Habitat Corridors and Recognised Habitat Sample Clauses

Habitat Corridors and Recognised Habitat. Wildlife movement allows migration, dispersal, interbreeding and recolonisation of fauna species to occur, improving long-term viability of the species and local populations. Wildlife movement also facilitates plant pollen and seed dispersal, thus enhancing the viability of plant populations. Continuous Habitat Corridors are often preferable, but discontinuous ‘stepping stone’ corridors still contribute significantly to fauna movement and can be improved through habitat enhancement and plantings of local native species. This part refers to land identified in the ‘Biodiversity Habitat Corridor’ Layer in the DCP, accessible on Council’s mapping website. Map Configuration Planning Layer Biodiversity Habitat Corridor Definitions are included at the end of this DCP. (a) To ensure development contributes to the landscape character of the area. (b) To enhance planted native vegetation and the ecological functions of habitat corridors. (c) To reconstruct habitat in non-vegetated areas of designated wildlife corridors that will as far as possible, represent the combination of plant species and vegetation structure of the original community. (d) To reduce the adverse impacts of light pollution on local fauna.
AutoNDA by SimpleDocs

Related to Habitat Corridors and Recognised Habitat

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • RELATIONSHIP WITH DIRECTORS Directors, officers and employees of the Advisor or an Affiliate of the Advisor may serve as Directors, officers or employees of the Company, except that no director, officer or employee of the Advisor or its Affiliates who also is a Director shall receive any compensation from the Company for serving as a Director other than reasonable reimbursement for travel and related expenses incurred in attending meetings of the Board.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Plagiarism The appropriation of another person's ideas, processes, results, or words without giving appropriate credit.

  • Workplace Violence (a) It is recognized that at certain worksites or in certain work situations employees may be at risk of physical violence or verbal abuse from clients, persons in care or custody, or the public. (b) Where such potential exists: (1) employees at those worksites or in those work situations shall receive training in the recognition and management of such incidents; (2) physical and procedural measures for the protection of employees, applicable to those worksites or work situations, shall be implemented. (c) The Permanent Occupational Health and Safety Committee shall be consulted regarding the curriculum of training and the applicable physical and procedural measures referred to in (b) above. (d) The Permanent Joint Occupational Health and Safety Committee shall jointly develop a new or approve an existing training package on risk assessment. (e) Employees shall be informed concerning the potential for physical violence or verbal abuse from clients, a student, instructors or other members of the public, subject to statutory limitation. (f) Immediate critical incident stress debriefing and post traumatic counselling shall be made available for employees who have suffered as a result of violence. Leave required to attend such debriefing or counselling sessions will be without loss of pay.

  • WORKPLACE FLEXIBILITY The employer must ensure that any Individual Flexibility Agreement (IFA) is genuinely agreed to by the employer and the employee and result in the employee being better off overall at the time the IFA is made than the employee would have been if no IFA had been agreed to. 8.1 Notwithstanding any other provision of the Agreement, the employer and an individual employee may agree to vary the application of certain terms of the Agreement to meet the genuine individual needs of the employer and the individual employee. The terms the employer and the individual employee may agree to vary are the application of those permitted under Section 172 of the FW Act, and relates only to:- 8.1.1 arrangements for when work is performed; 8.1.2 salary sacrifice arrangements; 8.1.3 reduction in ordinary hours; and 8.1.4 are not unlawful terms under Section 194 of the FW Act. 8.2 The employer and the individual employee must have genuinely made the IFA without coercion or duress. An IFA can only be entered into after the individual employee has commenced employment with the employer. 8.3 The IFA between the employer and the individual employee must: 8.3.1 be confined to a variation in the application of one or more of the terms listed in Clause 8.1; and 8.4 The IFA between the employer and the individual employee must also: 8.4.1 be in writing, name the parties to the IFA and be signed by the employer and the individual employee and, if the employee is under eighteen (18) years of age, the employee’s parent or guardian; 8.4.2 state each term of the Agreement that the employer and the individual employee have agreed to vary; 8.4.3 detail how the application of each term has been varied by agreement between the employer and the individual employee;

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Volunteer Peer Assistants 1. Up to eight (8)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!