Description of Funding Techniques 6.2.1 The following are terms under which standard funding techniques shall be implemented for all transfers of funds to which the funding technique is applied in section 6.3.2 of this Agreement. Funding Technique Name Description Actual Clearance, ZBA - ACH The State shall request funds such that they are deposited by ACH in a State account on the settlement date of payments issued by the State. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be for the amount of funds that clear the State's account on the settlement date. This funding technique is interest neutral. Actual Clearance, ZBA - Same Day Payment The State shall request funds the same day it pays out funds, in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. A Federal agency will deposit funds in a State account the same day as requested. The amount of the request shall be for the amount of funds that clear the State's account that day. This funding technique is interest neutral. Average Clearance The State shall request funds such that they are deposited by ACH on the dollar- weighted average day of clearance for the disbursement, in accordance with the clearance pattern specified in Exhibit II. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be for the exact amount of that disbursement. This funding technique is interest neutral.
DESCRIPTION OF THE WORKS Employer’s objectives The scope of the request includes the recommended monthly preventative, quarterly and annual maintenance that needs to be conducted to ensure all areas of the airports are lit and compliant. It will include all the other adhoc request (labor rates) where required upon approval by the maintenance manager. The compliance will be based on the following: • Maintenance as per OEM • Organizational guidelines and codes of practice • OHS act 93 – Occupational Health and Safety • ISO 9001 – Quality management • ISO 14001 – Environmental Management • SANS 10142 – The wiring code • ICAO Annex 14 chapter 5. • ACSA Maintenance Procedure D060 024M This scope entails the maintenance and repair of LV systems and all lighting at Costal airports. In brief, maintenance involves servicing, repairs, and testing of lights and LV systems. This involves carrying out maintenance on electrical equipment such as LV DBs, electrical plant, wiring enclosures and luminaires and associated control systems, portable appliances and other specific electrical equipment, in order to minimize downtime, and ensure that the equipment performs at optimal levels and functions to specification at the specified areas. Servicing - performing routine preventive maintenance as prescribed by the original equipment manufacturer (OEM), ACSA’s planned maintenance routines, and applicable legal and design standards. Repairs – responding to breakdowns, callouts and restoring the equipment to safe working conditions on an as and when basis. Advisory – telephonically guiding airport electricians under emergency situations to ensure systems are safely shutdown or returned to service within stringent times. System Performance Test – Testing equipment performance against the OEM, ACSA, and statutory requirements for compliance and return to service purposes. Extent of the works The Contractor will be fully responsible for meeting all requirements in this document regarding the Works. For each piece of equipment, all work will be carried out to standards as required by the Original Equipment Manufacturer (OEM) as well as any applicable governing law and/or regulations. Where OEM standards differ from those required by this document the more stringent requirement shall apply. The Contractor will be fully responsible for obtaining (and keeping up to date with) said requirements. The proposed minimum scheduled maintenance activities can be found in annex H.
Description of Projects Services
DESCRIPTION OF PROJECT The project for which PSP agrees to provide Professional Services is generally described as [Insert Brief Description of Project] (hereinafter referred to as the “Project”), as further described in Exhibit A, PSP’s Proposal dated [Insert Date and Proposal Number if provided], attached hereto and incorporated herein for all purposes and consisting of [Text] (Insert Number) pages.
DESCRIPTION OF CONTRACT MODIFICATION This contract modification is made in accordance with Exhibit E-Revised-1, Contractual Terms and Conditions, Section 22. CHANGES, to be made part hereof for all pertinent purposes. The changes are as follows:
Description of Appropriate Unit For purposes of this Agreement, the appropriate unit shall mean all Education Assistant/LPN/ARN employees employed by the School District excluding the following: confidential employees, supervisory employees, essential employees, part-time employees whose services do not exceed 14 hours per week or 35% of normal work week, employees who hold positions of a temporary or seasonal character for a period not in excess of 67 working days in any calendar year, and emergency employees.
