Criminal History Category With regard to determining defendant’s criminal history points and criminal history category, based on the facts now known to the government, defendant’s criminal history points equal zero and defendant’s criminal history category is I.
Budget Categories Use the first column only (Column 1) to report the budget category breakouts (Lines 6a through 6h) and indirect charges (Line 6j) for the total funding requested for the first year of your project only.
EMPLOYEE CATEGORIES All employees fall into one or the other of four principal categories as outlined below.
Employment Categories (a) Employees under this Agreement will be employed in one of the following categories:
Commercial Price List Reductions Where NYS Net Prices are based on a discount from Contractor’s list prices, price decreases shall take effect automatically during the Contract term and apply to Purchase Orders submitted on or after the date Contractor lowers its pricing to its customers generally or to similarly situated government customers during the Contract term; or
Using Student feedback in Educator Evaluation ESE will provide model contract language, direction and guidance on using student feedback in Educator Evaluation by June 30, 2013. Upon receiving this model contract language, direction and guidance, the parties agree to bargain with respect to this matter.
Client Categorisation 4.1. The client understands and accepts that each category of Clients has its individual level of regulative protection acknowledging that Retail Clients have the highest level of protection whereas Professional Clients and Eligible Counterparties are considered to be more experienced, informed, skilled and able to estimate their risk, therefore are provided with a lower level of protection.
Additional RO Review Criteria (1) In addition to the requirements in Subparagraph 34A, the RO must:
Alternate Billed Calls 1.1 The Parties will engage in settlements of intraLATA intrastate alternate-billed calls (e.g., collect, calling card, and third-party billed calls) originated or authorized by their respective Customers in accordance with an arrangement mutually agreed to by the Parties.
Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.