Final Project Geographic Information System (GIS) files Sample Clauses

Final Project Geographic Information System (GIS) files. As appropriate to project deliverables, final updated project boundaries, footprints, and features must be provided to the Grants Office no later than the submission of the final Performance Outcome Report. Where more detailed project features are developed (for example, during the engineering and design phase if additional features are identified within the project boundary), or project boundaries change during project planning or implementation, these updated boundaries and the appropriate feature attributes must be provided. These files must be geospatial in nature (acceptable formats are SHP, GDB, or DGN) and contain projection information and complete ISO-compliant metadata. SUPPLEMENTAL CONSTRUCTION TERMS These supplemental construction terms are incorporated in and made part of this award in anticipation of future construction under this program. These supplemental terms remain effective throughout the period of performance of the award, or the estimated useful life of project property. As projects are identified and approved through amendment to this program award, additional conditions specific to an individual project may be added. SC-1. Administration, Operation, and Maintenance Pasco County must administer, operate, and maintain the project for its estimated useful life in the same manner in which it operates and maintains similar facilities and equipment, and in accordance with State and local standards, laws, and regulations. SC-2. Acquisition of Real Property Unless specifically described in the Award scope of work, the acquisition of real property is not an allowable expense. In the event that acquisition of real property or an interest in real property is identified as necessary to achieve the objectives of the Award, the Recipient shall contact the Council Grants Office for instructions prior to expending any funds related to the acquisition of real property.
AutoNDA by SimpleDocs
Final Project Geographic Information System (GIS) files. As appropriate to project deliverables, final updated project boundaries, footprints, and features must be provided to the Grants Office no later than the submission of the final Performance Outcome Report. Where more detailed project features are developed (for example, during the engineering and design phase if additional features are identified within the project boundary), or project boundaries change during project planning or implementation, these updated boundaries and the appropriate feature attributes must be provided. These files must be geospatial in nature (acceptable formats are SHP, GDB, or DGN) and contain projection information and complete ISO-compliant metadata.

Related to Final Project Geographic Information System (GIS) files

  • Project Information Except for confidential information designated by the City as information not to be shared, Consultant agrees to share Project information with, and to fully cooperate with, those corporations, firms, contractors, public utilities, governmental entities, and persons involved in or associated with the Project. No information, news, or press releases related to the Project, whether made to representatives of newspapers, magazines, or television and radio stations, shall be made without the written authorization of the City’s Project Manager.

  • Voice Information Service Traffic 5.1 For purposes of this Section 5, (a) Voice Information Service means a service that provides [i] recorded voice announcement information or [ii] a vocal discussion program open to the public, and (b) Voice Information Service Traffic means intraLATA switched voice traffic, delivered to a Voice Information Service. Voice Information Service Traffic does not include any form of Internet Traffic. Voice Information Service Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information Service Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment.

  • PUBLIC WORKS AND BUILDING SERVICES CONTRACTS Work being done under a resulting Authorized User Agreement may be subject to the prevailing wage rate provisions of the New York State Labor Law. Such work will be identified by the Authorized User within the RFQ. See “Prevailing Wage Rates – Public Works and Building Services Contracts’ in Appendix B, Clause 10, OGS General Specifications. Any federal or State determination of a violation of any public works law or regulation, or labor law or regulation, or any OSHA violation deemed "serious or willful" may be grounds for a determination of vendor non-responsibility and rejection of proposal. The Prevailing Wage Case Number for this Contract is PRC# 2014011745. The Prevailing Wage Rates for various occupations and General Provisions of Laws Covering Workers on Article 8 Public Work Contract can be accessed at the following NYS Department of Labor website: xxxxx://xxxxxxxxxxxx.xxxxx.xx.xxx/wpp/xxxxXxxxXxxxxxx.xx?method=showIt  Insert PRC# 2014011745 in the box provided and click Submit.  Click Wage Schedule located underneath the main header of this page. The PDF file may be searched to obtain the Prevailing Wage Rate for a specific occupation. SHORT TERM EXTENSION In the event a replacement Contract has not been issued, any Contract let and awarded hereunder by the State, may be extended unilaterally by the State for an additional period of up to 3 months upon notice to the Contractor with the same terms and conditions as the original Contract including, but not limited to, prices and delivery requirements. With the concurrence of the Contractor, the extension may be for a period of up to 6 months in lieu of 3 months. However, this extension terminates should the replacement Contract be issued in the interim. PROCUREMENT INSTRUCTIONS Authorized Users should refer to the documents attached as Appendix G – Processes and Forms Templates for specific instructions on the usage of this Contract. OGS reserves the right to unilaterally make revisions, changes, additions and/or updates to the documents attached as Appendix G - Processes and Forms Templates without processing a formal amendment and/or modification. SPECIFICATIONS During the term of the Contract, the Authorized User may request Product specifications for particular items that have been included by the Contractor in its Pricing Pages. These specifications will be provided by the Contractor at no cost.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • - CLEC INFORMATION CLEC agrees to work with Qwest in good faith to promptly complete or update, as applicable, Qwest’s “New Customer Questionnaire” to the extent that CLEC has not already done so, and CLEC shall hold Qwest harmless for any damages to or claims from CLEC caused by CLEC’s failure to promptly complete or update the questionnaire.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Time is Money Join Law Insider Premium to draft better contracts faster.