Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.
Scope of Cooperation 1. The Authorities recognise the importance of close communication concerning the Covered CCPs and intend to cooperate regarding: a) general issues, including with respect to regulatory, supervisory, enforcement or other developments concerning the Covered CCPs and Australia; b) issues relevant to the operations, activities and services of the Covered CCPs; c) the coordination of supervisory activities and, where appropriate and consistent with applicable laws and each Authority’s mandate, providing assistance in the implementation of enforcement decisions; d) any other areas of mutual interest. 2. The Authorities recognise in particular the importance of close cooperation in the event that a Covered CCP, particularly one whose failure likely would be systemically important to an Authority, experiences, or is threatened by, a potential financial crisis or other Emergency Situation. One or both of the Local Authorities should provide notification to ESMA, and ESMA should provide notification to the Local Authorities, consistent with Article 3(4) below and each Authority should keep the other Authorities appropriately informed throughout the Emergency Situation. The Local Authorities should coordinate and lead in an Emergency Situation and should consult with and take account of the views of ESMA to the greatest extent practicable. ESMA should coordinate with the relevant CBI(s) regarding an Emergency Situation of a Covered CCP and any emergency measures that the CBI may consider appropriate. 3. Cooperation will be most useful in circumstances where issues of regulatory, supervisory or enforcement concern may arise, including but not limited to: a) the initial application of a Covered CCP for recognition in the European Union pursuant to Article 25 of EMIR and the periodic reviews of its recognition pursuant to Article 25(5) of EMIR; b) ESMA’s assessment of compliance and monitoring of the ongoing compliance by a Covered CCP with the Recognition Conditions; c) the tiering determination of a Covered CCP by ESMA pursuant to Article 25(2a) of EMIR; d) changes in a Covered CCP's internal rules, policies and procedures that could affect the way in which the Covered CCP complies with any Recognition Conditions; e) regulatory, supervisory or enforcement actions or approvals taken by a Local Authority or ESMA in relation to a Covered CCP, including changes to the relevant obligations and requirements to which the Covered CCPs are subject that may impact the Covered CCPs' continued compliance with the Recognition Conditions; and f) changes to regulatory status or requirements that could result in a change in the regulatory status of, relief granted to, or supervisory treatment of a Covered CCP and potentially could disrupt cross-border clearing arrangements.
Areas of Cooperation 1. To achieve the objectives of cooperation in fisheries within the described principles, cooperation will include fisheries management and conservation issues, vessel management and post harvest arrangements and financial and trade measures and development of fisheries and fisheries products and marine aquaculture. 2. The EC Party will contribute to the mobilisation of the resources for the implementation of the identified areas of cooperation at national and regional levels, which will also include support for regional capacity building. Furthermore, the EC Party contributes to the measures as described in the section concerning financial and trade measures, and on infrastructure development specific for fisheries and marine aquaculture.
Definitions and Principles of Interpretation The following definitions in clause 1.1 shall be replaced as follows:
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Definitions and Principles of Construction Section 1.1 Defined Terms 1 Section 1.2 Principles of Constructions 1
Data Protection Impact Assessment and Prior Consultation Processor shall provide reasonable assistance to the Company with any data protection impact assessments, and prior consultations with Supervising Authorities or other competent data privacy authorities, which Company reasonably considers to be required by article 35 or 36 of the GDPR or equivalent provisions of any other Data Protection Law, in each case solely in relation to Processing of Company Personal Data by, and taking into account the nature of the Processing and information available to, the Contracted Processors.
Conflict; Construction of Documents; Reliance In the event of any conflict between the provisions of this Agreement and any of the other Loan Documents, the provisions of this Agreement shall control. The parties hereto acknowledge that they were represented by competent counsel in connection with the negotiation, drafting and execution of the Loan Documents and that such Loan Documents shall not be subject to the principle of construing their meaning against the party which drafted same. Borrower acknowledges that, with respect to the Loan, Borrower shall rely solely on its own judgment and advisors in entering into the Loan without relying in any manner on any statements, representations or recommendations of Lender or any parent, subsidiary or Affiliate of Lender. Lender shall not be subject to any limitation whatsoever in the exercise of any rights or remedies available to it under any of the Loan Documents or any other agreements or instruments which govern the Loan by virtue of the ownership by it or any parent, subsidiary or Affiliate of Lender of any equity interest any of them may acquire in Borrower, and Borrower hereby irrevocably waives the right to raise any defense or take any action on the basis of the foregoing with respect to Lender’s exercise of any such rights or remedies. Borrower acknowledges that Lender engages in the business of real estate financings and other real estate transactions and investments which may be viewed as adverse to or competitive with the business of Borrower or its Affiliates.
Litigation Cooperation From the date hereof and continuing through the termination of this Agreement, make available to Bank, without expense to Bank, Borrower and its officers, employees and agents and Borrower’s books and records, to the extent that Bank may deem them reasonably necessary to prosecute or defend any third-party suit or proceeding instituted by or against Bank with respect to any Collateral or relating to Borrower.
Industrial cooperation Cooperation shall aim to promote the modernisation and restructuring of industry and individual sectors in Serbia. It shall also cover industrial cooperation between economic operators, with the objective of strengthening the private sector under conditions which ensure that the environment is protected. Industrial cooperation initiatives shall reflect the priorities determined by both Parties. They shall take into account the regional aspects of industrial development, promoting trans-national partnerships when relevant. The initiatives should seek in particular to establish a suitable framework for undertakings, to improve management, know-how and to promote markets, market transparency and the business environment. Special attention shall be devoted to the establishment of efficient export promotion activities in Serbia. Cooperation shall take due account of the Community acquis in the field of industrial policy.