CREATION OF DANGER Sample Clauses

CREATION OF DANGER. A. In the event that the Commissioner of the SCDHEC or the Regional Administrator of EPA determines that activities con ducted pursuant to this Agreement may present an imminent and substantial endangerment to the health or welfare of the people on the site or in the surrounding areas or to the environment, the Commissioner of the SCDHEC or the Regional Administrator of EPA may order the DOE to stop any work being implemented under this Agreement for such period of time as needed to xxxxx the danger or may require the DOE to take necessary action to xxxxx the danger or both. In the event that the DOE determines that any on-site activities or work being implemented under this Agreement may create an immediate threat to human health or the environment from the release or threat of release of a hazardous substance, pollutant or contaminant, it may stop any work or on-site activities for such period of time as needed to xxxxx the danger. In the event the DOE makes a determination to stop work under this Section, it shall immediately notify the EPA and SCDHEC. The DOE shall submit a written summary of events to EPA and SCDHEC within five (5) days of making a determination under this Section.‌ B. The EPA and SCDHEC agree to develop for DOE’s approval a site health and safety plan for EPA and SCDHEC activities on the SRS. This plan shall address DOE and SRS health and safety orders and shall include proced ures for stopping work or taking actions necessary to meet DOE and SRS health and safety requirements.
AutoNDA by SimpleDocs
CREATION OF DANGER. 106. If any Party determines that activities conducted pursuant to this Agreement are creating a danger to the health or welfare of the people on the Hanford Site or in the surrounding area or to the environment, that Party may require or order the work to stop. Any such work stoppage or stop work order shall be expeditiously reviewed by DOE and the affected lead regulatory agency(s). Any dispute or nonconcurrence shall be immediately referred to the IAMIT level of the appropriate Dispute Resolution process.
CREATION OF DANGER. In the event that the Commissioner of the TDEC or the Regional Administrator of EPA determines that activities conducted pursuant to this Agreement may present an imminent and substantial endangerment to the health or welfare of the people on the Site or in the surrounding areas or to the environment, the Commissioner of the TDEC or the Regional Administrator of EPA may order the DOE to stop any work being implemented under this Agreement for such period of time as needed to xxxxx the danger or may require the DOE to take necessary action to xxxxx the danger or both. In the event that the DOE determines that any on-site activities or work being implemented under this Agreement may create an immediate threat to human health or the environment from the release or threat of release of a hazardous substance, pollutant or contaminant, it may stop any work or on-site activities for such period of time as needed to respond to or xxxxx the danger. In the event the DOE makes a determination to stop work under this Section, it shall immediately notify the EPA and TDEC. The DOE shall submit a written summary of events to EPA and TDEC within five (5) days of making a determination under this Section.
CREATION OF DANGER. 49 In the event the EPA in consultation with MDNR determines that activities conducted pursuant to this AGREEMENT, or any other circumstances or activities, may present an imminent and substantial endangerment to the public health or welfare or the environment, the EPA may, on its own initiative or upon request by the MDNR, order DOE to stop further implementation of Work under this AGREEMENT for such period of time as necessary to xxxxx the danger. Within one week of any order to stop work, EPA will provide, in writing, a statement of the basis for the stop work order. Any
CREATION OF DANGER. In the event that a Participating Agency, pursuant to its authority, determines that any on-site activities or work being implemented under this Agreement may create an immediate threat to human health or the environment, it may stop any work or on-site activities for such period of time as needed to respond to or xxxxx the danger. Examples of situations that warrant Participating Agencies to stop work or on-site activities are outlined in the Stop and Resume Work Authority section of the MC-20 UC Federalized Removal Actions and Decommissioning IAP. The decision to stop work under this Section requires the Participating Agency making the determination to immediately notify the BSEE IC and FOSC. Participating Agencies agree to follow the procedures on stopping and resuming work as outlined in the IAP for MC-20 UC. Any creation of danger or pollution event caused by work being performed under a third-party contract will immediately be reported to the Contracting Officer for that procurement who will then issue either a Suspension of Work or Stop Work Order in accordance with the terms and conditions of the contract to the vendor performing the work.

Related to CREATION OF DANGER

  • Retention of Data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Destruction of Data Provider shall destroy or delete all Personally Identifiable Data contained in Student Data and obtained under the DPA when it is no longer needed for the purpose for which it was obtained or transfer said data to LEA or LEA’s designee, according to a schedule and procedure as the parties may reasonable agree. Nothing in the DPA authorizes Provider to maintain personally identifiable data beyond the time period reasonably needed to complete the disposition.

  • Mitigation of Damages The Executive will not be required to mitigate damages or the amount of any payment provided for under this Agreement by seeking other employment or otherwise. Except as otherwise specifically provided in this Agreement, the amount of any payment provided for under this Agreement will not be reduced by any compensation earned by the Executive as the result of self-employment or employment by another employer or otherwise.

  • Definition of Days A day shall mean calendar days, however, where a deadline occurs on a Saturday, Sunday or Holiday (as identified in Article 25), the deadline shall be extended to the next normal business day.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

  • Provision of Data 26.1 The Supplier shall submit all information required under applicable law and regulations, such as but not limited to information required to meet financial and administrative obligations. If Wavin has not received one or more of the requested documents within ten (10) days of making the request, Wavin shall be entitled to suspend payment until the moment of receipt, or to terminate the Agreement without any liability. 26.2 Every change in the data submitted under clause 26.1 must be immediately reported to Wavin in writing.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!