Chibchan languages and peoples Sample Clauses

Chibchan languages and peoples. In the following subsections, I will give a brief overview of Chibchan-speaking groups in terms of languages (1.1.1), culture and archaeological findings (1.1.2) and genetic particularities (1.1.3)
AutoNDA by SimpleDocs

Related to Chibchan languages and peoples

  • Přetrvající platnost This Section 3 “

  • Přetrvávající platnost Tento odstavec 1.3 “Zdravotní záznamy a Studijní data a údaje” zůstane závazný i v případě zániku platnosti či vypršení platnosti této Smlouvy.

  • Format and Signing of Tender 19.1 The Tenderer shall prepare one original of the documents comprising the Tender as described in ITT 11 and clearly mark it “ORIGINAL.” Alternative Tenders, if permitted in accordance with ITT 12, shall be clearly marked “ALTERNATIVE.” In addition, the Tenderer shall submit copies of the Tender, in the number specified in the TDS and clearly mark them “COPY.” In the event of any discrepancy between the original and the copies, the original shall prevail. 19.2 Tenderers shall mark as “CONFIDENTIAL” information in their Tenders which is confidential to their business. This may include proprietary information, trade secrets, or commercial or financially sensitive information. 19.3 The original and all copies of the Tender shall be typed or written in indelible ink and shall be signed by a person duly authorized to sign on behalf of the Tenderer. This authorization shall consist of a written confirmation as specified in the TDS and shall be attached to the Tender. The name and position held by each person signing the authorization must be typed or printed below the signature. All pages of the Tender where entries or amendments have been made shall be signed or initialed by the person signing the Tender. 19.4 In case the Tenderer is a JV, the Tender shall be signed by an authorized representative of the JV on behalf of the JV, and so as to be legally binding on all the members as evidenced by a power of attorney signed by each members' legally authorized representatives. 19.5 Any inter-lineation, erasures, or overwriting shall be valid only if they are signed or initialed by the person signing the Tender.

  • French Language Services If the HSP is required to provide services to the public in French under the provisions of the FLSA, the HSP will be required to submit a French language services report to the Funder. If the HSP is not required to provide services to the public in French under the provisions of the FLSA, it will be required to provide a report to the Funder that outlines how the HSP addresses the needs of its local Francophone community.

  • SBC-12STATE 47.1.1 The terms contained in this Agreement and any Appendices, Attachments, Exhibits, Schedules, and Addenda constitute the entire agreement between the Parties with respect to the subject matter hereof, superseding all prior understandings, proposals and other communications, oral or written between the Parties during the negotiations of this Agreement and through the execution and/or Effective Date of this Agreement. This Agreement shall not operate as or constitute a novation of any agreement or contract between the Parties that predates the execution and/or Effective Date of this Agreement.

  • CHINA The following provisions apply if you are subject to the exchange control regulations in China, as determined by the Company in its sole discretion:

  • Mobile Sierra Notwithstanding any provision of this Agreement, neither Party shall seek, nor shall they support any third party seeking, to prospectively or retroactively revise the rates, terms or conditions of service of this Agreement through application or complaint to the FERC pursuant to the provisions of the Federal Power Act, absent prior written agreement of the Parties. Further, absent the prior written agreement in writing by both Parties, the standard of review for changes to the rates, terms or conditions of service of this Agreement proposed by a Party, a non-Party, or the FERC acting sua sponte shall be the “public interest” standard of review set forth in United States Gas Pipe Line Co. v.

