Accessibility by Others Sample Clauses

Accessibility by Others. Personnel files shall be in the custody of the Superintendent and shall not be accessible to other than appropriate officials of the school district for bona fide reasons.
AutoNDA by SimpleDocs
Accessibility by Others. Material in the employee's personnel file will not be copied or made accessible to persons other than the employee or his/her agent, and District personnel with a need for access.
Accessibility by Others. Material in the employee’s personnel file, including evaluation results, will not be copied or made accessible to persons other than the employee or his/her agent, the Association and District personnel with a need for access. Nothing in this agreement prevents the District from complying with all federal and state laws including but not limited to the Public Records Act.
Accessibility by Others. By using the Digital Store, you may encounter content that may be offensive, indecent or objectionable; this content may or may not be identified as having explicit language or other attributes. Nevertheless, you agree to use the Digital Store at your sole risk, and DISH has no liability to you for any content. Content types, genres, categories, and descriptions are provided for convenience, and DISH does not guarantee their accuracy. All Purchased Content downloaded or purchased through your compatible set-top-box or other Compatible Device may be available to other users and user accounts associated with your DISH account, on any set-top-box or Compatible Device used by those users. Please visit XXXX.xxx for information on parental controls, locks and limits and password protection on your account.

Related to Accessibility by Others

  • Accessibility Supplier warrants that all Products will meet the requirements set forth in all federal, state, local and foreign laws, rules, and regulations applicable to accessibility of information technology for people with disabilities. Supplier agrees to use personnel trained and knowledgeable in supporting the needs of persons with disabilities in performance of Services under this Order.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • Compliance with Accessibility Standards All parties to this Agreement shall ensure that the plans for and the construction of all projects subject to this Agreement are in compliance with standards issued or approved by the Texas Department of Licensing and Regulation (TDLR) as meeting or consistent with minimum accessibility requirements of the Americans with Disabilities Act (P.L. 101-336) (ADA).

  • Access Requirements You will be responsible for providing the System to enable you to use an Electronic Service.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Visibility 1. Unless the Council of Europe requests or agrees otherwise, the Grantee shall take all necessary measures to publicise the fact that the Action has been funded within the framework of a Joint Project between the European Union and the Council of Europe. Information given to the press and to the beneficiaries of the Action, all related publicity material, official notices, reports and publications, shall acknowledge that the Action was carried out with a grant from a Joint Project between the European Union and the Council of Europe and shall display in an appropriate way the Joint Projects’ visual identity (for instructions on use of the Joint Projects’ visual identity, see Appendix IV). 2. In cases where equipment or major items have been purchased using funds provided by the European Union or the Council of Europe, the Grantee shall indicate this clearly on that equipment and those major items (including display of the European Union and Council of Europe’s logos), provided that such actions do not jeopardise the safety and security of the Grantee’s staff. 3. The acknowledgement and Joint Projects’ visual identity shall be clearly visible in a manner that will not create any confusion regarding the identification of the Acton as a project of the Grantee and the ownership of the equipment and items by the Grantee. 4. All publications by the Grantee pertaining to the Action that have received funding from a Joint Project between the European Union and the Council of Europe, in whatever form and whatever medium, including the Internet, shall carry the following or a similar disclaimer: “This document has been produced using funds of a Joint Project between the European Union and the Council of Europe. The views expressed herein can in no way be taken to reflect the official opinion of the European Union or the Council of Europe”. 5. If the equipment purchased with a grant from a Joint Project is not transferred to the local partners of the Grantee or to the final recipient of the Action at the end of the implementation period of this Agreement, the visibility requirements as regards this equipment shall continue to apply between the end of the implementation period of this Agreement and the end of the Joint Project, if the latter lasts longer. 6. All layouts of any communication items prepared by the Grantee are subject to approval with the Contact point within the Council of Europe. 7. The Grantee accepts that the European Union and the Council of Europe may publish in any form and medium, including on their websites, the name and address of the Grantee, the purpose and amount of the grant and, if relevant, the percentage of co-financing.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Authorization from Others Buyer shall use its reasonable efforts to obtain all authorizations, consents and approvals of third parties or governmental agencies that may be required to permit the consummation of the transactions contemplated by this Agreement.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!