Financial Framework 1. In accordance with Article 2.1 of Protocol 38c, the total amount of the financial contribution is € 1548.1 million in annual tranches of € 221.16 million over the period running from 1 May 2014 to 30 April 2021, inclusive.
Legal Framework 1. This programme agreement shall be read in conjunction with the following documents which, together with this programme agreement, constitute the legal framework of the EEA Financial Mechanism 2014-2021:
NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
Framework This Agreement establishes a framework that will enable Red Hat to provide Software and Services to Client. “Software” means Red Hat Enterprise Linux, JBoss Enterprise Middleware and other software programs branded by Red Hat, its Affiliates and/or third parties including all modifications, additions or further enhancements delivered by Red Hat. The specific services (the “Services”) and/or Software that Red Hat will provide to Client will be described in an Order Form, signed by the parties or otherwise accepted by Red Hat, which may consist of (a) one or more mutually agreed order forms, statements of work, work orders or similar transaction documents, or (b) an order placed by Client through Red Hat's online store accessible from a Red Hat website. The parties agree that the terms of this Agreement will govern all purchases and use by Client of Software and Services unless otherwise agreed by the parties in writing.
Framework Management Structure 2.1.1 The Supplier shall provide a suitably qualified nominated contact (the “Supplier Framework Manager”) who will take overall responsibility for delivering the Goods and/or Services required within this Framework Agreement, as well as a suitably qualified deputy to act in their absence.
Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp. The origin of the angles of geometric visibility is the perimeter of the projection of the illuminating surface on a transverse plane tangent to the foremost part of the lens of the headlamp.
DUŠEVNÍ VLASTNICTVÍ The Institution acknowledges and agrees that the Sponsor shall have exclusive ownership rights to all Poskytovatel uznává a souhlasí, že Zadavatel bude mít výhradní vlastnická práva ke všem Study Data, improvements, developments, discoveries, inventions, work, know-how and other rights (whether or not patentable), created, developed, and/or reduced to practice as a result of or in connection with the conduct of the Study and/or the use of the Study Drug or the Confidential Information, together with all intellectual property rights relating thereto (“Intellectual Property”). The Institution shall promptly disclose in writing to PSI and the Sponsor all Intellectual Property made by the Institution, the Investigator and/or the Study Personnel. At the Sponsor's request, the Institution shall cause all rights titles and interests in and to any such Intellectual Property to be assigned to the Sponsor without additional compensation and provide reasonable assistance to obtain patents, including causing the execution of any invention assignment or other documents. Studijním údajům, vylepšením, na vývoj, k objevům, vynálezům, dílům, know-how a dalším právům (ať už patentovatelným či nikoli), vytvořeným, vyvinutým, a/nebo uvedeným do praxe v důsledku nebo v souvislosti s prováděním Studie, a/nebo používáním Studijního léku nebo Důvěrných informací společně s právy duševního vlastnictví s nimi souvisejícími (dále jen „Duševní vlastnictví“). Poskytovatel bude neprodleně písemně informovat PSI a Zadavatele o veškerém Duševním vlastnictví vytvořeném Poskytovatelem, Hlavním zkoušejícím a/nebo Studijním personálem. Na žádost Zadavatele zajistí Poskytovatel převod veškerých práv a zájmů týkajících se Duševního vlastnictví na Zadavatele bez další odměny a poskytne přiměřenou součinnost k získání patentu včetně zajištění podpisu dokumentů k převodu objevu nebo jiných dokumentů.
Program Monitoring and Evaluation (c) The Recipient shall prepare, or cause to be prepared, and furnish to the Association not later than six months after the Closing Date, a report of such scope and in such detail as the Association shall reasonably request, on the execution of the Program, the performance by the Recipient and the Association of their respective obligations under the Legal Agreements and the accomplishment of the purposes of the Financing.”
Aim The competitiveness of companies within the commercial and service industries is becoming increasingly dependent on qualified employees. In order for the business to develop, continuous and systematic continuing education of the employees is necessary. Competence is the ability to handle an assignment. In order to handle an assignment, an individual needs several characteristics. Competence is a complex term that comprises a number of human resources. - Knowledge Knowing facts and methods. - Abilities Being able to do, handle tools - Contacts Social abilities, contact network, influence - Attitude/Values Wanting to do, deeming correct, taking responsibility - Experience Learning from mistakes and successes - Supervision/Leadership Continuing education may to a great extent be carried out directly in the work place through a flexible work organisation where theories meet practice. Continuing education of the company and its employees creates the preconditions for profitability and greater security of employment.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.