Hostage situations Sample Clauses

Hostage situations. This should include: • the identified actions to be taken in the event of a hostage situation.

Related to Hostage situations

  • Emergency Situations If the condition is an emergency, this will be communicated to the Contractor with the request that corrections are to be accomplished immediately. The Contractor shall respond to the notice in emergency situations within twenty-four hours. If the Contractor fails to respond within this time limit, the Owner may correct the defect and charge the Contractor for the Work. If it is determined the complaint is not the responsibility of the Contractor, the Contractor shall be promptly paid for the cost of the corrective work. The Contractor shall give notice in writing to the Owner when corrections have been completed.

  • Special Situations XXXXXXX BENEFICIARY agrees to inform AGENCY within one (1) business day of any circumstances or events which may reasonably be considered to jeopardize its capability to continue to meet its obligations under the terms of this Agreement. Incidents may include, but are not limited to, those resulting in injury, media coverage or public reaction that may have an impact on the AGENCY’S or GRANTEE BENEFICIARY’S ability to protect and serve its participants, or other significant effect on the AGENCY or GRANTEE BENEFICIARY. Incidents shall be reported to the designated AGENCY contact below by phone or email only. Incident report information shall not include any identifying information of the participant.

  • Emergency Situation In the event of an emergency situation beyond our reasonable control, such as an "act of God," war, fire, or natural disaster, services involving your account could be available only in a modified or reduced form or could be entirely unavailable. Unless expressly prohibited by applicable law, you agree that we will have no liability to you for such modification, reduction, or unavailability of services caused by an emergency situation.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Summer Session A. All ASEs employed in the Summer Session shall receive the same general range adjustment as ASEs received in the preceding Fall term. B. The following articles apply to ASEs who are employed in the summer session: Recognition, Wages (range adjustment only), DCP, Travel, Health and Safety, Leaves, Holidays, Duration, Workspace and Instructional Support, Parking, Grievance and Arbitration, Waiver, Management and Academic Rights, No Strikes, Non-Discrimination, Union Access and Rights, Union Security, Discipline and Dismissal, Emergency Layoff, Employment Files and Evaluations, Definitions, Severability, Labor-Management Meetings, and Classifications. C. The remainder of the articles in the agreement does not apply to ASEs who are employed in the summer session. D. The topic of Summer Session, and effects of changes on terms and conditions of employment for ASEs employed in Summer Session, shall be reopened for bargaining commencing no later than January 2, 2001.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity 1.1.02 Identify at least one individual to act as the program contact in the following areas: 1. Immunization Program Manager;

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.