  • Pendahuluan Industri perbankan syari’ah di Indonesia tengah memasuki fase growth (pertumbuhan) xxx sangat membutuhkan kepercayaan xxx loyalitas masyarakat untuk terus meningkatkan produktivitasnya. Kepercayaan xxx loyalitas mutlak dibutuhkan untuk memasuki fase maturity perbankan syariah dalam menghadapi kompetisi global. Kepercayaan xxx loyalitas tidak dapat diperoleh tanpa adanya produk- produk yang mampu menjawab kebutuhan masyarakat. Produk bank syariah sudah semestinya mampu memenuhi seluruh komponen masyarakat, baik dalam produk funding, financing, xxx services. Oleh karenanya, inovasi produk bank syariah menjadi syarat mutlak sebagai indikator bahwa bank syariah mampu beradaptasi dengan kebutuhan manusia modern. Inovasi produk merupakan salah satu unsur penting untuk dapat menjaga sustainabilitas perusahaan. Inovasi produk merepresentasikan kemampuan perusahaan untuk dapat memenuhi kebutuhan pasar sekaligus sebagai upaya untuk memperoleh keuntungan perusahaan. Bank syariah pada dasarnya telah melakukan serangkaian upaya inovasi, salah satunya adalah dengan melakukan “rekayasa” (engineering) terhadap akad- akad dalam fiqh muamalah. Beberapa akad dalam fiqh muamalah tidak begitu saja diadopsi oleh perbankan syariah, namun juga “diadaptasikan” dengan kebutuhan masyarakat terhadap xxxx-xxxx perbankan. Rekayasa xxx adaptasi ini memang sebuah keniscayaan, karena jika adopsi dilakukan secara apa adanya maka produk bank syariah diragukan dapat memberikan manfaat yang tepat bagi masyarakat. Prinsip keleluasan bermuamalah dalam Islam merupakan modal utama untuk menghadapi kompleksitas permasalahan ekonomi serta besarnya tuntutan masyarakat akan peran perbankan syariah.1 Dalam rangka memenuhi kebutuhan masyarakat xxx mengembangkan industri perbankan xxx keuangan xxxx xxxx kompetitif, inovasi dalam berbisnis yang dilakukan oleh perbankan syariah melalui serangkaian adaptasi tersebut memang sudah menjadi tuntutan bisnis. Sebagai contoh dapat dikemukakan xxxxxx xxxx kartu kredit syariah, asuransi syariah, obligasi syariah, FX iB, xxx Islamic Swap. Produk-produk dalam kegiatan keuangan syariah tersebut mengandung beberapa akad. Sebagai contoh, dalam transaksi kartu kredit syariah terdapat akad ijarah, qardh, xxx kafalah. Obligasi syariah mengandung sekurang-kurangnya akad mudharabah (atau ijarah) xxx wakalah, serta terkadang disertai kafalah atau wa’d. Islamic swap mengandung beberapa kali akad tawarruq, bay‘, wakalah, xxxxx, xxx terkadang disertai wa’d.2 Dalam setiap transaksi, akad-akad tersebut dilakukan secara bersamaan atau setidak-tidaknya setiap akad yang terdapat dalam suatu produk tidak bisa ditinggalkan, karena kesemuanya merupakan satu kesatuan. Transaksi seperti 1 Xxxxxx Xxxxx Xxxxxx, “Konstruksi Akad dalam Pengembangan Produk Perbankan Syariah di Indonesia”, Al-‘Adalah, Vol. 12, No. 3 (Juni, 2015), 493. 2 Xxxxxxxxx Xxxxxxx, “Multiakad dalam Transaksi Syariah Kontemporer pada Lembaga Keuangan Syariah di Indonesia”, Al-Iqtishad, Vol. 3, No. 1 (Januari, 2011), 156. inilah yang dikenal dengan istilah multiakad (Indonesia) atau hybrid contract (Inggris) atau al-’uqud al-murakkabah (Arab). Hybrid contract merupakan perbincangan yang masih hangat dikalangan para cendikiawan muslim untuk menentukan keabsahan hukumnya. Pendapat pertama mengatakan hukumnya mubah berdasar kaidah fiqh al-ashlu fi al-mu’amalat al-ibahah (hukum asal muamalah adalah boleh). Pendapat kedua mengharamkan berdasarkan dengan hadits-hadits yang mengharamkan dua jual beli dalam satu jual beli (bai’ataini fi bai’atin), atau mengharamkan dua akad dalam satu akad (shafqatain fi shafqatin).3 Sebagai entitas bisnis yang menjadi bagian penting dalam sistem ekonomi syariah sebagai induknya, tentunya industri perbankan syariah tidak boleh keluar dari nilai-nilai syariah. Melakukan inovasi memang tuntutan bisnis, namun menjaga shariah compliance juga menjadi kewajiban bagi setiap pelaku bisnis syariah, tidak terkecuali perbankan syariah. Profit-oriented hanya boleh dijadikan sebagai media (tool) untuk mencapai tujuan (goal), yaitu benefit-oriented. Produk bank syari’ah seyogyanya memiliki multi benefit, yaitu: material benefit, emotional benefit, xxx spiritual benefit.4 Mengacu pada kondisi tersebut, maka inovasi produk perbankan syariah setidaknya memerhatikan inovasi dalam dua dimensi, yaitu dimensi ekonomi xxx dimensi sosial. Inovasi dalam dimensi ekonomi artinya bahwa produk perbankan syariah harus mampu menghadirkan produk yang sesuai dengan kebutuhan masyarakat, sehingga bank syariah menjadi pilihan utama masyarakat. Jika hal ini dapat dilakukan, maka fungsi-fungsi bank syariah akan mampu memainkan perannya sebagai intermediary institution. Pada dimensi sosial, sebagai produsen jasa keuangan syariah, bank syariah bertanggung jawab untuk melakukan edukasi terhadap perilaku masyarakat. Bank syariah xxx masyarakat xxxxxx melekat xxx memengaruhi satu dengan yang lain. Pada satu sisi, bank syariah melalui pola inovasinya harus mampu “men-syariah- kan” perilaku masyarakat, khususnya yang berhubungan dengan lembaga 3 Najamuddin, “Al-‘Uqud Al-Murakkabah dalam Perspektif Ekonomi Syariah”, Jurnal Syariah, Vol. 2, No. 2 (Oktober, 2013), 6.

