Criminal Justice Information System (CJIS) Maximum Risk Background Check Sample Clauses

Criminal Justice Information System (CJIS) Maximum Risk Background Check. If the Scope of Work of this Contract requires unescorted access to a CJIS location or if Contractor will have access to a CJIS infrastructure or information, then a CJIS maximum risk background check will be conducted, reviewed, and approved by the Phoenix Police Department or the Arizona Department of Public Safety.
AutoNDA by SimpleDocs

Related to Criminal Justice Information System (CJIS) Maximum Risk Background Check

  • Submission of Grievance Information a) Upon appointment of the arbitrator, the appealing party shall within five days after notice of appointment forward to the arbitrator, with a copy to the School Board, the submission of the grievance which shall include the following:

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Secondary / Post-Secondary Program Alignment Welding HIGH SCHOOL COURSE SEQUENCE 9th Grade 10th Grade 11th Grade 12th Grade English 9 Algebra I World History/Geography Biology World Language Phys Ed/Health English 10 Geometry U.S. History/Geography Physics or Chemistry World Language Visual/Performing/Applied Arts English 11 Algebra II Civics/Economics Welding English 12 Math Credit Science Credit Welding WASHTENAW COMMUNITY COLLEGE Welding Associate in Applied Science Semester 1 Math Elective(s)* 3 WAF 105 Introduction to Welding Processes 2 WAF 111 Oxy-fuel Welding 4 WAF 112 Shielded Metal Arc Welding 4 Semester Total 13 Semester 2 Speech Elective(s) 3 WAF 106 Blueprint Reading for Welders 3 WAF 123 Advanced Oxy-fuel Welding 4 WAF 124 Advanced Shielded Metal Arc Welding 4 Semester Total 14 Semester 3 Arts/Human. Elective(s) 3 Computer Lit. Elective(s) 3 WAF 215 Advanced Gas Tungsten Arc Welding 4 WAF 288 Gas Metal Arc Welding 4 Semester Total 14 Semester 4 WAF 200 Layout Theory Welding 3 WAF 210 Welding Metallurgy 3 Soc. Sci. Elective(s) 3 WAF 226 Specialized Welding Procedures 4 Semester Total 13 Semester 5 Nat. Sci. Elective(s) 4 WAF 227 Basic Fabrication 3 WAF 229 Shape Cutting Operations 3 Writing Elective(s) 3 Semester Total 13 Program Totals 67

  • Lobbying Activities - Standard Form - LLL No response Do not upload this form unless Vendor has reportable lobbying activities. There are Attributes entitled, “2 CFR Part 200 or Federal Provision - Xxxx Anti-Lobbying Amendment – Continued.” Properly respond to those Attributes and only upload this form if applicable/instructed. If upload is required based on your response to those Attributes, the Disclosure of Lobbying Activities – Standard Form - LLL must be downloaded from the “Attachments” section of the IonWave eBid System, reviewed, properly completed, and uploaded to this location.

  • Contractor Certification regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code], Contractor certifies Contractor is not engaged in business with Iran, Sudan, or a foreign terrorist organization. Contractor acknowledges this Agreement may be terminated and payment withheld if this certification is inaccurate.

  • Program Fraud and False or Fraudulent Statements or Related Acts (A) The CONTRACTOR acknowledges that the provisions of the Program Fraud Civil Remedies Act of 1986, as amended, 31 U.S.C. § 3801 et seq . and U.S. DOT regulations, "Program Fraud Civil Remedies," 49 C.F.R. Part 31, apply to its actions pertaining to this Project. Upon execution of the underlying contract, the CONTRACTOR certifies or affirms the truthfulness and accuracy of any statement it has made, it makes, it may make, or causes to be made, pertaining to the underlying contract or the FTA assisted project for which this contract work is being performed. In addition to other penalties that may be applicable, the CONTRACTOR further acknowledges that if it makes, or causes to be made, a false, fictitious, or fraudulent claim, statement, submission, or certification, the Federal Government reserves the right to impose the penalties of the Program Fraud Civil Remedies Act of 1986 on the CONTRACTOR to the extent the Federal Government deems appropriate.

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Bid Attributes Disadvantaged/Minority/Women Business & Federal HUBZone Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Historically Underutilized Business (HUB) Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No National Coverage Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • Reporting of Abuse, Neglect, or Exploitation Consistent with provisions of 33 V.S.A. §4913(a) and §6903, any agent or employee of a Contractor who, in the performance of services connected with this agreement, has contact with clients or is a caregiver and who has reasonable cause to believe that a child or vulnerable adult has been abused or neglected as defined in Chapter 49 or abused, neglected, or exploited as defined in Chapter 69 of Title 33 V.S.A. shall make a report involving children to the Commissioner of the Department for Children and Families within 24 hours or a report involving vulnerable adults to the Division of Licensing and Protection at the Department of Disabilities, Aging, and Independent Living within 48 hours. This requirement applies except in those instances where particular roles and functions are exempt from reporting under state and federal law. Reports involving children shall contain the information required by 33 V.S.A. §4914. Reports involving vulnerable adults shall contain the information required by 33 V.S.A. §6904. The Contractor will ensure that its agents or employees receive training on the reporting of abuse or neglect to children and abuse, neglect or exploitation of vulnerable adults.

  • Independent Contractor; No Partnership; No Agency; No Utility Services 15.1 Company and Developer shall be independent contractors. This Agreement shall not be interpreted or construed to create an association, joint venture, agency relationship, or partnership between the Parties or to impose any partnership obligation or partnership liability upon any Party. No Party shall have any right, power or authority to enter into any agreement or undertaking for, or act on behalf of, or to act as or be an agent or representative of, or to otherwise bind, the other Party. This Agreement is not an agreement to provide or take utility services of any kind, including, without limitation, interconnection or other electric transmission services.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

Time is Money Join Law Insider Premium to draft better contracts faster.