COLLEGE POLICY, REGULATIONS AND PROCEDURES Sample Clauses

COLLEGE POLICY, REGULATIONS AND PROCEDURES. ‌‌ Unit members shall observe College policy, regulations and procedures. Such policy, regulations and procedures include, but are not limited to, the areas of grading, attendance, class records, textbook selection, conference attendance, instructional trips, guest speakers, political activities,‌ prohibited instruction, tutoring for pay, release of confidential information and academic freedom.
AutoNDA by SimpleDocs

Related to COLLEGE POLICY, REGULATIONS AND PROCEDURES

  • Rules, Regulations and Policies Employee shall abide by and comply with all of the rules, regulations, and policies of Employer, including without limitation Employer's policy of strict adherence to, and compliance with, any and all requirements of the banking, securities, and antitrust laws and regulations.

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Cooperation on forestry matters and environmental protection 1. The aims of cooperation on forestry matters and environmental protection will be, but not limited to, as follows: (a) establishing bilateral cooperation relations in the forestry sector; (b) developing a training program and studies for sustainable management of forests; (c) improving the rehabilitation and sustainable management of forest with the aim of increasing carbon sinks and reduce the impact of climate change in the Asia-Pacific region; (d) cooperating on the execution of national projects, aimed at: improving the management of forest plantations for its transformation for industrial purposes and environmental protection; (e) elaborating studies on sustainable use of timber; (f) developing new technologies for the transformation and processing of timber and non-timber species; and (g) improving cooperation in agro-forestry technologies. 2. To achieve the objectives of the Article 149 (Objectives), the Parties may focus, as a means of cooperation and negotiations on concluding a bilateral agreement on forestry cooperation between the two Parties. Such collaboration will be as follows: (a) exchanges on science and technology as well as policies and laws relating the sustainable use of forest resources; (b) cooperation in training programs, internships, exchange of experts and projects advisory; (c) advice and technical assistance to public institutions and organizations of the Parties on sustainable use of forest resources and environmental protection; (d) facilitating forest policy dialogue and technical cooperation under the Network of Sustainable Forest Management and Forest Rehabilitation in Asia- Pacific Region, initiated at the 15th Asia Pacific Economic Cooperation (APEC) Meeting; (e) encouraging joint studies, working visits, exchange of experiences, among others; and (f) others activities mutually agreed.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Regulatory Requirements and Governing Law 43 14.1 Regulatory Requirements. 43 14.2 Governing Law 44 ARTICLE 15. NOTICES 44 15.1 General. 44 15.2 Xxxxxxxx and Payments. 44 15.3 Alternative Forms of Notice 44 15.4 Operations and Maintenance Notice 44 ARTICLE 16. FORCE MAJEURE 45 16.1 Force Majeure 45 ARTICLE 17. DEFAULT 45 17.1 Default. 45 ARTICLE 18. INDEMNITY, CONSEQUENTIAL DAMAGES AND INSURANCE 46 18.1 Indemnity. 46 18.2 No Consequential Damages. 47 18.3 Insurance 47 ARTICLE 19. ASSIGNMENT 49 19.1 Assignment. 49 ARTICLE 20. SEVERABILITY 49 20.1 Severability. 49 ARTICLE 21. COMPARABILITY 50 21.1 Comparability. 50 ARTICLE 22. CONFIDENTIALITY 50 22.1 Confidentiality. 50 ARTICLE 23. ENVIRONMENTAL RELEASES 53 23.1 Developer and Connecting Transmission Owner Notice 53 ARTICLE 24. INFORMATION REQUIREMENT 53 24.1 Information Acquisition. 53 24.2 Information Submission by Connecting Transmission Owner 54 24.3 Updated Information Submission by Developer 54 24.4 Information Supplementation 54 ARTICLE 25. INFORMATION ACCESS AND AUDIT RIGHTS 55 25.1 Information Access. 55 25.2 Reporting of Non-Force Majeure Events. 55 25.3 Audit Rights. 56 25.4 Audit Rights Periods. 56 25.5 Audit Results. 56 ARTICLE 26. SUBCONTRACTORS 56 26.1 General. 56 26.2 Responsibility of Principal. 57 26.3 No Limitation by Insurance 57 ARTICLE 27. DISPUTES 57 27.1 Submission 57 27.2 External Arbitration Procedures. 57 27.3 Arbitration Decisions. 58 27.4 Costs. 58 27.5 Termination 58 ARTICLE 28. REPRESENTATIONS, WARRANTIES AND COVENANTS 58 28.1 General. 58 ARTICLE 29. MISCELLANEOUS 59 29.1 Binding Effect. 59 29.2 Conflicts. 59 29.3 Rules of Interpretation 59 29.4 Compliance 60 29.5 Joint and Several Obligations. 60 29.6 Entire Agreement. 60 29.7 No Third Party Beneficiaries. 60 29.8 Waiver 60 29.9 Headings. 61 29.10 Multiple Counterparts. 61 29.11 Amendment. 61 29.12 Modification by the Parties. 61 29.13 Reservation of Rights. 61 29.14 No Partnership 62 29.15 Other Transmission Rights. 62 Appendices STANDARD LARGE GENERATOR INTERCONNECTION AGREEMENT THIS STANDARD LARGE GENERATOR INTERCONNECTION AGREEMENT

  • Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • Compliance with Federal Law, Regulations, and Executive Orders This is an acknowledgement that FEMA financial assistance will be used to fund all or a portion of the contract. The contractor will comply with all applicable Federal law, regulations, executive orders, FEMA policies, procedures, and directives.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!