Adverse Weather Shall be only weather that satisfies all of the following conditions: (1) unusually severe precipitation, sleet, snow, hail, or extreme temperature or air conditions in excess of the norm for the location and time of year it occurred based on the closest weather station data averaged over the past five years, (2) that is unanticipated and would cause unsafe work conditions and/or is unsuitable for scheduled work that should not be performed during inclement weather (i.e., exterior finishes), and (3) at the Project.
Elements Unsatisfactory Needs Improvement Proficient Exemplary IV-A-1. Reflective Practice Demonstrates limited reflection on practice and/or use of insights gained to improve practice. May reflect on the effectiveness of lessons/ units and interactions with students but not with colleagues and/or rarely uses insights to improve practice. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues, and uses insights gained to improve practice and student learning. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues; and uses and shares with colleagues, insights gained to improve practice and student learning. Is able to model this element.
Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract. a. The contractor shall notify all potential subcontractors and suppliers and lessors of their EEO obligations under this contract. b. The contractor will use good faith efforts to ensure subcontractor compliance with their EEO obligations.
NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Responsibility for Environmental Contamination 5.20.1 Neither Party shall be liable to the other for any costs whatsoever resulting from the presence or release of any Environmental Hazard that either Party did not introduce to the affected Work Location. Both Parties shall defend and hold harmless the other, its officers, directors and employees from and against any losses, damages, claims, demands, suits, liabilities, fines, penalties and expenses (including reasonable attorneys' fees) that arise out of or result from (i) any Environmental Hazard that the Indemnifying Party, its contractors or agents introduce to the Work Locations or (ii) the presence or release of any Environmental Hazard for which the Indemnifying Party is responsible under Applicable Law. 5.20.2 In the event any suspect materials within Qwest-owned, operated or leased facilities are identified to be asbestos containing, CLEC will ensure that to the extent any activities which it undertakes in the facility disturb such suspect materials, such CLEC activities will be in accordance with applicable local, state and federal environmental and health and safety statutes and regulations. Except for abatement activities undertaken by CLEC or equipment placement activities that result in the generation of asbestos-containing material, CLEC does not have any responsibility for managing, nor is it the owner of, nor does it have any liability for, or in connection with, any asbestos-containing material. Qwest agrees to immediately notify CLEC if Qwest undertakes any asbestos control or asbestos abatement activities that potentially could affect CLEC personnel, equipment or operations, including, but not limited to, contamination of equipment.
Trade in Services 1. The Parties shall aim at gradually liberalising and opening their markets for trade in services in accordance with the provisions of the General Agreement on Trade in Services (hereinafter referred to as the “GATS”), taking into account ongoing work under the auspices of the WTO. 2. If a Party grants to a non-Party, after the entry into force of this Agreement, additional benefits with regard to the access to its services markets, it shall agree to enter into negotiations with a view to extending these benefits to another Party on a reciprocal basis. 3. The Parties undertake to keep under review paragraphs 1 and 2 with a view to establishing an agreement liberalising trade in services between them in accordance with Article V of the GATS.
Personnel, Office Space, and Facilities of Manager The Manager at its own expense shall furnish or provide and pay the cost of such office space, office equipment, office personnel, and office services as the Manager requires in the performance of its investment advisory and other obligations under this Agreement.
Products and Completed Operations Personal Injury Liability Contractual Liability The policy shall be on an occurrence form and limits shall not be less than: $1,000,000 Each Occurrence $2,000,000 General Aggregate $1,000,000 Products/Completed Operations Aggregate $1,000,000 Personal & Advertising Injury
STANDARDS OF MANAGEMENT AND OPERATIONS In performing its obligations hereunder, during the term of this ESA, the Competitive Supplier shall exercise reasonable care to assure that its facilities are prudently and efficiently managed; that it employs an adequate number of competently trained and experienced personnel to carry out its responsibilities; that it delivers or arranges to deliver a safe and reliable supply of such amounts of electricity to the Point of Delivery as are required under this ESA; that it complies with all relevant industry standards and practices for the supply of electricity to Participating Consumers; and that, at all times with respect to Participating Consumers, it exercises good practice for a Competitive Supplier and employs Commercially Reasonable skills, systems and methods available to it.