Catering The IU Auditorium staff may suggest caterers for your event; however, the Licensee will be responsible for paying all catering costs in a timely manner. All caterers in the IU Auditorium must be pre-approved by IU Auditorium Management and possess all valid Indiana licenses for food service and the service of alcoholic beverages (if applicable). The caterer must carry commercial general and auto liability insurance, including a products-completed operations endorsement, with minimum limits of $1,000,000 per occurrence / $2,000,000 Aggregate. If alcohol is being served the caterer must also carry dram shop liability with minimum limits of $3,000,000. Licensee must be in compliance with all other university regulations regarding food service including, but not limited to, completing the University Office of Environmental Health & Safety’s Temporary Food Service application, if necessary. Also, “The Trustees of Indiana University, its officers, agents and employees” must be named as an additional insured on the Certificate of Insurance for both Commercial General Liability and Automobile Liability coverage. The Certificate of Insurance must be submitted to Indiana University for review and approval at least fourteen (14) working days prior to the scheduled date of the event. If Licensee’s vendor/caterer fails to comply with any of the requirements described in this section, the vendor/caterer will not be permitted to serve food or alcohol at the Event and Licensor shall not be responsible for any losses incurred by Licensee or Licensee’s subcontractors as a result of such cancellation. IU Auditorium has an agreement with IATSE Local 618 to provide audio services for all functions in IU Auditorium facilities. Sound and/or lighting requirements must be communicated in writing to the Auditorium Management a minimum of one week before the scheduled event. If the Licensee has contracted for audio services through another agent (band, outside company, etc.), IU Auditorium reserves the right to assign a member of IATSE Local 618 to be present for the event, in accordance with the governing labor agreement. IU Auditorium reserves the right to provide ticketing services for all public and private events held at IU Auditorium. All customary charges, including credit card commissions, ticket printing, outlet, and phone commissions are included in the daily facility fee. The final decision as to when tickets will go on sale will be made by the Auditorium Director of Ticketing and Sales in cooperation with Ticketmaster and the Licensee. IU Auditorium collects a facility fee from each ticket sale for any event held at IU Auditorium and places it into a special reserve account. Funds in this account are used for facility capital purchases and improvements. The funds are also used to cover the costs of extraordinary repairs and maintenance. This fee is $3.50 for events where the top ticket price is $15.01 or higher. The fee is $2.50 for events where the top ticket price is $15.00 or lower. IU departments or organizations must first complete a Revenue Producing Activity training before pre-box tickets may be sold by any members of the organization. Non-IU departments or organizations may only sell pre-box tickets using cash or check.
JOB FAMILY: APPLICATIONS DEVELOPMENT Job Title: Enterprise Application Integration (EAI) Engineer Job#: 1230 General Characteristics
Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.
Classroom Management The certificated classroom teacher demonstrates in his/her performance a competent level of knowledge and skill in organizing the physical and human elements in the educational setting.
Prescription Glasses This plan covers prescription glasses as follows: • Frames - one (1) collection frame per plan year; • Lenses - one (1) pair of glass or plastic collection lenses per plan year. This includes single vision, bifocal, trifocal, lenticular, and standard progressive lenses. This plan covers the following lens treatments: • UV treatment; • tint (fashion, gradient, and glass-grey); • standard plastic scratch coating; • standard polycarbonate; and • photocromatic/transitions plastic. This plan covers one (1) supply of contact lenses as follows: • conventional contact lenses - one (1) pair per plan year from a selection of • extended wear disposable lenses - up to a 6-month supply of monthly or two- week single vision spherical or toric disposable contact lenses per plan year; or • daily wear disposable lenses - up to a 3-month supply of daily single vision spherical disposable contact lenses per plan year. This plan also covers the evaluation, fitting, or follow-up care related to contact lenses. This plan covers additional contact lenses if your prescribing network provider submits a verification form, with the regular claim form, verifying that you have one of the following conditions: • anisometropia of 3D in meridian powers; • high ametropia exceeding -10D or +10D in meridian powers; • keratoconus when the member’s vision is not correctable to 20/25 in either or both eyes using standard spectacle lenses; and • vision improvement for members whose vision can be corrected two lines of improvement on the visual acuity chart when compared to the best corrected standard spectacle lenses.
Shopping Goods and works estimated to cost less than $100,000 equivalent per contract may be procured under contracts awarded on the basis of Shopping.
Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.
Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.
Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.
Workshops During the month of September or October of each year during the term of this Agreement, there shall be held at each University a workshop for Department Chairs at which will be discussed their roles and responsibilities as such. Representatives of the University, at its election, and representatives of the Association, at its election, shall be permitted to participate jointly in such workshop.