RUNNING OF THE ACADEMY Teachers and staff
Wall Street Transparency and Accountability Act In connection with Section 739 of the Wall Street Transparency and Accountability Act of 2010 (“WSTAA”), the parties hereby agree that neither the enactment of WSTAA or any regulation under the WSTAA, nor any requirement under WSTAA or an amendment made by WSTAA, shall limit or otherwise impair either party’s otherwise applicable rights to terminate, renegotiate, modify, amend or supplement this Confirmation or the Agreement, as applicable, arising from a termination event, force majeure, illegality, increased costs, regulatory change or similar event under this Confirmation, the Equity Definitions incorporated herein, or the Agreement (including, but not limited to, rights arising from Change in Law, Hedging Disruption, Increased Cost of Hedging, an Excess Ownership Position, or Illegality (as defined in the Agreement)).
Format and Signing of Bid 18.1 The Bidder shall prepare one original and one copy of the documents comprising the bid as described in Clause 12 of these Instructions to Bidders, bound with the volume containing the Form of Bid, and clearly marked “ORIGINAL” and “COPY” as appropriate. In the event of discrepancy between them, the original shall prevail. 18.2 The original and copy of the Bid shall be typed or written in indelible ink and shall be signed by a person or persons duly authorized to sign on behalf of the Bidder, pursuant to Sub-Clauses 4.3. All pages of the bid where entries or amendments have been made shall be initialed by the person or persons signing the bid. 18.3 The Bid shall contain no alterations or additions, except those to comply with instructions issued by the Employer, or as necessary to correct errors made by the bidder, in which case such corrections shall be initialed by the person or persons signing the bid. 18.4 The Bidder shall furnish information as described in the Form of Bid on commissions or gratuities, if any, paid or to be paid to agents relating to this Bid, and to contract execution if the Bidder is awarded the contract.
Format and Signing of Tender 19.1 The Tenderer shall prepare one original of the documents comprising the Tender as described in ITT 11 and clearly mark it “ORIGINAL.” Alternative Tenders, if permitted in accordance with ITT 12, shall be clearly marked “ALTERNATIVE.” In addition, the Tenderer shall submit copies of the Tender, in the number specified in the TDS and clearly mark them “COPY.” In the event of any discrepancy between the original and the copies, the original shall prevail. 19.2 Tenderers shall mark as “CONFIDENTIAL” information in their Tenders which is confidential to their business. This may include proprietary information, trade secrets, or commercial or financially sensitive information. 19.3 The original and all copies of the Tender shall be typed or written in indelible ink and shall be signed by a person duly authorized to sign on behalf of the Tenderer. This authorization shall consist of a written confirmation as specified in the TDS and shall be attached to the Tender. The name and position held by each person signing the authorization must be typed or printed below the signature. All pages of the Tender where entries or amendments have been made shall be signed or initialed by the person signing the Tender. 19.4 In case the Tenderer is a JV, the Tender shall be signed by an authorized representative of the JV on behalf of the JV, and so as to be legally binding on all the members as evidenced by a power of attorney signed by each members' legally authorized representatives. 19.5 Any inter-lineation, erasures, or overwriting shall be valid only if they are signed or initialed by the person signing the Tender.
No Physical Presence of Quorum and Participation by Audio or Video; Disaster Declaration The ability of the Board to meet in person with a quorum physically present at its meeting location may be affected by the Governor or the Director of the Ill. Dept. of Public Health issuing a disaster declaration related to a public health emergency. The Board President or, if the office is vacant or the President is absent or unable to perform the office’s duties, the Vice President determines that an in- person meeting or a meeting conducted under the Quorum and Participation by Audio or Video Means subhead above, is not practical or prudent because of the disaster declaration; if neither the President nor Vice President are present or able to perform this determination, the Superintendent shall serve as the duly authorized designee for purposes of making this determination. The individual who makes this determination for the Board shall put it in writing, include it on the Board’s published notice and agenda for the audio or video meeting and in the meeting minutes, and ensure that the Board meets every OMA requirement for the Board to meet by video or audio conference without the physical presence of a quorum.
OFFSET CREDIT/COOPERATION This Contract has been entered into in direct support of LOCKHEED XXXXXX'x international offset programs. All offset benefit credits resulting from this Contract are the sole property of LOCKHEED XXXXXX to be applied to the offset program of its choice. SELLER shall assist LOCKHEED XXXXXX in securing appropriate offset credits from the respective country government authorities.
Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements
STATE MEAL MANDATE When CONTRACTOR is a nonpublic school, CONTRACTOR and LEA shall satisfy the State Meal Mandate under California Education Code sections 49530, 49530.5 and 49550.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Xxxxx, Haldimand, Norfolk An employee shall be granted five working days bereavement leave with pay upon the death of the employee’s spouse, child, stepchild, parent, stepparent, legal guardian, grandchild or step-grandchild.