ARCHAEOLOGY Lessee shall not destroy, disturb, mar, collect, remove or alter any prehistoric or historic resources of any kind on Weld County lands as provided by law. These resources include, but are not limited to, all artifacts of stone, wood or metal, pictographs, structures, and bones. A discovery of anything of prehistoric or historic nature shall be reported to Lessor or the State of Colorado Archaeologist immediately.
Geological and archaeological finds It is expressly agreed that mining, geological or archaeological rights do not form part of this Agreement with the Contractor for the Works, and the Contractor hereby acknowledges that it shall not have any mining rights or interest in the underlying minerals, fossils, antiquities, structures or other remnants or things either of particular geological or archaeological interest and that such rights, interest and property on or under the Site shall vest in and belong to the Authority or the concerned Government Instrumentality. The Contractor shall take all reasonable precautions to prevent its workmen or any other person from removing or damaging such interest or property and shall inform the Authority forthwith of the discovery thereof and comply with such instructions as the concerned Government Instrumentality may reasonably give for the removal of such property. For the avoidance of doubt, it is agreed that any reasonable expenses incurred by the Contractor hereunder shall be reimbursed by the Authority. It is also agreed that the Authority shall procure that the instructions hereunder are issued by the concerned Government Instrumentality within a reasonable period.
Geological and Archeological Specimens If, during the execution of the Work, the Contractor, any Subcontractor, or any servant, employee, or agent of either should uncover any valuable material or materials, such as, but not limited to, treasure trove, geological specimens, archival material, archeological specimens, or ore, the Contractor acknowledges that title to the foregoing is vested in the Owner. The Contractor shall notify the Owner upon the discovery of any of the foregoing, shall take reasonable steps to safeguard it, and seek further instruction from the Design Professional. Any additional cost incurred by the Contractor shall be addressed under the provision for changed conditions. The Contractor agrees that the Geological and Water Resources Division and the Historic Preservation Division of the Georgia Department of Natural Resources may inspect the Work at reasonable times.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
FLOODPLAIN MANAGEMENT AND WETLAND PROTECTION Executive Order 11988, Floodplain Management, May 24, 1977 (42 FR 26951), 3 C.F.R., 1977 Comp., p. 117, as interpreted in HUD regulations at 24 C.F.R. Part 55, particularly Section 2(a) of the Order (For an explanation of the relationship between the decision- making process in 24 C.F.R. Part 55 and this part, see § 55.10.); and Executive Order 11990, Protection of Wetlands, May 24, 1977 (42 FR 26961), 3 C.F.R., 1977 Comp., p. 121 particularly Sections 2 and 5. COASTAL ZONE MANAGEMENT The Coastal Zone Management Act of 1972 (16 U.S.C. § 1451, et seq.), as amended, particularly sections 307(c) and (d) (16 U.S.C. § 1456(c) and (d)).
Vegetation No trees or other vegetation may be removed from the site without prior approval from the Town, except in accordance with Section 4 above and pursuant to the Annual Plan.
Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.
Development 3.3 Within twenty (20) Working Days after the Commencement Date and in accordance with paragraphs 3.10 to 3.12 (Amendment and Revision), the Contractor will prepare and deliver to the Authority for approval the full and final Security Plan which will be based on the draft Security Plan set out in Appendix B.
Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.