UTILIZATION OF SMALL BUSINESS CONCERNS Seller agrees to actively seek out and provide the maximum practicable opportunities for small businesses, small disadvantaged businesses, women-owned small businesses, minority business enterprises, historically black colleges and universities and minority institutions, Historically Underutilized Business Zone small business concerns and US Veteran and Service-Disabled Veteran Owned small business concerns to participate in the subcontracts Seller awards to the fullest extent consistent with the efficient performance of this Contract.
Small Business This chapter shall not be applied to any contractor that meets all of the following: 1. Has ten or fewer employees during the contract period; and, 2. Has annual gross revenues in the preceding twelve months which, if added to the annual amount of the contract awarded, are less than $500,000; and, 3. Is not an affiliate or subsidiary of a business dominant in its field of operation. “Dominant in its field of operation” means having more than ten employees and annual gross revenues in the preceding twelve months which, if added to the annual amount of the contract awarded, exceed $500,000. “Affiliate or subsidiary of a business dominant in its field of operation” means a business which is at least 20 percent owned by a business dominant in its field of operation, or by partners, officers, directors, majority stockholders, or their equivalent, of a business dominant in that field of operation. (Ord. 2002-0015 § 1 (part), 2002)
Small Business Concern The offeror represents as part of its offer that it is, is not a small business concern.
Qualified Small Business For so long as any of the Shares are held by an Investor (or a transferee in whose hands such Shares are eligible to qualify as “Qualified Small Business Stock” as defined in Section 1202(c) of the Internal Revenue Code of 1986, as amended (the “Code”)), the Company will use its reasonable efforts to comply with the reporting and recordkeeping requirements of Section 1202 of the Code, any regulations promulgated thereunder and any similar state laws and regulations.
Employee Eligibility Verification The Contractor warrants that it fully complies with all Federal and State statutes and regulations regarding the employment of aliens and others and that all its employees performing work under this Contract meet the citizenship or alien status requirement set forth in Federal statutes and regulations. The Contractor shall obtain, from all employees performing work hereunder, all verification and other documentation of employment eligibility status required by Federal or State statutes and regulations including, but not limited to, the Immigration Reform and Control Act of 1986, 8 U.S.C. §1324 et seq., as they currently exist and as they may be hereafter amended. The Contractor shall retain all such documentation for all covered employees for the period prescribed by the law. The Contractor shall indemnify, defend with counsel approved in writing by County, and hold harmless, the County, its agents, officers, and employees from employer sanctions and any other liability which may be assessed against the Contractor or the County or both in connection with any alleged violation of any Federal or State statutes or regulations pertaining to the eligibility for employment of any persons performing work under this Contract.
Eligibility Verification (a) HHSC will verify Medicaid eligibility for Dual Eligible Members by the fifth business day of the month following the receipt of the MA Dual SNP’s monthly enrollment file, in accordance with Section 3.02(b). (b) To verify Medicaid eligibility of an individual Member, HHSC agrees to provide the MA Dual SNP with real-time access to HHSC’s claims administrator’s Medicaid eligibility verification system.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Examination of Implementation 1. Without prejudice to the procedures set out in Article 188 (Compensation), once the period of time set out in paragraph 3 of Article 186 (Implementation of the Report) has expired, and there is disagreement between the disputing Parties as to the existence or consistency of the measures taken to comply with the Panel report, such dispute shall be referred to the original Panel wherever possible. If not possible, the procedure pursuant to Article 179 (Panel Selection) shall be followed to appoint a new Panel, in which event the periods set out thereof shall be reduced by half (22). 2. This Panel shall issue its report on the matter within 60 days after the date of the referral of the matter to it. When the Panel considers that it cannot provide its report within this timeframe, it shall inform the Parties in writing of the reasons for the delay together with an estimate of the period within which it will submit its report. Any delay shall not exceed a further period of 30 days unless the Parties otherwise agree.
Authorization and Application of Overtime An employee who is required to work overtime shall be entitled to overtime compensation when the overtime worked is authorized in advance.
Application of Funding Techniques to Programs 6.3.1 The State shall apply the following funding techniques when requesting Federal funds for the component cash flows of the programs listed in sections 4.2 and 4.3 of this Agreement. 6.3.2 Programs Below are programs listed in Section 4.2 and Section 4.3.