General Guidelines 1. Conduct yourself in a responsible manner at all times in the laboratory.
Design Guidelines The Owner’s “Design Guidelines” are as published on the Owner’s website (xxxx://xxxxx.xxxxx.xxx/for-vendors/design-guidelines/). In addition to providing a guide to be used in the preparation of design documents for the Owner’s construction projects, the Design Guidelines also contain regulatory code compliance and other Owner requirements. The “Effective Date” (as noted in Section 2.7 of the Design Guidelines), determining which edition will be used for a given project, is set at the beginning of Design Development and will govern the preparation of construction documents for the project unless noted otherwise. Compliance with the Design Guidelines does not relieve the Design Professional from any of its responsibility.
Program Guidelines The goal for this program is to help small businesses expand their market reach by investing in greater hardware and software applications. In the age of technology, there are many innovative ways that business can offer their goods and services to an e-commerce online customer base. The following eligible items are permitted, based on business type: Hardware: • Computers • Printer, scanner, copier (All in one) Software: • Internet service (1 year)Website – Turnkey website landing page package • Virus Protection • Microsoft Office 365 • Remote Client Software (Team Viewer) Other services: Virtual Training courses (Gotomeeting, Zoom, other virtual meetings – Max 3 month service) Tech Support with set up and remote trouble shooting The Process The following identifies the steps in the application process:
Agreed Guidelines Applications With respect to the application of the Sentencing Guidelines to this case, the parties stipulate and agree as follows:
Policies, Guidelines, Directives and Standards Either the LHIN or the MOHLTC will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.
Specifications and Standards a) All articles supplied shall strictly conform to the specifications, trademark laid down in the bidding document and wherever articles have been required according to ISI/ ISO/ other applicable specifications/ certifications/ standards, those articles should conform strictly to those specifications/ certifications/ standards. The supply shall be of best quality and description. The decision of the competent authority/ purchase committee whether the articles supplied conforms to the specifications shall be final and binding on the supplier/ selected bidder.
Use Guidelines 3.3.1. The JAGGAER Applications are provided to Client for use only as expressly set forth in the Agreement, and Client will not use the JAGGAER Applications in whole or in part for any other use or purpose. In particular, Client will not, and will not allow any third party to: (i) decompile, disassemble, reverse engineer or attempt to reconstruct, identify or discover any source code, underlying ideas, underlying user interface techniques or algorithms of the JAGGAER Applications by any means, or disclose any of the foregoing; (ii) except as expressly set forth in the Agreement, provide, rent, lease, lend, or use the JAGGAER Applications for timesharing, subscription, or service bureau purposes; (iii) sublicense, transfer or assign the JAGGAER Applications or any of the rights or licenses granted under the Agreement; or remove or obscure any trademark, product identification, proprietary marking, copyright or other notices provided with the JAGGAER Applications or related documentation.
SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.
Guidelines The Office of State Procurement adheres to all guidelines set forth by the State and Federal Government concerning The Americans with Disabilities Act (ADA) as well as all mandated fire codes.
Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.