Bike It Sample Clauses

Bike It. The case study describes the procedure we are planning to follow in the development of the school travel plans which are at the core of our “To school! Without my car!” subtask. Our disadvantage is the fact that the programme described is organised at the national level, which provides it with more financial and professional support. However, we also plan to introduce the incentives and organise similar events, based also on the experience of our former EMW events (“Travelling around the world in seven days” and “Southward bound” – virtual cycling trips).
AutoNDA by SimpleDocs
Bike It. We will start a similar activity this spring in schools and I think it is very necessary if we would like to change our environment in the future. As for Tartu, we don’t have enough safe bicycle stands in schools and housing areas. We will meet school directors and we will discuss how we can make it better and how we can organise more traffic lessons in schools and teach children how to ride bicycles more safely. We have meant to organise such campaigns also, how parents can ride bicycles together with their children to school. This idea needs large sponsorship and that is a difficult question.
Bike It. In some aspects, Bike It is quite similar to the Traffic Snake Game. However it has some specific elements, like eliminating the fears (of parents) linked to cycling. We also give much importance to this issue and we have been taking care of it in the past years. It will be handled also during our application in Budapest, although most probably not in Active Access itself but in parallel projects. Bike It is also a good example showing the importance of before and after surveys.
Bike It. We could propose the idea to schools that have already developed the walking bus and which have a safe cycle path nearby. We could also use the idea to organise, during the mobility week, an event with schools and with road safety services (sécurité routière); to teach children how to behave on a bike on the streets: it will be a kind of human scale platform game representing roads and accredited staff will teach the children and so on.
Bike It. The aim of “Bike It”, to create a cycling culture to schools that will continue after the completion of the project is in line with the objectives of our planned activities in Cyprus. All the activities described in the process section are examples of activities that could be organised in any school in Cyprus. In particular, explaining the advantages of cycling in class, holding session with local authority, parents and other stakeholders, involve the school and local authorities in an ongoing dialogue on how to improve the cycling infrastructure at their school and the surrounding area. Furthermore, other ideas that could be implemented are the training bike abilities to school and the bonus system for increased bicycle use.

Related to Bike It

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Required hardware and software The minimum system requirements for using the DocuSign system may change over time. The current system requirements are found here: xxxxx://xxxxxxx.xxxxxxxx.xxx/guides/signer-guide- signing-system-requirements.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Fabrication Making up data or results and recording or reporting them.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Mobile Sierra Notwithstanding any provision of this Agreement, neither Party shall seek, nor shall they support any third party seeking, to prospectively or retroactively revise the rates, terms or conditions of service of this Agreement through application or complaint to the FERC pursuant to the provisions of the Federal Power Act, absent prior written agreement of the Parties. Further, absent the prior written agreement in writing by both Parties, the standard of review for changes to the rates, terms or conditions of service of this Agreement proposed by a Party, a non-Party, or the FERC acting sua sponte shall be the “public interest” standard of review set forth in United States Gas Pipe Line Co. v.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.

  • Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.

  • TOOL STORAGE 1. A company shall provide on all construction jobs in towns and cities, and elsewhere where reasonably necessary and practicable (or if requested buy the employee), a suitable and secure waterproof lock-up solely for the purpose of storing employees’ tools, and on multi-storey and major projects the company shall provide, where possible, a suitable lock-up for employees’ tools within a reasonable distance of the work area of large groups of employees. 2. Where an employee is absent from work because of illness or accident and has advised the company in accordance with Clause 33 – Personal Leave of the award, the company shall ensure that the employee’s tools are securely stored during his/her absence.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!