Environmental and Social Safeguards All of the Projects will be implemented in compliance with the MCC Environmental Guidelines and the MCC Gender Policy, and any resettlement will be carried out in accordance with the World Bank’s Operational Policy on Involuntary Resettlement in effect as of July 2007 (“OP 4.12”) in a manner acceptable to MCC. In accordance with its policies, the Government will ensure that the Projects comply with all national environmental laws and regulations, licenses and permits, except to the extent such compliance would be inconsistent with this Compact. Specifically, the Government will: (a) cooperate with or complete, as the case may be, any ongoing environmental assessments, or if necessary undertake and complete any additional environmental assessments, social assessments, environmental management plans, environmental and social audits, resettlement policy frameworks, and resettlement action plans required under the laws of Indonesia, the MCC Environmental Guidelines, this Compact, the PIA, or any Supplemental Agreement, or as otherwise required by MCC, each in form and substance satisfactory to MCC; (b) ensure that Project-specific environmental and social management plans are developed and all relevant measures contained in such plans are integrated into project design, the applicable procurement documents and associated finalized contracts, in each case, in form and substance satisfactory to MCC; and (c) implement to MCC’s satisfaction appropriate environmental and social mitigation measures identified in such assessments or plans. Unless MCC agrees otherwise in writing, the Government will fund all necessary costs of environmental and social mitigation measures (including, without limitation, costs of resettlement) not specifically provided for, or that exceed the MCC Funding specifically allocated for such costs in, the Detailed Financial Plan for any Project. To maximize the positive social impacts of the Projects, address cross-cutting social and gender issues such as human trafficking, child and forced labor, and HIV/AIDS, and to ensure compliance with the MCC Gender Policy, the Government will: (x) develop a comprehensive social and gender integration plan which, at a minimum, identifies approaches for regular, meaningful and inclusive consultations with women and other vulnerable/underrepresented groups, consolidates the findings and recommendations of Project-specific social and gender analyses and sets forth strategies for incorporating findings of the social and gender analyses into final Project designs as appropriate (“Social and Gender Integration Plan”); and (y) ensure, through monitoring and coordination during implementation, that final Activity designs, construction tender documents and implementation plans are consistent with and incorporate the outcomes of the social and gender analyses and social and gender integration plan. To address gender concerns that impact women’s ability to participate across Projects, MCA- Indonesia will adopt a detailed workplan, subject to MCC approval, for gender work to be undertaken at the policy, institutional capacity building and community levels (the “Targeted Gender Activities”). Xxxxx XX sets forth the MCC Funding allocated for the performance of the Targeted Gender Activities. Prior to the second disbursement of MCC Funding for the Targeted Gender Activities, MCA-Indonesia shall have completed detailed action plans and provided evidence of demonstrated commitment of relevant stakeholders to addressing policy constraints identified in the workplan.
COVID-19 Vaccine Passports Pursuant to Texas Health and Safety Code, Section 161.0085(c), Contractor certifies that it does not require its customers to provide any documentation certifying the customer’s COVID-19 vaccination or post-transmission recovery on entry to, to gain access to, or to receive service from the Contractor’s business. Contractor acknowledges that such a vaccine or recovery requirement would make Contractor ineligible for a state-funded contract.
Hepatitis B Vaccine Where the Hospital identifies high risk areas where employees are exposed to Hepatitis B, the Hospital will provide, at no cost to the employees, a Hepatitis B vaccine.
Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.
