CADD Layering Sample Clauses

CADD Layering a. Conform to the guidelines defined by the American Institute of Architect's (AIA) standard document, U.S. National CAD standards version 5 (V5). “CAD Layer Guidelines”, 2nd edition or later. b. Provide an explanatory list of which layers are used at which drawing and an explanatory list of all layers which do not conform to the standard AIA CAD Layer Guidelines including any user definable fields permitted by the guidelines. c. Layering: The Contract Administrator may, from time to time, supplement the AIA CAD Layer Guidelines with the Contract Administrator's specific requirements for Facilities or Construction Management and other related information. Obtain latest Contract Administrator specific layering from Contract Administrator prior to production of documents and incorporate into drawings.
AutoNDA by SimpleDocs
CADD Layering a. Conform to the guidelines defined by the American Institute of Architect's (AIA) standard document, “CAD Layer Guidelines”, 2nd edition or later.

Related to CADD Layering

  • PROCUREMENT LOBBYING To the extent this agreement is a "procurement contract" as defined by State Finance Law Sections 139-j and 139-k, by signing this agreement the contractor certifies and affirms that all disclosures made in accordance with State Finance Law Sections 139-j and 139-k are complete, true and accurate. In the event such certification is found to be intentionally false or intentionally incomplete, the State may terminate the agreement by providing written notification to the Contractor in accordance with the terms of the agreement.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Scope of Cooperation 1. The Authorities recognise the importance of close communication concerning the Covered CCPs and intend to cooperate regarding: a) general issues, including with respect to regulatory, supervisory, enforcement or other developments concerning the Covered CCPs and Australia; b) issues relevant to the operations, activities and services of the Covered CCPs; c) the coordination of supervisory activities and, where appropriate and consistent with applicable laws and each Authority’s mandate, providing assistance in the implementation of enforcement decisions; d) any other areas of mutual interest. 2. The Authorities recognise in particular the importance of close cooperation in the event that a Covered CCP, particularly one whose failure likely would be systemically important to an Authority, experiences, or is threatened by, a potential financial crisis or other Emergency Situation. One or both of the Local Authorities should provide notification to ESMA, and ESMA should provide notification to the Local Authorities, consistent with Article 3(4) below and each Authority should keep the other Authorities appropriately informed throughout the Emergency Situation. The Local Authorities should coordinate and lead in an Emergency Situation and should consult with and take account of the views of ESMA to the greatest extent practicable. ESMA should coordinate with the relevant CBI(s) regarding an Emergency Situation of a Covered CCP and any emergency measures that the CBI may consider appropriate. 3. Cooperation will be most useful in circumstances where issues of regulatory, supervisory or enforcement concern may arise, including but not limited to: a) the initial application of a Covered CCP for recognition in the European Union pursuant to Article 25 of EMIR and the periodic reviews of its recognition pursuant to Article 25(5) of EMIR; b) ESMA’s assessment of compliance and monitoring of the ongoing compliance by a Covered CCP with the Recognition Conditions; c) the tiering determination of a Covered CCP by ESMA pursuant to Article 25(2a) of EMIR; d) changes in a Covered CCP's internal rules, policies and procedures that could affect the way in which the Covered CCP complies with any Recognition Conditions; e) regulatory, supervisory or enforcement actions or approvals taken by a Local Authority or ESMA in relation to a Covered CCP, including changes to the relevant obligations and requirements to which the Covered CCPs are subject that may impact the Covered CCPs' continued compliance with the Recognition Conditions; and f) changes to regulatory status or requirements that could result in a change in the regulatory status of, relief granted to, or supervisory treatment of a Covered CCP and potentially could disrupt cross-border clearing arrangements.

  • DRUG AND ALCOHOL FREE WORKPLACE 20.1 All employees must report to work in a condition fit to perform their assigned duties unimpaired by alcohol or drugs.

  • Audit Cooperation In the event either Party is audited by a taxing authority, the other Party agrees to cooperate fully with the Party being audited in order to respond to any audit inquiries in a proper and timely manner so that the audit and/or any resulting controversy may be resolved expeditiously.

  • Musculoskeletal Injury Prevention and Control The hospital in consultation with the Joint Health and Safety Committee (JHSC) shall develop, establish and put into effect, musculoskeletal prevention and control measures, procedures, practices and training for the health and safety of employees.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

  • DRUG AND ALCOHOL TESTING Employees may be tested for drugs and/or alcohol pursuant to the provisions of the Employer's Drug and Alcohol Testing Policy which is attached hereto and made a part of this Agreement as if more fully set forth herein.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!