BRIDGE DECK EVALUATION SURVEY REPORTS Sample Clauses

BRIDGE DECK EVALUATION SURVEY REPORTS. Deck Condition Evaluation Survey Reports of existing bridges shall be prepared in accordance with Section 9C of the NJDOT “Design Manual for Bridges & Structures”.
AutoNDA by SimpleDocs

Related to BRIDGE DECK EVALUATION SURVEY REPORTS

  • Title Reports With respect to each Closing Date Mortgaged Property listed in Part B of Schedule 4.1N annexed hereto, a title report issued by the Title Company with respect thereto, dated not more than 30 days prior to the Closing Date and satisfactory in form and substance to Administrative Agent;

  • Title Report If no Additional Mortgage Policy is required with respect to such Additional Mortgaged Property, a title report issued by the Title Company with respect thereto, dated not more than 30 days prior to the date such Additional Mortgage is to be recorded and satisfactory in form and substance to Administrative Agent;

  • Diversity Report The Contractor shall report to each Customer, spend with certified and other minority business enterprises. These reports shall include the period covered, the name, minority code and Federal Employer Identification Number of each minority business utilized during the period, Commodities provided by the minority business enterprise, and the amount paid to each minority business on behalf of each purchasing agency ordering under the terms of this Contract.

  • Closing Financial Statements At least eight Business Days prior to the Effective Time, Southwest shall provide Xxxxxxx with Southwest’s consolidated financial statements presenting the financial condition of Southwest and its Subsidiaries as of the close of business on the last day of the last month ended prior to the Effective Time and Southwest’s consolidated results of operations, cash flows, and shareholders’ equity for the period from January 1, 2016 through the close of business on the last day of the last month ended prior to the Effective Time (the “Closing Financial Statements”); provided, that if the Effective Time occurs on or before the 15th Business Day of the month, Southwest shall have provided consolidated financial statements as of and through the second month preceding the Effective Time. Concurrently with the delivery of the Closing Financial Statements, Southwest shall provide Xxxxxxx with a schedule (the “Transaction Fee Schedule”) setting forth in reasonable detail the fees and expenses incurred and paid as well as accrued and unpaid by the Southwest Entities in connection with the transactions contemplated by this Agreement. Such financial statements shall have been prepared in accordance with GAAP and regulatory accounting principles and other applicable legal and accounting requirements, and reflect all period-end accruals and other adjustments. Such Closing Financial Statements shall exclude as of their date fees and expenses and accruals for all fees and expenses incurred or expected to be incurred (whether or not doing so is in accordance with GAAP) in connection (directly or indirectly) with the transactions contemplated by this Agreement. The Closing Financial Statements shall include (a) the capital ratios set forth in Section 8.2(g) (but excluding from the calculation of such ratios the amounts set forth on the Transaction Fee Schedule) and (b) the asset quality metrics set forth in Section 8.2(e), and shall be accompanied by a certificate of Southwest’s chief financial officer, dated as of the Effective Time, to the effect that (i) such financial statements meet the requirements of this Section 7.17 and continue to reflect accurately, as of the date of such certificate, the consolidated financial condition, results of operations, cash flows and shareholders’ equity of Southwest in all material respects and (ii) the Transaction Fee Schedule accurately reflects, as of the same date, all fees and expenses incurred or accrued by the Southwest Entities in connection with the transactions contemplated by this Agreement.

  • Auditor's Reports Promptly upon receipt thereof, a copy of any other report or “management letter” submitted by independent accountants to any Consolidated Party in connection with any annual, interim or special audit of the books of such Person.

  • BACKGROUND STATEMENT The Borrower has requested that the Lenders make available a revolving credit facility in the aggregate principal amount of $400,000,000. The Lenders are willing to make available to the Borrower the revolving credit facility provided for herein subject to and on the terms and conditions set forth in this Agreement.

  • Management Reports Promptly upon receipt thereof, copies of all detailed financial and management reports submitted to the Company by independent auditors in connection with each annual or interim audit made by such auditors of the books of the Company.

  • FALSE STATEMENTS CONCERNING HIGHWAY PROJECTS T h i s p r o v i s i o n i s applicable to all Federal-aid construction contracts and to all related subcontracts. In order to assure high quality and durable construction in conformity with approved plans and specifications and a high degree of reliability on statements and representations made by engineers, contractors, suppliers, and workers on Federal- aid highway projects, it is essential that all persons concerned with the project perform their functions as carefully, thoroughly, and honestly as possible. Willful falsification, distortion, or misrepresentation with respect to any facts related to the project is a violation of Federal law. To prevent any misunderstanding regarding the seriousness of these and similar acts, Form FHWA-1022 shall be posted on each Federal-aid highway project (23 CFR 635) in one or more places where it is readily available to all persons concerned with the project: 18 U.S.C. 1020 reads as follows: "Whoever, being an officer, agent, or employee of the United States, or of any State or Territory, or whoever, whether a person, association, firm, or corporation, knowingly makes any false statement, false representation, or false report as to the character, quality, quantity, or cost of the material used or to be used, or the quantity or quality of the work performed or to be performed, or the cost thereof in connection with the submission of plans, maps, specifications, contracts, or costs of construction on any highway or related project submitted for approval to the Secretary of Transportation; or Whoever knowingly makes any false statement, false representation, false report or false claim with respect to the character, quality, quantity, or cost of any work performed or to be performed, or materials furnished or to be furnished, in connection with the construction of any highway or related project approved by the Secretary of Transportation; or Whoever knowingly makes any false statement or false representation as to material fact in any statement, certificate, or report submitted pursuant to provisions of the Federal-aid Roads Act approved July 1, 1916, (39 Stat. 355), as amended and supplemented; Shall be fined under this title or imprisoned not more than 5 years or both."

  • Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!