IDENTIFY AND PROTECT INSTREAM FLOWS Sample Clauses

IDENTIFY AND PROTECT INSTREAM FLOWS. Recovery cannot be accomplished without securing, protecting, and managing sufficient habitat to support self-sustaining populations of the endangered fishes. Identification and protection of instream flows are key elements in this process. The first step in instream-flow protection is to identify flow regimes needed by the fish. In the Recovery Program, determining flow needs is primarily the responsibility of the Service (in cooperation with other participants). Factors considered in determining flow needs include: flow effects on reproduction and recruitment; flow effects on food supplies and nonnative fishes; and interrelationships between flow and other habitat parameters believed to be important for the fish, such as channel structure, sediment transport, substrate characteristics, vegetative encroachment, and water temperature. Flow recommendations often are made in stages, with initial flow recommendations based on the best available scientific information, historic conditions, and extrapolation from similar reaches. Recommendations then are refined following additional field research. The contribution of tributaries to recovery was ranked by Xxxx and Xxxxxxxx (2001). A strategic plan was completed in 2003 that identified geomorphology research priorities to refine the flow recommendations and address the Recovery Goals (LaGory et al. 2003). Flow recommendations have been approved for reaches of the Colorado (Osmundson and Xxxxxxx 1991; XxXxx 2003), Yampa (Xxxxx and Xxxxx 1995; Xxxxx et al. 1999), Xxxxx (Xxxx et al. 2000), Gunnison (XxXxx 2003), and Xxxxxxxx (Xxxxx and Xxxxxxx 2003) xxxxxx. Flows in the Little Snake River after estimated future depletions were identified in the Yampa River Management Plan and Environmental Assessment (Xxxxx 2004). Interim flow recommendations for the White River were completed in 2004 (Xxxxxx et al. 2004) and will be reviewed in 2007. Flow recommendations for the Colorado River below the Green River are pending completion of the Aspinall Unit EIS. Flow recommendations for other rivers or river reaches will be developed as deemed necessary to achieve recovery. Flow protection mechanisms are organized according to their initial or dominant attribute. If a change in the ownership of a water right (by purchase, lease, etc.) is central to flow protection, then flow protection is placed under "Acquire." A change in water right ownership to protect flows will usually be accompanied by a legal proceeding to change the natu...
AutoNDA by SimpleDocs
IDENTIFY AND PROTECT INSTREAM FLOWS. Recovery cannot be accomplished without securing, protecting, and managing sufficient habitat to support self-sustaining populations of the endangered fishes. Identification and protection of instream flows are key elements in this process. The first step in instream-flow protection is to identify flow regimes needed by the fish. In the Recovery Program, determining flow needs is primarily the responsibility of the Service (in cooperation with other participants). Factors considered in determining flow needs include: flow effects on reproduction and recruitment; flow effects on food supplies and nonnative fishes; and interrelationships between flow and other habitat parameters believed to be important for the fish, such as channel structure, sediment transport, substrate characteristics, vegetative encroachment, and water temperature. Flow recommendations (for all or certain seasons) have been or are being developed for most river reaches targeted for recovery in the Upper Basin. Flow recommendations often are made in stages, with initial flow recommendations based on the best available scientific information, historic conditions, and extrapolation from similar reaches. Recommendations then are refined following additional field research. Downstream of Flaming Gorge Dam on the Green River and dams of the Aspinall Unit on the Gunnison River, test flows were provided while research was conducted to determine more precise flow recommendations. That research has been completed and final flow recommendations for the Green River downstream of Flaming Gorge Dam have been approved. Flow recommendations for the Gunnison River and Colorado River downstream of their confluence are in the review and revision process. Flow recommendations have been completed for the Colorado River upstream of the Gunnison River confluence to Rifle, Colorado, and for the Yampa River. Flow recommendations are being developed for the Little Snake, White and Duchesne rivers. A strategic plan is being developed to identify geomorphic research needed to refine the flow recommendations and address the Recovery Goals.

Related to IDENTIFY AND PROTECT INSTREAM FLOWS

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Identifying Information and Privacy NOTIFICATION (a) Identification Number(s). Every invoice or New York State Claim for Payment submitted to a New York State agency by a payee, for payment for the sale of goods or services or for transactions (e.g., leases, easements, licenses, etc.) related to real or personal property must include the payee's identification number. The number is any or all of the following: (i) the payee’s Federal employer identification number, (ii) the payee’s Federal social security number, and/or (iii) the payee’s Vendor Identification Number assigned by the Statewide Financial System. Failure to include such number or numbers may delay payment. Where the payee does not have such number or numbers, the payee, on its invoice or Claim for Payment, must give the reason or reasons why the payee does not have such number or numbers.

  • IDENTIFYING INFORMATION AND PRIVACY NOTIFICATION (a) FEDERAL EMPLOYER IDENTIFICATION NUMBER and/or FEDERAL SOCIAL SECURITY NUMBER. As a condition to NYSERDA’s obligation to pay any invoices submitted by Contractor pursuant to this Agreement, Contractor shall provide to NYSERDA its Federal employer identification number or Federal social security number, or both such numbers when the Contractor has both such numbers. Where the Contractor does not have such number or numbers, the Contractor must give the reason or reasons why the payee does not have such number or numbers.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!