Anti-Corruption Compliance (a) Neither the Company nor its Subsidiaries, nor to the knowledge of the Company, any of their directors or officers, any of the Company or its Subsidiaries’ respective, employees, agents, Representatives or other Persons acting for or on behalf of the Company or any of its Subsidiaries has, in the past four (4) years: (i) made any bribe, influence payment, kickback, payoff, benefits or any other type of payment (whether tangible or intangible) that would be unlawful under any applicable anti-bribery or anticorruption (governmental or commercial) laws (including, for the avoidance of doubt, any guiding, detailing or implementing regulations), including Laws that prohibit the corrupt payment, offer, promise or authorization of the payment or transfer of anything of value (including gifts or entertainment), directly or indirectly, to any Government Official or commercial entity to obtain a business advantage such as Anti-Bribery Laws; (ii) been in violation of any Anti-Bribery Law, offered, paid, promised to pay, or authorized any payment or transfer of anything of value, directly or indirectly, to any person for the purpose of (A) influencing any act or decision of any Government Official in his official capacity, (B) inducing a Government Official to do or omit to do any act in relation to his lawful duty, (C) securing any improper advantage, (D) inducing a Government Official to influence or affect any act, decision or omission of any Governmental Authority, or (E) assisting the Company or any of its Subsidiaries, or any agent or any other Person acting for or on behalf of the Company or any of its Subsidiaries, in obtaining or retaining business for or with, or in directing business to, any Person; or (iii) accepted or received any contributions, payments, gifts, or expenditures that would be unlawful under any Anti-Bribery Law. (b) Each of the Company and its Subsidiaries has instituted and maintains policies and procedures reasonably designed to ensure compliance in all material respects with the Anti-Bribery Laws. (c) As of the date hereof, to the knowledge of the Company, there are no current or pending internal investigations, or third-party investigations (including by any Governmental Authority), or internal or external audits, that address any material allegations or information concerning possible material violations of the Anti-Bribery Laws related to the Company or any of the Company’s Subsidiaries.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.
Vendor Certification of Criminal History Texas Education Code Chapter 22 8 Texas Education Code Chapter 22 requires entities that contract with school districts to provide services to obtain DEFINITIONS Covered employees: Employees of a contractor or subcontractor who have or will have continuing duties related to the service to be performed at the District and have or will have direct contact with students. The District will be the final arbiter of what constitutes direct contact with students. Disqualifying criminal history: Any conviction or other criminal history information designated by the District, or one of the following offenses, if at the time of the offense, the victim was under 18 or enrolled in a public school: (a) a felony offense under Title 5, Texas Penal Code; (b) an offense for which a defendant is required to register as a sex offender under Chapter 62, Texas Code of Criminal Procedure; or (c) an equivalent offense under federal law or the laws of another state. Vendor certifies: NONE (Section A): None of the employees of Vendor and any subcontractors are covered employees, as defined above. If this box is checked, I further certify that Contractor has taken precautions or imposed conditions to ensure that the employees of Vendor and any subcontractor will not become covered employees. Contractor will maintain these precautions or conditions throughout the time the contracted services are provided under this procurement. SOME (Section B): Some or all of the employees of Vendor and any subcontractor are covered employees. If this box is checked, I further certify that: (1) Vendor has obtained all required criminal history record information regarding its covered employees. None of the covered employees has a disqualifying criminal history; (2) If Vendor receives information that a covered employee subsequently has a reported criminal history, Vendor will immediately remove the covered employee from contract duties and notify the purchasing entity in writing within 3 business days; (3) Upon request, Vendor will provide the purchasing entity with the name and any other requested information of covered employees so that the purchasing entity may obtain criminal history record information on the covered employees; (4) If the purchasing entity objects to the assignment of a covered employee on the basis of the covered employee's criminal history record information, Xxxxxx agrees to discontinue using that covered employee to provide services at the purchasing entity. Certification Regarding "Choice of Law" Terms with TIPS Members Certification Regarding "Venue" Terms with TIPS Members Certification Regarding "Automatic Renewal" Terms with TIPS Members Certification Regarding "Indemnity" Terms with TIPS Members Certification Regarding "Arbitration" Terms with TIPS Members
Health and Safety Representatives The Employer and its Employees will comply with Part 7 of the OHS Act – Representation of Employees in relation to the establishment of designated work groups and the election of Health and Safety Representatives.
Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.