Live Organisms Sample Clauses

Live Organisms. 1 Human research subjects. You must protect the rights and welfare of individuals that participate as human subjects in research under this award in accordance with the Common Federal Policy for the Protection of Human Subjects (45 CFR part 46), as implemented by DOE at 10 CFR part 745.
AutoNDA by SimpleDocs
Live Organisms. For human subjects, the Common Federal Policy for the Protection of Human Subjects, codified by the Department of Health and Human Services at 45 CFR part 46 and implemented by the Department of Defense at 32 CFR part 219.
Live Organisms. By accepting funds under this Xxxxx, the recipient assures that it will comply with applicable provisions of the following national policies concerning live organisms: (a) For human subjects, the Common Federal Policy for the Protection of Human Subjects codified by the Department of Health and Human Services at 45 CFR Part 46 and implemented by the Department of Defense at 32 CFR Part 219. (b) For animals: Department (1) Rules on animal acquisition, transport, care, handling, and use in (i) 9 CFR Parts 1-4, of Agriculture rules that implement the Laboratory Animal Welfare Act of 1966 (7 U.S.C. 2131- 2159, as amended); and (ii) the "Guide for the Care and Use of Laboratory Animals," National Institutes of Health Publication No. 86- 23. (2) Prohibitions on the purchase or use of dogs and cats for certain medical training purposes, in Section 8019 (10 U.S.C. 2241 note) of the Department of Defense Appropriations Act, 1991 (Pub. Law !O1-51l). (3) Rules of the Departments of Interior (50 CFR Parts 10-24) and Commerce (50 CFR Parts 217- 227) implementing laws and conventions on the taking possession, transport, purchase, sale, export or import of wildlife and plants, including the Endangered Species Act of 1973 (16 U.S.C. 1531-1543); Marine Mammal Protection Act (16 U.S.C. 1361-1384); Lacey Act (18 U.S.C. 42); and Convention on International Trade in Endangered Species of Wild Fauna and Flora.
Live Organisms a. Human Subjects. Agreement funds may NOT be used for research that uses uninformed or nonvoluntary humans as experimental subjects. The recipient is responsible for the protection of the rights and welfare of any human subjects involved in research, development, and related activities supported by this Agreement. The recipient agrees to comply with the Common Federal Policy for the Protection of Human Subjects, codified by the Department of Health and Human Services at 45 CFR part 46 implemented by the Department of Defense at 32 CFR part 219. b. Animal Welfare. Any recipient performing research, experimentation, or testing involving the use of animals shall comply with the rules on animal acquisition, transport, care, handling, and use in: (i) 9 CFR parts 1-4, Department of Agriculture rules that implement the Laboratory Animal Welfare Act of 1966, as amended, (7 U.S.C. 2131-2156); and (ii) the guidelines described in National Institutes of Health Publication No. 86-23, "Guide for the Care and Use of Laboratory Animals

Related to Live Organisms

  • Protective Order The Settling Defendants cannot, and do not, make any representation that they have, can or will produce such declarations, or a complete set of such responses, and it is understood and agreed that the failure to produce such responses shall not constitute a breach or violation of this Settlement Agreement; and

  • Foreign Terrorist Organizations Contractor represents and warrants that it is not engaged in business with Iran, Sudan, or a foreign terrorist organization, as prohibited by Section 2252.152 of the Texas Government Code.

  • Anti-Terrorism The Contractor agrees to undertake all reasonable efforts to ensure that none of the UNDP funds received under the Contract is used to provide support to individuals or entities associated with terrorism and that recipients of any amounts provided by UNDP hereunder do not appear on the list maintained by the Security Council Committee established pursuant to Resolution 1267 (1999). The list can be accessed via xxxxx://xxx.xx.xxx/sc/suborg/en/sanctions/1267/aq_sanctions_list. This provision must be included in all sub-contracts or sub-agreements entered into under the Contract.

  • Weapons We have a zero tolerance of the possession of weapons (sword, knives etc) or firearms (guns etc) in the Room, Building or Common Property. If You are found in possession of weapons, firearms or implements associated with their use in the Room, Building or Common Property We will immediately terminate this agreement and inform the relevant UNSW and legal authorities.

