Context Sensitive Sample Clauses

Context Sensitive. Solutions (CSS)
AutoNDA by SimpleDocs
Context Sensitive. Solutions and Aesthetic Treatments
Context Sensitive. The proposed building’s design respects the character of the surrounding neighbourhood. The scale, form, and materials used respond to the architectural character of the neighbourhood. Next to heritage buildings or streetscapes, the proposed building complements and enhances the heritage features. The building fits well with the Quinpool Road commercial context, by providing a commercial ground floor and well-articulated façade. The three storey height and the at-grade residential units fit the residential character of Pepperell Street. PRESENT: Xxxxx Xxxxxxx, Vice Chair Xxxxxxx Xxxxx Xxxxxxx Xxxxxx Xxxxxx Xxxxxx Xxxxx Xxxxx Councillor Xxxxxxx Xxxxx REGRETS: Xxxxx XxxXxxxxx, Chair Xxxxx Xxxxx Xxxxx Xxxxx Deputy Mayor Xxxx Xxxxx STAFF: Xxxxx Xxxxx, Planner II, Planning & Development Xxxxx Xxxx, Planner, Planning & Development Xxxxxx Xxxxxxx, Legislative Support, Office of the Municipal Clerk 1. CALL TO ORDER 2. PUBLIC INFORMATION MEETING Case 20520- Dexel Developments Ltd. is applying to amend the Halifax Municipal Planning Strategy and Halifax Peninsula Land Use By-Law to enable an 8-storey mixed-use development at 0000 & 0000 Xxxxxxxx Xxxx, Xxxxxxx. Xxxxx Xxxxx, Xxxxxxxx Xx, stated that they were in favour of the development. As a business owner in the area, Xxxxx felt that the development would bring foot traffic to Quinpool Road and a greatly needed increase in clientele. Xxxxx Xxxxxxx, Pepperell Street, asked about the adjacent proposal in relation to the proposed development currently being discussed. Xxxxxxx warned of increasingly bad traffic and the adverse effects of residential homes possibility being “walled in” by these developments. Yasim, Xxxxxxx, stated the importance of affordable housing in the area. Xxxxx asked what the average rent would be per units and asked that there be a consideration for renters and students. Xxxxxxxxx, Xxxxxxxx & Xxxxxxx Street, asked when the development would begin and if the nearby developments would begin construction at the same time. Xxxxxx Well, Xxxxxxx, asked if the sewer system would exceed its capacity with the three new developments in the area. Well expressed concern that without enough parking spaces, there may be an overflow onto nearby street parking. Well also stated that the parking lot entrance is close to the intersection of Quinpool & Oxford and a bus stop. Xxxxxxx Xxxxxxx, Xxxxxxx, thanked the developer for investing in the city. Xxxxxxx stated that the area is in need of the density the develo...
Context Sensitive. Solutions -The roadways, bridges, and other Project elements where applicable shall be designed and constructed with sensitivity to aesthetic values, historic cultural landscapes, and the historic context, utilizing the services of professionals with experience in areas related to historic preservation. Design shall include aesthetic treatments to surfaces, structures, portals, appurtenances, and land contours and landscaping that complement the historical contexts of historic properties and in keeping with the HPPs for those areas. The Contractor shall also prepare an Aesthetics and Enhancement Implementation Plan that shall be reviewed in consultation with the BSHCT.
Context Sensitive. Solutions -The roadways, bridges, and other Project elements shall be designed and constructed with sensitivity to aesthetic values, historic cultural landscapes, and the historic context, utilizing the services of professionals with experience in areas related to historic preservation. Design shall include aesthetic treatments to surfaces, structures, portals, appurtenances, and land contours and landscaping that complement the historical contexts of historic properties.

Related to Context Sensitive

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

  • Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Definition of Proprietary Information The Executive acknowledges that he may be furnished or may otherwise receive or have access to confidential information which relates to the Company’s past, present or future business activities, strategies, services or products, research and development; financial analysis and data; improvements, inventions, processes, techniques, designs or other technical data; profit margins and other financial information; fee arrangements; compilations for marketing or development; confidential personnel and payroll information; or other information regarding administrative, management, or financial activities of the Company, or of a third party which provided proprietary information to the Company on a confidential basis. All such information, including in any electronic form, and including any materials or documents containing such information, shall be considered by the Company and the Executive as proprietary and confidential (the “Proprietary Information”).

  • Treatment of Confidential Information (A) Each party agrees that at all times during and after the terms of this Agreement, it shall use, handle, collect, maintain, and safeguard Confidential Information in accordance with (1) the confidentiality and non-disclosure requirements of this Agreement; (2) the GLB Act, as applicable and as it may be amended; and (3) such other Applicable Law, whether in effect now or in the future. (B) Without limiting the foregoing, the Receiving Party shall apply to any Confidential Information at least the same degree of reasonable care used for its own confidential and proprietary information to avoid unauthorized disclosure or use of Confidential Information under this Agreement. (C) Each party further agrees that: (1) The Receiving Party will hold all Confidential Information it obtains in strictest confidence and will use and permit use of Confidential Information solely for the purposes of this Agreement or as otherwise provided for in this Agreement, and consistent therewith, may disclose or provide access to its responsible employees or agents who have a need to know and are under adequate confidentiality agreements or arrangements and make copies of Confidential Information to the extent reasonably necessary to carry out its obligations under this Agreement; (2) Notwithstanding the foregoing, the Receiving Party may release Confidential Information as permitted or required by law or approved in writing by the Disclosing party, which approval shall not be unreasonably withheld and may not be withheld where the Receiving Party may be exposed to civil or criminal liability or proceedings for failure to release such information; (3) Additionally, Ultimus may provide Confidential Information typically supplied in the investment company industry to companies that track or report price, performance or other information regarding investment companies; and (4) The Receiving Party will immediately notify the Disclosing Party of any unauthorized disclosure or use, and will cooperate with the Disclosing Party to protect all proprietary rights in any Confidential Information.

