonable compensation for any reque- sted cooperation that refers specifically to the processing of the customer’s personal data and that is not a consequence of the supplier being in breach of its obligations under the Data Processing Agreement re- ▇▇▇▇▇▇▇ the processing of personal data.
Pursuant to Applicable. Data Protection Law and the additional requirements set out in the OH-SSS, Supplier shall implement and maintain appropriate and documented Security Incident procedures and policies designed to (i) detect, analyze, monitor and resolve Security Incidents; and (ii) without undue delay but at the latest within twenty-four (24) hours of any Security Incident, report such Security Incidents to Oracle Health. Such report shall contain a detailed description of the nature of the Security Incident, categories and approximate number of Personal Information records and Data Subjects concerned, name and contact details of a contact point where more information can be obtained, likely consequences of the Security Incident, and measures to address the Security Incident.
Pursuant to Applicable. Data Protection Law and the additional requirements set out in the OSSS, Supplier shall implement and maintain appropriate and documented Security Incident procedures and policies designed to (i) detect, analyze, monitor and resolve Security Incidents; and (ii) without undue delay but at the latest within twenty-four (24) hours of any Security Incident, report such Security Incidents to Oracle. Such report shall contain a detailed description of the nature of the Security Incident, categories and approximate number of Personal Information records and Individuals concerned, name and contact details of a contact point where more information can be obtained, likely consequences of the Security Incident, and measures to address the Security Incident.
Pursuant to Applicable. Securities Laws, each holder of Rights who has fully exercised the Basic Subscription Privilege attaching to such holder’s Rights will also be entitled to exercise an over-subscription privilege to purchase additional Rights Shares that remain unsubscribed at the Expiry Time (the “Over-Subscription Privilege”), subject to the availability and pro rata allocation of Rights Shares among holders of Rights exercising this Over-Subscription Privilege and the terms described in the Rights Offering Documents.
Pursuant to Applicable. FCC rules, a local loop unbundled network element is a dedicated transmission facility between a distribution frame (or its equivalent) in a SBC- 13STATE Central Office and the loop demarcation point at an End User premises. Where applicable, the local loop includes all wire within multiple dwelling and tenant buildings and campuses that provides access to End User premises wiring, provided such wire is owned and controlled by SBC13-STATE. The local loop network element includes all features, functions and capabilities of the transmission facility, including attached electronics (except those electronics used for the provision of advanced services, such as Digital Subscriber Line Access Multiplexers), and line conditioning (see Appendix DSL for line conditioning). The local loop network element includes, but is not limited to DS1, DS3, fiber, and other high capacity loops to the extent required by applicable law, and where such loops are deployed in SBC-13STATE wire centers. CLEC agrees to operate each loop type within the technical descriptions and parameters accepted within the industry.

Related to Pursuant to Applicable

  • Relation to Applicable Law The provisions of Sections 8.4, 8.5 and 8.6 of this Attachment with regard to the confidentiality of information shall be in addition to and not in derogation of any provisions of Applicable Law with regard to the confidentiality of information, including, but not limited to, 47 U.S.C. § 222, and are not intended to constitute a waiver by Verizon of any right with regard to protection of the confidentiality of the information of Verizon or Verizon Customers provided by Applicable Law.

  • also applies The holiday bank can be used as income replacement for absences due to illness or for lieu time off on a weekday.

  • TEXAS LAW TO APPLY 12.01 This Agreement shall be construed and the provisions thereof interpreted under and in accordance with the laws of the State of Texas.

  • New York Law to Apply This Agreement shall be construed and the provisions thereof interpreted under and in accordance with the laws of the State of New York.

  • Provisions Subject to Applicable Law All rights, powers and remedies provided in this Security Instrument may be exercised only to the extent that the exercise thereof does not violate any applicable provisions of law and are intended to be limited to the extent necessary so that they will not render this Security Instrument invalid, unenforceable or not entitled to be recorded, registered or filed under the provisions of any applicable law. If any term of this Security Instrument or any application thereof shall be invalid or unenforceable, the remainder of this Security Instrument and any other application of the term shall not be affected thereby.