HCE-Rockfort and PPO Sample Clauses

HCE-Rockfort and PPO. The authorized capital stock of HCE-Rockfort consists of 200 shares of capital stock, each with no par value, of which one (1) share is issued and outstanding. The HCE-Rockfort Shares constitute all of the issued and outstanding Equity Interests in HCE-Rockfort. The authorized capital stock of PPO consists of 200 shares, each with no par value, of which two (2) shares are issued and outstanding. The PPO Shares constitute all of the issued and outstanding Equity Interests in PPO.
AutoNDA by SimpleDocs

Related to HCE-Rockfort and PPO

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

  • Course Curriculum, Instruction, and Grading X. Xxxx College courses offered as dual credit, regardless of where they are taught, follow the same syllabus, course outline, textbook, grading method, and other academic policies as the courses outlined in the Hill College catalog. B. Approved courses being taught for dual credit must follow the approved master syllabus of the discipline and of Hill College. C. Textbooks should be identical to those approved for use by Hill College. Should an instructor propose an alternative textbook, the textbook must be approved in advance by the appropriate instructional department of Hill College and the Vice President of Instruction. Other instructional materials for dual credit/concurrent courses must be identical or at an equivalent level to materials used by Hill College. D. Courses which result in college‐level credit will follow the standard grading practices of Hill College, as identified by college policy and as identified in the appropriately approved course syllabus. The grades used in college records are A (excellent), B (above average), C (average), D (below average), F (failure), I (incomplete), W (withdrawn), WC (withdrawn COVID). The lowest passing grade is D. Grade point averages are computed by assigning values to each grade as follows: A = 4 points, B = 3 points, C = 2 points, D = 1 point, and F = 0 points. Grading criteria may be devised by Hill College and the ISD to allow faculty the opportunity to award high school credit only or high school and college credit depending upon student performance. E. Faculty, who are responsible for teaching dual credit/concurrent classes, are responsible for keeping appropriate records, certifying census date rosters, providing interim grade reports, certifying final grade reports at the end of the semester, certifying attendance, and providing other reports and information as may be required by Hill College and/or the School District.

  • Cloud Computing State Risk and Authorization Management Program In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.0593, Contractor acknowledges and agrees that, if providing cloud computing services for System Agency, Contractor must comply with the requirements of the state risk and authorization management program and that System Agency may not enter or renew a contract with Contractor to purchase cloud computing services for the agency that are subject to the state risk and authorization management program unless Contractor demonstrates compliance with program requirements. If providing cloud computing services for System Agency that are subject to the state risk and authorization management program, Contractor certifies it will maintain program compliance and certification throughout the term of the Contract.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • SMALL BUSINESS PARTICIPATION AND DVBE PARTICIPATION REPORTING REQUIREMENTS a. If for this Contract Contractor made a commitment to achieve small business participation, then Contractor must within 60 days of receiving final payment under this Contract (or within such other time period as may be specified elsewhere in this Contract) report to the awarding department the actual percentage of small business participation that was achieved. (Govt. Code § 14841.) b. If for this Contract Contractor made a commitment to achieve disabled veteran business enterprise (DVBE) participation, then Contractor must within 60 days of receiving final payment under this Contract (or within such other time period as may be specified elsewhere in this Contract) certify in a report to the awarding department: (1) the total amount the prime Contractor received under the Contract; (2) the name and address of the DVBE(s) that participated in the performance of the Contract; (3) the amount each DVBE received from the prime Contractor; (4) that all payments under the Contract have been made to the DVBE; and (5) the actual percentage of DVBE participation that was achieved. A person or entity that knowingly provides false information shall be subject to a civil penalty for each violation. (Mil. & Vets. Code § 999.5(d); Govt. Code § 14841.)