Description of Program This Agreement is established to facilitate an exchange program at the partner institution with students, faculty and researchers from each institution (collectively, the “Exchange Program”). The student exchange program enables students from one university to take classes at the other university while working towards a degree at the university where he or she is formally enrolled (individually, the “Student Exchange”) and to encourage faculty members and researchers from each university to visit the other university and engage in certain activities (individually, the “Faculty/Researcher Exchange”). [Substitute the purpose of your program if different.] For purposes of this Agreement, with respect to the Student Exchange, the term “Home University” shall mean the institution in which a student is formally enrolled as a degree candidate, and “Host University” shall mean the institution that has agreed to receive students from the Home University for a period of study. With respect to the Faculty/Researcher Exchange, as used herein, “Home University” shall mean the university where the faculty member and/or researcher is normally employed, and “Host University” shall mean the university that the faculty member and/or researcher is visiting.
Description of Work (a) that has been omitted or
Description of Goods As ordered by each JBE under a Participating Addendum, Contractor shall provide to the JBEs the following products, goods, materials, and supplies (“Goods”) free and clear of all liens, claims, and encumbrances, and in accordance with this Agreement:
Topic Description Licensee Responsibilities Licensee must: Take appropriate steps to ensure the security, integrity, and confidentiality of Confidential Information and must comply with all relevant applicable laws and regulations, including laws protecting borrower privacy. Not disclose Confidential Information to third parties, without Xxxxxx Mae’s prior written approval, except on a need‐to‐know basis to Licensee’s partners, Topic Description affiliates, officers, employees, directors, contractors, counsels, agents or representatives, provided they are subject to confidentiality obligations at least as stringent as those set forth in this Section A3. Not use Confidential Information in any way that could be viewed as a conflict of interest, a breach of confidentiality or privacy, or the gaining of an unfair advantage from the relationship with Xxxxxx Xxx. Implement commercially reasonable measures meeting or exceeding industry standards to ensure the security, integrity, and confidentiality of Confidential Information, including using industry‐standard encryption for data in transit and virus checking programs designed to prevent the transmission and receipt of viruses and other malicious code, implementing appropriate disaster recovery and back‐up procedures, implementing appropriate procedures to prevent disclosure of data and other materials to a party other than the intended recipient, and employing methods for securely disposing or destroying such information. These measures must meet, at least, the same level of protection that the Receiving Party seeks for its own information of a similar nature. Licensee must collaborate with Xxxxxx Mae in assessing the sufficiency of these measures and Licensee’s information security program, upon reasonable request. Instruct its Related Parties who may receive Confidential Information about the requirements of this Section A3, and the processes and procedures necessary to comply with them. Comply with all reasonable security policies and procedures required by Xxxxxx Xxx related to the access and use of Xxxxxx Mae’s systems or any Licensed Materials. Not transmit to Xxxxxx Mae’s systems any materials that contain bugs, viruses, worms or other functions, routines, devices or instructions which may create any unauthorized access or damage to, or interruption in the functioning of, the Licensed Application or Xxxxxx Mae’s systems. Restrictive Legends Licensee must abide by and reproduce and include any restrictive legend or proprietary rights notice that appears in or on any Confidential Information of Xxxxxx Xxx or any Third‐Party Licensor (or other third‐party owner) that it is authorized to reproduce. Licensee also agrees that it will not remove, alter, cover or distort any trademark, trade name, copyright or other proprietary rights notices, legends, symbols or labels appearing on or in any Confidential Information of Xxxxxx Mae or any Third‐Party Licensor (or other third‐party owner). Required Actions in Case of Data Breach Licensee must address any Data Breach with prompt and effective corrective action, including cooperation with Xxxxxx Xxx in the investigation and remediation of such Data Breach, as well as prompt disclosure and notification where legally required; and Licensee must promptly notify Xxxxxx Mae of any Data Breach in writing ‐‐ at xxxxxxx_xxxxxxxxxxxx@xxxxxxxxx.xxx ‐‐ and must take all steps reasonably requested by Xxxxxx Xxx to mitigate the consequences of such Data Breach.