  • Protection of Proprietary Information “Proprietary Information” means a disclosing party’s ( including DirectTrust, any Participant, or any Participant’s CA or RA) business operations, financial condition, customers, products, services, technical knowledge, information, materials, processes, ideas, and techniques (whether or not reduced to writing) (i) which are not generally known in the relevant industry; (ii) which afford possessors of the information a commercial advantage over others; (iii) which are considered trade secrets under Applicable Law; and/or (iv) which, if utilized or disclosed by a party receiving such information, would place the party disclosing such information at a competitive disadvantage. Except as necessary for a party to perform its obligations under this Agreement, as permitted under a written consent of a disclosing party, or as required under Applicable Law, a party will not use or disclose Proprietary Information received from DirectTrust, any Participant, or any Participant’s CA or RA. Each party’s Proprietary Information will remain the confidential information of that party except as otherwise expressly provided in this Agreement. Each of the parties will use at least the same degree of care to safeguard and to prevent disclosing to third parties the Proprietary Information of the other as it employs to avoid unauthorized disclosure or publication of its own information of a similar nature, and in any event, no less than reasonable care. Each party may disclose relevant aspects of the other party’s Proprietary Information to its employees, affiliates, subcontractors and agents to the extent such disclosure is reasonably necessary for the performance of its obligations, or the enforcement of its rights, under this Agreement; provided, however, that such party will cause such employees, affiliates, subcontractors or agents to comply with these confidentiality provisions. Neither party will (i) make any use or copies of the Proprietary Information of the other except as contemplated by this Agreement; or (ii) acquire any right in or assert any lien against the Proprietary Information of the other; or (iii) sell, assign, lease or otherwise commercially exploit the Proprietary Information of the other party. Neither party may withhold the Proprietary Information of the other party or refuse for any reason (including due to the other party’s actual or alleged breach of this Agreement) to promptly return to the other party its Proprietary Information (including copies thereof) if requested to do so. Upon expiration or termination of this Agreement and completion of a party’s obligations under this Agreement, each Party will, at the request of the other party, (and except as otherwise provided in this Agreement) return or destroy, as the other party may direct, all documentation in any medium that contains or refers to the other party’s Proprietary Information, and retain no copies. This Section III.a will not apply to any particular information that either party can demonstrate

  • Treatment of Proprietary and Confidential Information A. Both parties agree that it may be necessary to provide each other during the term of this Agreement with certain confidential information, including trade secret information, including but not limited to, technical and business plans, technical information, proposals, specifications, drawings, procedures, customer account data and like information (hereinafter collectively referred to as “Information”). Both parties agree that all Information shall either be in writing or other tangible format and clearly marked with a confidential, private or proprietary legend, or, when the Information is communicated orally, it shall also be communicated that the Information is confidential, private or proprietary. The Information will be returned to the owner within a reasonable time. Both parties agree that the Information shall not be copied or reproduced in any form. Both parties agree to receive such Information and not disclose such Information. Both parties agree to protect the Information received from distribution, disclosure or dissemination to anyone except employees of the parties with a need to know such Information and which employees agree to be bound by the terms of this Section. Both parties will use the same standard of care to protect Information received as they would use to protect their own confidential and proprietary Information. B. Notwithstanding the foregoing, both parties agree that there will be no obligation to protect any portion of the Information that is either: 1) made publicly available by the owner of the Information or lawfully disclosed by a nonparty to this Agreement; 2) lawfully obtained from any source other than the owner of the Information; or 3) previously known to the receiving party without an obligation to keep it confidential.

  • Ownership of Proprietary Information Unless otherwise provided by law any reports, histories, studies, tests, manuals, instructions, photographs, negatives, blue prints, plans, maps, data, system designs, computer code (which is intended to be consideration under this Contract), or any other documents or drawings, prepared or in the course of preparation by either party in performance of its obligations under this Contract shall be the joint property of both parties.

  • Subpoenas Directed to BellSouth Where BellSouth provides resold services or local switching for <<customer_name>>, BellSouth shall respond to subpoenas and court ordered requests delivered directly to BellSouth for the purpose of providing call detail records when the targeted telephone numbers belong to <<customer_name>> end users. Billing for such requests will be generated by BellSouth and directed to the law enforcement agency initiating the request. BellSouth shall maintain such information for <<customer_name>> end users for the same length of time it maintains such information for its own end users.

  • Confidential or Proprietary Information The term "Confidential --------------------------------------- or Proprietary Information" for purposes of this Agreement shall mean any secret, confidential, or proprietary information of SunTrust or a SunTrust Affiliate (not otherwise included in the definition of Trade Secret in (S) 1.23 of this Agreement) that has not become generally available to the public by the act of one who has the right to disclose such information without violating any right of SunTrust or a SunTrust Affiliate.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!