  • CERTIFICATION REGARDING BOYCOTTING CERTAIN ENERGY COMPANIES (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree, when it is applicable, to the following required by Texas law as of September 1, 2021: If (a) company is not a sole proprietorship; (b) company has ten (10) or more full-time employees; and (c) this contract has a value of $100,000 or more that is to be paid wholly or partly from public funds, the following certification shall apply; otherwise, this certification is not required. Pursuant to Tex. Gov’t Code Ch. 2274 of SB 13 (87th session), the company hereby certifies and verifies that the company, or any wholly owned subsidiary, majority-owned subsidiary, parent company, or affiliate of these entities or business associations, if any, does not boycott energy companies and will not boycott energy companies during the term of the contract. For purposes of this contract, the term “company” shall mean an organization, association, corporation, partnership, joint venture, limited partnership, limited liability partnership, or limited liability company, that exists to make a profit. The term “boycott energy company” shall mean “without an ordinary business purpose, refusing to deal with, terminating business activities with, or otherwise taking any action intended to penalize, inflict economic harm on, or limit commercial relations with a company because the company (a) engages in the exploration, production, utilization, transportation, sale, or manufacturing of fossil fuel-based energy and does not commit or pledge to meet environmental standards beyond applicable federal and state law, or (b) does business with a company described by paragraph (a).” See Tex. Gov’t Code § 809.001(1).

  • Reactive Power and Primary Frequency Response 9.6.1 Power Factor Design Criteria

  • PARTICIPATION, CONTRACT ACCESS, AND PARTICIPATING ENTITY REQUIREMENTS A. PARTICIPATION. Sourcewell’s cooperative contracts are available and open to public and nonprofit entities across the United States and Canada; such as federal, state/province, municipal, K-12 and higher education, tribal government, and other public entities. The benefits of this Contract should be available to all Participating Entities that can legally access the Equipment, Products, or Services under this Contract. A Participating Entity’s authority to access this Contract is determined through its cooperative purchasing, interlocal, or joint powers laws. Any entity accessing benefits of this Contract will be considered a Service Member of Sourcewell during such time of access. Supplier understands that a Participating Entity’s use of this Contract is at the Participating Entity’s sole convenience and Participating Entities reserve the right to obtain like Equipment, Products, or Services from any other source. Supplier is responsible for familiarizing its sales and service forces with Sourcewell contract use eligibility requirements and documentation and will encourage potential participating entities to join Sourcewell. Sourcewell reserves the right to add and remove Participating Entities to its roster during the term of this Contract.

  • Support and Counselling The Employer and the Union recognize that, where preventative measures have failed to prevent violent incidents, counselling and support must be available to help victims recover from such incidents.

