Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements
Wire Unbundled DS1 Digital Loop This is a designed 4-wire Loop that is provisioned according to industry standards for DS1 or Primary Rate ISDN services and will come standard with a test point, OC, and a DLR. A DS1 Loop may be provisioned over a variety of loop transmission technologies including copper, HDSL-based technology or fiber optic transport systems. It will include a 4-Wire DS1 Network Interface at the End User’s location.
MWBE Utilization Plan A. In accordance with 5 NYCRR § 142.4, Bidders are required to submit a completed Utilization Plan on Form MWBE 100 with their bid. B. The Utilization Plan shall list the MWBEs the Bidder intends to use to perform the Contract, a description of the Contract scope of work the Bidder intends the MWBE to perform to meet the goals on the Contract, and the estimated or, if known, actual dollar amounts to be paid to an MWBE. By signing the Utilization Plan, the Bidder acknowledges that making false representations or including information evidencing a lack of good faith as part of, or in conjunction with, the submission of a Utilization Plan is prohibited by law and may result in penalties including, but not limited to, termination of a contract for cause, loss of eligibility to submit future bids, and/or withholding of payments. Any modifications or changes to the agreed participation by New York State Certified MWBEs after the Contract award and during the term of the Contract must be reported on a revised MWBE Utilization Plan and submitted to OGS. C. By entering into the Contract, Bidder/Contractor understands that only sums paid to MWBEs for the performance of a commercially useful function, as that term is defined in 5 NYCRR § 140.1, may be applied towards the achievement of the applicable MWBE participation goal. When an MWBE is serving as a broker on the Contract, only 25 percent of all sums paid to a broker shall be deemed to represent the commercially useful function performed by the MWBE. D. OGS will review the submitted MWBE Utilization Plan and advise the Bidder of OGS acceptance or issue a notice of deficiency within 30 days of receipt. E. If a notice of deficiency is issued; Bidder agrees that it shall respond to the notice of deficiency, within 7 business days of receipt, by submitting to OGS a written remedy in response to the notice of deficiency. If the written remedy that is submitted is not timely or is found by OGS to be inadequate, OGS shall notify the Bidder and direct the Bidder to submit, within 5 business days of notification by OGS, a request for a partial or total waiver of MWBE participation goals on Form BDC 333. Failure to file the waiver form in a timely manner may be grounds for disqualification of the bid or proposal. F. OGS may disqualify a Vendors Submission as being non-responsive under the following circumstances: (a) If a Bidder fails to submit an MWBE Utilization Plan; (b) If a Bidder fails to submit a written remedy to a notice of deficiency; (c) If a Bidder fails to submit a request for waiver; or (d) If OGS determines that the Bidder has failed to document good faith efforts. G. If awarded a Contract, Contractor certifies that it will follow the submitted MWBE Utilization Plan for the performance of MWBEs on the Contract pursuant to the prescribed MWBE goals set forth in clause IV-A of this Section. H. Bidder/Contractor further agrees that a failure to submit and/or use such completed MWBE Utilization Plan shall constitute a material breach of the terms of the Contract. Upon the occurrence of such a material breach, OGS shall be entitled to any remedy provided herein, including but not limited to, a finding of Contractor non- responsiveness.
STS-1 Loop STS-1 Loop is a high-capacity digital transmission path with SONET VT1.5 mapping that is dedicated for the use of the ordering customer for the purpose of provisioning local exchange and associated exchange access services. It is a two-point digital transmission path which provides for simultaneous two-way transmission of serial bipolar return-to-zero synchronous digital electrical signals at a transmission rate of 51.84 Mbps. It may provide transport for twenty-eight (28) DS1 channels, each of which provides the digital equivalent of twenty-four (24) analog voice grade channels. The interface to unbundled dedicated STS-1 transport is a metallic-based electrical interface.
