Change Reinforcement Sample Clauses

Change Reinforcement. Plan This Deliverable must address the following: • Purpose. • Risks are identified, and mitigation strategies defined for each risk. • The process for identification and documentation of monthly lessons learned. • Assessment intervals and adoption/performance metric definition. • Clear roles, responsibilities, and governance. • Plan to promote new successful behaviors. ✓ Agency-accepted DED. ✓ Deliverable contains all criteria agreed-upon in the DED. ✓ Addresses risks and mitigation strategies in the areas of change resistance, Agency and County leadership, operational disruptions, and avoidance of forcing change. ✓ Monthly lessons learned section identifies how to promote successful behaviors in an ongoing manner during change reinforcement reporting. ✓ Oregon Votes Project Team approves the cadence of the assessment intervals. ✓ ✓ Approved by the Oregon Votes Steering Committee.
AutoNDA by SimpleDocs

Related to Change Reinforcement

  • Change Management BellSouth provides a collaborative process for change management of the electronic interfaces through the Change Control Process (CCP). Guidelines for this process are set forth in the CCP document as amended from time to time during this Agreement. The CCP document may be accessed via the Internet at xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx.

  • Changes in Management Except as disclosed in the Registration Statement, the General Disclosure Package and the Prospectus, none of the persons who were officers or directors of the Company as of the date of the Pre-Pricing Prospectus has given oral or written notice to the Company or any of its subsidiaries of his or her resignation (or otherwise indicated to the Company or any of its subsidiaries an intention to resign within the next 24 months), nor has any such officer or director been terminated by the Company or otherwise removed from his or her office or from the board of directors, as the case may be (including, without limitation, any such termination or removal which is to be effective as of a future date) nor is any such termination or removal under consideration by the Company or its board of directors.

  • Construction Change Directives 1.1.1, 3.4.2, 3.11, 3.12.8, 4.2.8, 7.1.1, 7.1.2, 7.1.3, 7.3, 9.3.1.1 Construction Schedules, Contractor’s 3.10, 3.11, 3.12.1, 3.12.2, 6.1.3, 15.1.6.2

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • IRO Independence and Objectivity The IRO must perform the Claims Review in a professionally independent and objective fashion, as defined in the most recent Government Auditing Standards issued by the U.S. Government Accountability Office.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Technical Consultations If a Party has a significant concern with respect to food safety, plant health, or animal health, or an SPS measure that the other Party has proposed or implemented, that Party may request technical consultations with the other Party. The Party that is the subject of the request should respond to the request without undue delay. Each Party shall endeavour to provide the information necessary to avoid a disruption to trade and, as the case may be, to reach a mutually acceptable solution.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!