  • Environmental Management (a) The Operator must, prior to the commencement of any Train Services (including any new or varied Train Services): (i) cause a suitably qualified person reasonably acceptable to both Parties to prepare a report (“Environmental Investigation and Risk Management Report”) containing an environmental investigation component and an environmental risk management component which respectively identify: (A) possible risks of Environmental Harm arising out of the proposed use of the Nominated Network by the Operator, including risks associated with those matters identified in Part 3 of Schedule 6; and (B) the manner in which the Operator proposes to address the possible risks of Environmental Harm identified in the Environmental Investigation and Risk Management Report as well as the roles and responsibilities, including financial responsibility, for the control measures proposed and an audit regime, provided that if the Operator has an existing Environmental Management System it proposes to use in connection with the proposed Train Services on the Nominated Network, the Environmental Investigation and Risk Management Report should also detail the extent to which the Operator believes its existing Environmental Management System addresses the risks identified in the Environmental Investigation and Risk Management Report; and (ii) provide a copy of the Environmental Investigation and Risk Management Report to Aurizon Network for its consideration and, if requested by Aurizon Network, a copy of the relevant parts of the Operator’s existing Environmental Management System referred to in the Environmental Investigation and Risk Management Report. (b) If the Environmental Investigation and Risk Management Report discloses areas of risk which, in the reasonable opinion of Aurizon Network, cannot be adequately managed by the proposals set out in the Environmental Investigation and Risk Management Report or, in the reasonable opinion of Aurizon Network, fails to identify and adequately deal with additional relevant environmental risks, then Aurizon Network may give notice to that effect to the Operator within thirty (30) days after the date on which the Environmental Investigation and Risk Management Report was received by Aurizon Network (or such other period as the Parties, acting reasonably, may agree), detailing the risks not so adequately managed or not so identified or adequately dealt with. If Aurizon Network does not give such notice, the Environmental Investigation and Risk Management Report, subject to Clause 9.1(k), shall be included in Part 1 of Schedule 9 and amendments made to this Agreement [(including variations to the Base Access Charges)] if applicable. [Bracketed text is only included where Operator pays non-TOP Access Charges] (c) If Aurizon Network gives notice pursuant to Clause 9.1 (b) the Operator may respond, by a date agreed by the Parties, with a written proposal which demonstrates how the Operator proposes to manage those risks (“Operator’s Proposal”). The Operator’s Proposal must: (i) contain an investigation of the areas of risk and/or additional relevant environmental risks referred to in Clause 9.1(b); (A) specify risk abatement or attenuation measures which the Operator proposes to undertake in relation to them; and/or (B) specify how the Access Charges might contain a component reflecting the cost to Aurizon Network of assuming all or some portion of the risk; (ii) in relation to paragraph (ii)(A) specify a timeframe for implementation of those measures; and (iii) specify details of any public consultation the Operator proposes to undertake in connection with the implementation of any such measures. (d) Aurizon Network may, acting reasonably, accept or reject all or part of the Operator’s Proposal. (e) If Aurizon Network accepts the Operator’s Proposal, then it will be incorporated into and form part of the Environmental Investigation and Risk Management Report which, subject to Clause 9.1(k), shall be included in Part 1 of Schedule 9 and amendments made to the Agreement [(including variations to the Base Access Charges)] if applicable. [Bracketed text is only included where Operator pays non-TOP Access Charges] (f) If the Operator fails to submit to Aurizon Network an Operator’s Proposal by the date agreed by the Parties or if Aurizon Network rejects all or part of the Operator’s Proposal, Aurizon Network may advise the Operator of the risks not adequately managed or not identified or adequately dealt with and then either Party may refer the issue of whether the Environmental Investigation and Risk Management Report and/or the Operator’s Proposal does or does not adequately manage or does or does not identify or adequately deal with the relevant environmental risks to an expert for determination in accordance with Clause 18.3. (g) If the expert determines that the Environmental Investigation and Risk Management Report and/or Operator’s Proposal does adequately manage the risks or identifies and adequately deals with the risks, then the Environmental Investigation and Risk Management Report as modified by the Operator’s Proposal (if applicable) will, subject to Clause 9.1(k), be accepted and included in Part 1 of Schedule 9 and amendments made to this Agreement [(including variations to the Base Access Charges)] if applicable. [Bracketed text is only included where Operator pays non-TOP Access Charges] (h) If the expert determines that the Environmental Investigation and Risk Management Report and/or Operator’s Proposal does not adequately manage the risks or does not identify and adequately deal with the risks, then provided the Operator amends the Environmental Investigation and Risk Management Report in accordance with the expert’s determination and/or recommendations within the time frame specified by the expert, the Environmental Investigation and Risk Management Report as amended will, subject to Clause 9.1(k), be accepted and included in Part 1 of Schedule 9 and amendments made to the Agreement [(including variations to the Base Access Charges)] if applicable. [Bracketed text is only included where Operator pays non-TOP Access Charges] (i) If the expert determines that the Environmental Investigation and Risk Management Report and/or Operator’s Proposal does not adequately manage the risks or does not identify and adequately deal with the risks and the Operator fails to amend the Environmental Investigation and Risk Management Report in accordance with the expert’s determination and/or recommendations within the time frame specified by the expert, Aurizon Network may terminate this Agreement by written notice to the Operator and the End User. (j) The Parties agree to implement the determination of the expert. (k) If: (i) an Environmental Investigation and Risk Management Report is included in Part 1 of Schedule 9; and (ii) amendments (if any) are made to this Agreement as a result of or in connection with that inclusion of the Environmental Investigation and Risk Management Report, then the commencement of the amendment of this Agreement to include the Environmental Investigation and Risk Management Report and those amendments is subject to and conditional upon the Operator being notified by Aurizon Network that all necessary amendments (if any) to the End User Access Agreement (including variations to the amounts payable by the End User) have been made in respect of such matters and any relevant nomination of the Operator by the End User in accordance with the End User Access Agreement has, if necessary, been varied.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!