HIV/AIDS Model Workplace Guidelines Grantee will:
Use Guidelines 3.3.1. The JAGGAER Applications are provided to Client for use only as expressly set forth in the Agreement, and Client will not use the JAGGAER Applications in whole or in part for any other use or purpose. In particular, Client will not, and will not allow any third party to: (i) decompile, disassemble, reverse engineer or attempt to reconstruct, identify or discover any source code, underlying ideas, underlying user interface techniques or algorithms of the JAGGAER Applications by any means, or disclose any of the foregoing; (ii) except as expressly set forth in the Agreement, provide, rent, lease, lend, or use the JAGGAER Applications for timesharing, subscription, or service bureau purposes; (iii) sublicense, transfer or assign the JAGGAER Applications or any of the rights or licenses granted under the Agreement; or remove or obscure any trademark, product identification, proprietary marking, copyright or other notices provided with the JAGGAER Applications or related documentation.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.
Design Guidelines The Owner’s “Design Guidelines” are as published on the Owner’s website (xxxx://xxxxx.xxxxx.xxx/for-vendors/design-guidelines/). In addition to providing a guide to be used in the preparation of design documents for the Owner’s construction projects, the Design Guidelines also contain regulatory code compliance and other Owner requirements. The “Effective Date” (as noted in Section 2.7 of the Design Guidelines), determining which edition will be used for a given project, is set at the beginning of Design Development and will govern the preparation of construction documents for the project unless noted otherwise. Compliance with the Design Guidelines does not relieve the Design Professional from any of its responsibility.
Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.
Infrastructure Improvements The design, redevelopment and construction and completion of certain infrastructure improvements, including sewer, stormwater, electrical and water main improvements, along with other similar improvements.
General Guidelines 1. Conduct yourself in a responsible manner at all times in the laboratory.
Program Guidelines The goal for this program is to help small businesses expand their market reach by investing in greater hardware and software applications. In the age of technology, there are many innovative ways that business can offer their goods and services to an e-commerce online customer base. The following eligible items are permitted, based on business type: Hardware: • Computers • Printer, scanner, copier (All in one) Software: • Internet service (1 year)Website – Turnkey website landing page package • Virus Protection • Microsoft Office 365 • Remote Client Software (Team Viewer) Other services: Virtual Training courses (Gotomeeting, Zoom, other virtual meetings – Max 3 month service) Tech Support with set up and remote trouble shooting The Process The following identifies the steps in the application process:
Academic Policies and Student Support Services X. Xxxx College courses offered as dual credit, regardless of where they are taught, follow the same syllabus, course outline, textbook, grading method, and other academic policies and procedures as the courses outlined in the Hill College policy manual, catalog, and student handbook. [TAC 19, Part 1, Chapter 4, Subchapter D, 4.85(g)(1)]