Voice Grade Unbundled Copper Sub-Loop Unbundled Sub-Loop Distribution – Intrabuilding Network Cable (aka riser cable)
Background Screening and Security All Contractor employees and agents performing work under the Contract must comply with all security and other requirements of the Department.
Shift Rotation Routine shift rotation is not an approach to staffing endorsed by the Employer. Except for emergency situations where it may be necessary to provide safe patient care, shift rotation will not be utilized without mutual consent. If such an occasion should ever occur, volunteers will be sought first. If no one volunteers, the Employer will rotate shifts on an inverse seniority basis until the staff vacancies are filled.
Sector Sub-Sector Industry Classification Level of Government Type of Obligation Description of Measure Source of Measure All sectors : : - : Central : National Treatment Senior Management and Board of Directors : National Treatment and the Senior Management and Board of Directors obligations shall not apply to any measure relating to small and medium sized domestic market enterprise2. Foreign equity is restricted to a maximum of 40% for domestic market enterprises with paid-in equity capital of less than the equivalent of USD 200,000 Note: Members of the Board of Directors or governing body of corporation or associations shall be allowed in proportion to their allowable participation or share in the capital of such enterprises. : -1987 Constitution of the Republic of the Philippines. - Foreign Investments Act of 1991 (R.A. No. 7042, as amended by R.A. No. 8179). -Presidential and Administrative Issuances. ∞ 2 The concept of a small and medium sized domestic market enterprise is an enterprise with paid in equity capital of less than the equivalent of USD 200,000.00.
Geographic Area and Sector Specific Allowances, Conditions and Exceptions The following allowances and conditions shall apply where relevant. Where the Employer does work which falls under the following headings, the Employer agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.
Blue-Pencilling If any court construes any of the Restrictive Covenants, or any part thereof, to be unenforceable because of the duration of such provision or the area covered thereby, such court shall have the power to reduce the duration or area of such provision and, in its reduced form, such provision shall then be enforceable and shall be enforced.
Time Off Between Shifts Failure to provide the minimum number of hours between the commencement of an employee's scheduled shift and the commencement of such employee's next scheduled shift shall result in payment of one and one-half (1½) times the employee's regular straight time hourly rate for only those hours which reduce the minimum hour period. Where the minimum period is reduced as a result of an approved change of shift(s) requested by the employee(s), such premium payment shall not apply. The minimum number of hours for purposes of this Article shall be determined locally and will be set out in the Local Provisions Appendix.
Tax Periods Beginning Before and Ending After the Closing Date The Company or the Purchaser shall prepare or cause to be prepared and file or cause to be filed any Returns of the Company for Tax periods that begin before the Closing Date and end after the Closing Date. To the extent such Taxes are not fully reserved for in the Company’s financial statements, the Sellers shall pay to the Company an amount equal to the unreserved portion of such Taxes that relates to the portion of the Tax period ending on the Closing Date. Such payment, if any, shall be paid by the Sellers within fifteen (15) days after receipt of written notice from the Company or the Purchaser that such Taxes were paid by the Company or the Purchaser for a period beginning prior to the Closing Date. For purposes of this Section, in the case of any Taxes that are imposed on a periodic basis and are payable for a Taxable period that includes (but does not end on) the Closing Date, the portion of such Tax that relates to the portion of such Tax period ending on the Closing Date shall (i) in the case of any Taxes other than Taxes based upon or related to income or receipts, be deemed to be the amount of such Tax for the entire Tax period multiplied by a fraction the numerator of which is the number of days in the Tax period ending on the Closing Date and the denominator of which is the number of days in the entire Tax period (the “Pro Rata Amount”), and (ii) in the case of any Tax based upon or related to income or receipts, be deemed equal to the amount that would be payable if the relevant Tax period ended on the Closing Date. The Sellers shall pay to the Company with the payment of any taxes due hereunder, the Sellers’ Pro Rata Amount of the costs and expenses incurred by the Purchaser or the Company in the preparation and filing of the Tax Returns. Any net operating losses or credits relating to a Tax period that begins before and ends after the Closing Date shall be taken into account as though the relevant Tax period ended on the Closing Date. All determinations necessary to give effect to the foregoing allocations shall be made in a reasonable manner as agreed to by the parties.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.