City of Dundas Sample Clauses

City of Dundas. Upon endorsement of this MOU, the City of Dundas shall manage growth in a manner that is consistent with the intent of this MOU and the Plan. The City shall prepare or update its own Transportation Plan consistent with the Plan recommendations and include a complementing supporting city street network vision. The City shall abide by the following guidelines and considerations in facilitating development and implementing roadway improvements within its city limits:
AutoNDA by SimpleDocs

Related to City of Dundas

  • THE CITY OF LINCOLN, NEBRASKA ATTEST: City Clerk CITY OF LINCOLN, NEBRASKA Xxxxxxx Xxxxxx Xxxxx, Mayor Approved by Executive Order No. dated Lancaster County Signature Page AMENDMENT TO CONTRACT Annual Repair Services For Construction and Purpose-Built Equipment Bid No. 18-167 City of Lincoln and Lancaster County Renewal Xxxxxx Tractor & Equipment Co. Inc.

  • City of Melbourne Definition For the purposes of determining Site Allowance in accordance with this Agreement, the boundaries of the “City of Melbourne” are defined as follows: Commencing at the point where Citylink (Tullamarine Freeway) intersects Racecourse Road, proceed east along Racecourse Road, Xxxxxxx Avenue, Macarthur Road Cemetery Road West, Cemetery Road East and Princes Street to Xxxxxxxxx Street. Then south on Xxxxxxxxx Street to Victoria Parade. In Victoria Parade, proceed east to Punt Road, then south along Punt Road to the St Kilda Junction. From the St Kilda Junction proceed along Fitzroy Street to Beaconsfield Parade, and then north-west along Beaconsfield Parade, Beach Street and The Boulevarde and following the waterline to Lorimer Street, and then east along Lorimer Street as far as Citylink (Western Link). Follow Citylink north to Racecourse Road to complete the boundary. The City of Melbourne zone will also include the area bounded by Xxxxxxxxx Street, Victoria Parade’ Xxxxxx Street, and Alexandra Parade. Where one boundary of a project fronts at least one of the above streets, then such project is deemed to be within the City of Melbourne. APPENDIX D THE VICTORIAN BUILDING INDUSTRY ALCOHOL & OTHER DRUGS POLICY

  • The City of Milwaukee, by its Milwaukee Board of School Directors, shall pay the Contractor for the full and complete performance of the work, the sum of Three Hundred Sixty Five Thousand Five Hundred Dollars and 00/100 ($365,500.00) as provided in the General Conditions of the Contract.

  • County Of Orange A political subdivision of the State of California Sheriff-Coroner Department By: Title: Print Name: Date: Approved by the Board of Supervisors: Approved as to Form Office of the County Counsel Orange County, California By:

  • and the City of Timmins (a) A Nurse who notifies the Employer of a bereavement shall be granted a maximum of three (3) working days off without loss of regular salary for scheduled hours for a death in the Nurse's immediate family.

  • County of Orange Child Support Enforcement In order to comply with the child support enforcement requirements of the County of Orange, within ten (10) days of notification of selection of award of CONTRACT but prior to official award of CONTRACT, the selected CONTRACTOR agrees to furnish to the CONTRACT MANAGER, the Purchasing Agent, or the agency/department deputy purchasing agent:

  • Priority of Agreements This DPA shall govern the treatment of Student Data in order to comply with the privacy protections, including those found in FERPA and all applicable privacy statutes identified in this DPA. In the event there is conflict between the terms of the DPA and the Service Agreement, Terms of Service, Privacy Policies, or with any other bid/RFP, license agreement, or writing, the terms of this DPA shall apply and take precedence. In the event of a conflict between Exhibit H, the SDPC Standard Clauses, and/or the Supplemental State Terms, Exhibit H will control, followed by the Supplemental State Terms. Except as described in this paragraph herein, all other provisions of the Service Agreement shall remain in effect.

  • Priority of Agreement In the event of any conflict between provisions of this Agreement or any amendment hereto and any documents executed, acknowledged, sworn to, or filed by any Manager under this power of attorney, this Agreement and its amendments shall govern.

  • PRIORITY OF USE Any schedule or milestone in this Agreement is estimated based upon the Parties' current understanding of the projected availability of NASA goods, services, facilities, or equipment. In the event that NASA's projected availability changes, Partner shall be given reasonable notice of that change, so that the schedule and milestones may be adjusted accordingly. The Parties agree that NASA's use of the goods, services, facilities, or equipment shall have priority over the use planned in this Agreement. Should a conflict arise, NASA in its sole discretion shall determine whether to exercise that priority. Likewise, should a conflict arise as between two or more non-NASA Partners, NASA, in its sole discretion, shall determine the priority as between those Partners. This Agreement does not obligate NASA to seek alternative government property or services under the jurisdiction of NASA at other locations.

  • Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!