As-Built Plans Within thirty (30) days after completion of Tenant’s Changes requiring the submission of plans to Landlord, Tenant shall furnish to Landlord a complete set of “as-built” plans and specifications.
As-Builts Seller shall provide final as-built drawings of the Seller-Owned Interconnection Facilities within 30 Days of the successful completion of the Acceptance Test.
FALSE STATEMENTS CONCERNING HIGHWAY PROJECTS T h i s p r o v i s i o n i s applicable to all Federal-aid construction contracts and to all related subcontracts. In order to assure high quality and durable construction in conformity with approved plans and specifications and a high degree of reliability on statements and representations made by engineers, contractors, suppliers, and workers on Federal- aid highway projects, it is essential that all persons concerned with the project perform their functions as carefully, thoroughly, and honestly as possible. Willful falsification, distortion, or misrepresentation with respect to any facts related to the project is a violation of Federal law. To prevent any misunderstanding regarding the seriousness of these and similar acts, Form FHWA-1022 shall be posted on each Federal-aid highway project (23 CFR 635) in one or more places where it is readily available to all persons concerned with the project: 18 U.S.C. 1020 reads as follows: "Whoever, being an officer, agent, or employee of the United States, or of any State or Territory, or whoever, whether a person, association, firm, or corporation, knowingly makes any false statement, false representation, or false report as to the character, quality, quantity, or cost of the material used or to be used, or the quantity or quality of the work performed or to be performed, or the cost thereof in connection with the submission of plans, maps, specifications, contracts, or costs of construction on any highway or related project submitted for approval to the Secretary of Transportation; or Whoever knowingly makes any false statement, false representation, false report or false claim with respect to the character, quality, quantity, or cost of any work performed or to be performed, or materials furnished or to be furnished, in connection with the construction of any highway or related project approved by the Secretary of Transportation; or Whoever knowingly makes any false statement or false representation as to material fact in any statement, certificate, or report submitted pursuant to provisions of the Federal-aid Roads Act approved July 1, 1916, (39 Stat. 355), as amended and supplemented; Shall be fined under this title or imprisoned not more than 5 years or both."
Shared-Loss Asset Records and Reports The Assuming Institution shall establish and maintain such records as may be appropriate to account for the Single Family Shared-Loss Loans in such form and detail as the Receiver may reasonably require, and to enable the Assuming Institution to prepare and deliver to the Receiver such reports as the Receiver may from time to time request regarding the Single Family Shared-Loss Loans and the Monthly Certificates required by Section 2.1 of this Single Family Shared-Loss Agreement.
Safety Equipment Should the employment duties of an employee in the bargaining unit require use of any equipment or gear to insure the safety of the employee or others, the District agrees to furnish such equipment or gear.
Construction Plans Tenant shall prepare final plans and specifications for the Tenant Improvements that (a) are consistent with and are logical evolutions of the Approved Schematic Plans and (b) incorporate any other Tenant-requested (and Landlord-approved) Changes (as defined below). As soon as such final plans and specifications ("Construction Plans") are completed, Tenant shall deliver the same to Landlord for Landlord's approval, which approval shall not be unreasonably withheld, conditioned or delayed. All such Construction Plans shall be submitted by Tenant to Landlord in electronic .pdf, CADD and full-size hard copy formats, and shall be approved or disapproved by Landlord within ten (10) business days after delivery to Landlord. Landlord's failure to respond within such ten (10) business day period shall be deemed approval by Landlord. If the Construction Plans are disapproved by Landlord, then Landlord shall notify Tenant in writing of its objections to such Construction Plans, and the parties shall confer and negotiate in good faith to reach agreement on the Construction Plans. Promptly after the Construction Plans are approved by Landlord and Tenant, two (2) copies of such Construction Plans shall be initialed and dated by Landlord and Tenant, and Tenant shall promptly submit such Construction Plans to all appropriate Governmental Authorities for approval. The Construction Plans so approved, and all change orders approved (to the extent required) by Landlord, are referred to herein as the "Approved Plans."
SITE VISITS AND RECORD REVIEW The Applicant shall allow authorized employees of the District, the Comptroller, the Appraisal District, and the State Auditor’s Office to have reasonable access to the Applicant’s Qualified Property and business records from the Application Review Start Date through the Final Termination Date, in order to inspect the project to determine compliance with the terms hereof or as necessary to properly appraise the Taxable Value of the Applicant’s Qualified Property. A. All inspections will be made at a mutually agreeable time after the giving of not less than ninety-six (96) hours prior written notice, and will be conducted in such a manner so as not to unreasonably interfere with either the construction or operation of the Applicant’s Qualified Property. B. All inspections may be accompanied by one or more representatives of the Applicant, and shall be conducted in accordance with the Applicant’s safety, security, and operational standards. Notwithstanding the foregoing, nothing contained in this Agreement shall require the Applicant to provide the District, the Comptroller, or the Appraisal District with any technical or business information that is proprietary, a trade secret, or is subject to a confidentiality agreement with any third party.
Access to Properties and Records (a) CCE shall, and shall cause TPC to, afford to ETP and ETP’s accountants, counsel and representatives full reasonable access during normal business hours throughout the period prior to the Closing Date (or the earlier termination of this Agreement pursuant to Article VII hereof) to all of the properties, books, contracts, commitments and records (including all environmental studies, reports and other environmental records and all pipeline cost-of-service and rate-related studies, reports and records related to TPC and, during such period, shall furnish to ETP all information concerning the business, properties, Liabilities and personnel related to TPC as ETP may request, provided, however, that no investigation or receipt of information pursuant to this Section 5.2 shall affect any representation or warranty of CCE or the conditions to the obligations of ETP. To the extent not located at the offices or properties of TPC as of the Closing Date, as promptly as practicable thereafter, CCE shall deliver, or cause its appropriate Affiliates to deliver to ETP all of the books of accounts, minute books, record books and other records (including safety, health, environmental, maintenance and engineering records and drawings) pertaining to the business operations of TPC and all financial and accounting records related to TPC. Such delivery shall include all work papers, pleadings, testimony, exhibits, spread sheets, research, drafts, memoranda, correspondence and other documents related to the TPC Rate Case (“TPC Rate Case Work Product”). TPC Rate Case Work Product has been and will be prepared in contemplation of litigation, and the use of TPC Rate Case Work Product has been and will be under the control of TPC’s attorneys. Notwithstanding anything to the contrary contained in this Agreement, CCE shall not be obligated to provide to ETP any documents or records relating to litigation and regulatory matters in which TPC is involved to the extent that CCE reasonably believes such documents or records are subject to the attorney-client or other applicable privilege in circumstances in which TPC is not the sole client unless the parties entitled to such attorney-client or other applicable privilege shall consent thereto and enter into an appropriate joint defense agreement for the purpose of preservation of such attorney-client or other applicable privilege. (b) The information contained herein, in the CCE Disclosure Letter or heretofore or hereafter delivered to ETP or its authorized representatives in connection with the transactions contemplated by this Agreement shall be held in confidence by ETP and its representatives in accordance with the Confidentiality Agreement until the Closing Date with respect to information relating to TPC. Following the Closing Date, CCE shall keep confidential all information related to the business and properties of TPC to the same extent as ETP is obligated to keep such information confidential in accordance with the terms of the Confidentiality Agreement (without regard to the preceding sentence) prior to the Closing Date.
Improvement Plans A professional improvement plan is a clearly articulated assistance program for a teacher whose student growth measure dimension of the evaluation is below the expected level of student growth. For the purposes of this agreement, improvement plans shall be based on the individual student growth measure level, and not for overall subjects or classes taught.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.