  • Executive Orders This Contract is subject to the provisions of Executive Order No. Three of Governor Xxxxxx X. Xxxxxxx, promulgated June 16, 1971, concerning labor employment practices, Executive Order No. Seventeen of Governor Xxxxxx X. Xxxxxxx, promulgated February 15, 1973, concerning the listing of employment openings and Executive Order No. Sixteen of Governor Xxxx X. Xxxxxxx promulgated August 4, 1999, concerning violence in the workplace, all of which are incorporated into and are made a part of the Contract as if they had been fully set forth in it. The Contract may also be subject to Executive Order No. 14 of Governor M. Xxxx Xxxx, promulgated April 17, 2006, concerning procurement of cleaning products and services, Executive Order No. 61 of Governor Xxxxxx X. Xxxxxx promulgated December 13, 2017 concerning the Policy for the Management of State Information Technology Projects, as issued by the Office of Policy and Management, Policy ID IT-SDLC-17-04, and Executive Order No. 49 of Governor Xxxxxx X. Xxxxxx, promulgated May 22, 2015, mandating disclosure of certain gifts to public employees and contributions to certain candidates for office in accordance with their respective terms and conditions. If Executive Orders 14, 61 or 49 are applicable, it is deemed to be incorporated into and are made a part of the Contract as if it had been fully set forth in it. At the Contractor’s request, the State shall provide a copy of these orders to the Contractor.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

  • Anti-Layering The Company shall not incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is both (a) subordinate or junior in right of payment to any Senior Debt and (b) senior in any respect in right of payment to the Notes. No Subsidiary Guarantor shall incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is both (a) subordinate or junior in right of payment to its Senior Debt and (b) senior in right of the Section 4.9 hereof.

  • Anti-Piracy In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditional Access System and Subscriber Management System as set out in ANNEXURE X attached herewith. If so instructed by Information (as defined below) by ZEEL, the IPTV Operator shall shut off or de-authorize the transmission to any unauthorized subscriber/ subscriber indulging in piracy, within ten minutes from the time it receives such instruction from ZEEL. Any communication under this Clause shall be considered as valid Information only if (i) the information is sent through e-mail in a format as mutually agreed by the parties and (ii) the information is sent by a person(s) who is designated to send such information. However, the “information” may even be provided by ZEEL representatives through other means of communications such as telephonic message, fax etc. and the said “information” shall later be confirmed by ZEEL through e-mail and the IPTV Operator shall be under obligation to act upon such information.

  • Anti-slavery and human trafficking The Supplier shall: ensure that slavery and human trafficking is not taking place in any part of its business or in any part of its supply chain; implement due diligence procedures for its own suppliers, subcontractors and other participants in its supply chains, to ensure that there is no slavery or human trafficking in its supply chains; respond promptly to all slavery and human trafficking due diligence questionnaires issued to it by the British Council from time to time and ensure that its responses to all such questionnaires are complete and accurate; and notify the British Council as soon as it becomes aware of any actual or suspected slavery or human trafficking in any part of its business or in a supply chain which has a connection with this Agreement. If the Supplier fails to comply with any of its obligations under clause 13.1, without prejudice to any other rights or remedies which the British Council may have, the British Council shall be entitled to: terminate this Agreement without liability to the Supplier immediately on giving notice to the Supplier; and/or reduce, withhold or claim a repayment (in full or in part) of the charges payable under this Agreement; and/or share with third parties information about such non-compliance.

  • Anti-Corruption Laws and Sanctions The Borrower has implemented and maintains in effect policies and procedures designed to ensure compliance by the Borrower, its Subsidiaries and their respective directors, officers, employees and agents with Anti-Corruption Laws and applicable Sanctions, and the Borrower, its Subsidiaries and their respective officers and employees and to the knowledge of the Borrower its directors and agents, are in compliance with Anti-Corruption Laws and applicable Sanctions in all material respects. None of (a) the Borrower, any Subsidiary or any of their respective directors, officers or employees, or (b) to the knowledge of the Borrower, any agent of the Borrower or any Subsidiary that will act in any capacity in connection with or benefit from the credit facility established hereby, is a Sanctioned Person. No Borrowing or Letter of Credit, use of proceeds or other transaction contemplated by this Agreement will violate any Anti-Corruption Law or applicable Sanctions.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!