CFR Part 200 or Federal Provision - Xxxx Anti-Lobbying Amendment - Continued If you answered "No, Vendor does not certify - Lobbying to Report" to the above attribute question, you must download, read, execute, and upload the attachment entitled "Disclosure of Lobbying Activities - Standard Form - LLL", as instructed, to report the lobbying activities you performed or paid others to perform. Compliance with all applicable standards, orders, or requirements issued under section 306 of the Clean Air Act (42 U.S.C. 1857(h)), section 508 of the Clean Water Act (33 U.S.C. 1368), Executive Order 11738, and Environmental Protection Agency regulations (40 CFR part 15). (Contracts, subcontracts, and subgrants of amounts in excess of $100,000) Pursuant to the above, when federal funds are expended by ESC Region 8 and TIPS Members, ESC Region 8 and TIPS Members requires the proposer certify that in performance of the contracts, subcontracts, and subgrants of amounts in excess of $250,000, the vendor will be in compliance with all applicable standards, orders, or requirements issued under section 306 of the Clean Air Act (42 U.S.C. 1857(h)), section 508 of the Clean Water Act (33 U.S.C. 1368), Executive Order 11738, and Environmental Protection Agency regulations (40 CFR part 15). Does vendor certify compliance? Yes
Minimum Shipping Requirements for TIPS Sales Vendor shall ship, deliver, or provide ordered goods and services within a commercially reasonable time after acceptance of the order. If a delay in delivery is anticipated, Vendor shall notify the TIPS Member as to why delivery is delayed and provide an updated estimated time for completion. The TIPS Member may cancel the order if the delay is not commercially acceptable or not consistent with the Supplemental Agreement applicable to the order.
DNS name server availability Refers to the ability of a public-‐DNS registered “IP address” of a particular name server listed as authoritative for a domain name, to answer DNS queries from an Internet user. All the public DNS-‐registered “IP address” of all name servers of the domain name being monitored shall be tested individually. If 51% or more of the DNS testing probes get undefined/unanswered results from “DNS tests” to a name server “IP address” during a given time, the name server “IP address” will be considered unavailable.
Orlando, FL; Ft Lauderdale, FL; Charlotte-Gastonia-Rock Hill, NC; Greensboro-Winston Salem-High Point, NC; Nashville, TN; and New Orleans, LA, and BellSouth has provided non- discriminatory cost based access to the Enhanced Extended Link (EEL) throughout Density Zone 1 as determined by NECA Tariff No. 4 as in effect on January 1, 1999.
Long Term Cost Evaluation Criterion # 4. READ CAREFULLY and see in the RFP document under "Proposal Scoring and Evaluation". Points will be assigned to this criterion based on your answer to this Attribute. Points are awarded if you agree not i ncrease your catalog prices (as defined herein) more than X% annually over the previous year for years two and thr ee and potentially year four, unless an exigent circumstance exists in the marketplace and the excess price increase which exceeds X% annually is supported by documentation provided by you and your suppliers and shared with TIP S, if requested. If you agree NOT to increase prices more than 5%, except when justified by supporting documentati on, you are awarded 10 points; if 6% to 14%, except when justified by supporting documentation, you receive 1 to 9 points incrementally. Price increases 14% or greater, except when justified by supporting documentation, receive 0 points. increases will be 5% or less annually per question Required Confidentiality Claim Form This completed form is required by TIPS. By submitting a response to this solicitation you agree to download from th e “Attachments” section, complete according to the instructions on the form, then uploading the completed form, wit h any confidential attachments, if applicable, to the “Response Attachments” section titled “Confidentiality Form” in order to provide to TIPS the completed form titled, “CONFIDENTIALITY CLAIM FORM”. By completing this process, you provide us with the information we require to comply with the open record laws of the State of Texas as they ma y apply to your proposal submission. If you do not provide the form with your proposal, an award will not be made if your proposal is qualified for an award, until TIPS has an accurate, completed form from you. Read the form carefully before completing and if you have any questions, email Xxxx Xxxxxx at TIPS at xxxx.xxxxxx@t xxx-xxx.xxx If the vendor is awarded a contract with TIPS under this solicitation, the vendor agrees to make any Choice of Law c lauses in any contract or agreement entered into between the awarded vendor and with a TIPS member entity to re ad as follows: "Choice of law shall be the laws of the state where the customer resides" or words to that effect. Agreed In the event of litigation or use of any dispute resolution model when resolving disputes with a TIPS member entity a s a result of a transaction between the vendor and TIPS or the TIPS member entity, the Venue for any litigation or ot her agreed upon model shall be in the state and county where the customer resides unless otherwise agreed by the parties at the time the dispute resolution model is decided by the parties. Agreed
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.