  • School Closures The District may close schools for academic purposes or reduce programming due to public health, safety, severe weather or any other purpose as determined by the District. The District shall not owe Provider any compensation for times when services of Therapists are canceled, declined, or not required due to closure, reduction in programming, or exclusion of Therapists due to health risk assessment screenings or any other reason, and Provider agrees to indemnify District for Therapist claims arising from all such actions. Notwithstanding the foregoing, to the extent required by Section 10-20.56(d-15) of the School Code (105 ILCS 5/10-20.56(d-15)), when enforceable under law, the Parties understand that the District may determine it is required to pay Provider the daily, regular rate of pay and benefits for Therapists for any day of school closure or e-learning day if such closure precludes the Provider’s employees from performing its regularly scheduled duties and employees would have reported for work but for the closure, unless the day is rescheduled and the employees will be paid their daily, regular rate of pay and benefits for the rescheduled day when services are rendered. The Parties agree such payment constitute full satisfaction of Section 10-20.56(d-15). As a precondition to these payments being made, Provider shall provide an invoice for the foregoing pay and benefits costs; however, Provider will not include such pay and benefits costs for any school closure or e-learning day on any invoices until the last invoice of the school year in order to allow the District the opportunity to determine if the day will be rescheduled. When a payment is to be made by the District under this provision, Provider represents and warrants that it shall pay its employees their daily, regular rate of pay and benefits for any such school closure or e-learning day. Upon request, Provider shall provide the District with certified payrolls as evidence of compliance with this section. The District retains sole discretion to determine whether Section 10-20.56(d-15) applies to this Agreement or any day of school closure and, if the District determines such law is applicable, the District retains the discretion to determine if and when a school closure day is rescheduled. For purposes of this section, “school closures” shall not include holidays or other days of closure reflected on the District’s school calendar for which Provider is not scheduled to provide services under the Agreement.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!