Methods and Approaches Sample Clauses

Methods and Approaches. The Project was implemented in a series of stages including a review of the literature; the completion of a project research plan taking account of literature review findings; preparation of survey tools and materials; a survey process and a data analysis process. This was then followed by an emission modeling process and finally this current reporting process. The individual stages are briefly outlined below:
AutoNDA by SimpleDocs

Related to Methods and Approaches

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Links to Third Party Sites The Bank website may contain links to other websites ("Linked Sites"). Such links are provided solely as a convenience for you. While the Bank will attempt to select and provide links to Linked Sites that it believes may be of interest to its customers, the Bank does not screen, approve, review or otherwise endorse any content or information contained in any Linked Sites. You acknowledge and agree that the Bank, its affiliates and partners are not responsible for the contents of any Linked Sites, including the accuracy or availability of information provided by Linked Sites, and make no representations or warranties regarding the Linked Sites or your use of them.

  • DISADVANTAGED BUSINESS ENTERPRISE OR HISTORICALLY UNDERUTILIZED BUSINESS REQUIREMENTS The Engineer agrees to comply with the requirements set forth in Attachment H, Disadvantaged Business Enterprise or Historically Underutilized Business Subcontracting Plan Requirements with an assigned goal or a zero goal, as determined by the State.

  • Third Party Sites The Platform may provide links to third-party web sites. Third parties and third party web sites may have different privacy policies, terms and conditions and business practices than we do. Your dealings or communications with any party other than the Company are solely between you and that third party. Reference on the Site to any product, process, publication or service of any third party by trade name, domain name, trademark, trade identity, service xxxx, logo, and manufacturer or otherwise does not constitute or imply its endorsement or recommendation by the Company.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4.

  • enabled This information is collected by Symantec for the purpose of providing protection and of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it. − Executable files and files that contain executable content that are identified as potential malware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Software and Service’s automatic submission function. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products. The collected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. − The name given to the Device during the initial setup of such Device. If collected, the name will be used by Symantec as an account name for the Device under which You may elect to receive additional services and/or under which You may use certain features of the Software and Services. You may change such account name at any time after installation of the Software and Services and it is recommended that You do so. − Status information regarding installation and operation of the Software and Services. This information indicates to Symantec whether installation of the Software and Services was successfully completed as well as whether the Software and Services has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encountered by the Software and Services at the time of installation or error. The status information is collected by Symantec for the purpose of evaluating and improving Symantec’s product performance and installation success rate. Symantec may also use this information to optimize its web-pages. − Information contained in email messages that You send through the Software and Services to Symantec to report as spam or as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with Your permission, and will not be sent automatically. If You send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantec’s antispam technology. Symantec will not correlate or match up these files with any other personally identifiable information. − Information contained in a report that You may choose to send through the Software and Services to Symantec when the Software and Services encounters a problem. The report includes information regarding the status of both the Software and Services and Your Device at the time that the Software and Services encountered the problem. The status information about Your Device may include the system language, country locale, and the operating system version for Your Device, as well as the processes running, their status and performance information, and data from files or folders that were open at the time the Software and Services encountered the problem. The information could contain personally identifiable information if such information is included in, or is a part of the name of the files or folders open at the time the Software and Services encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantec’s product performance. This information will not be correlated or matched up with any personally identifiable information. − The Internet Protocol (IP) address and/or Media Access Control (MAC) address and the Machine ID of the Device on which the Software and Services is installed to enable the Software and Services to function and for license administration purposes. − Other general, statistical information used for product analysis, and for improving product functionality. Unless it is expressly defined as optional, the collected information as set out above is necessary for the purpose of the functionality of Symantec’s products. Information may be transferred to the Symantec group in the United States or other countries that may have less protective data protection laws than the region in which You are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection. Subject to applicable laws, Symantec reserves the right to cooperate with any legal process and any law enforcement or other government inquiry related to Your use of this Software and Services. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software and Services, You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze such information for these purposes.

  • Extracurricular Activities Effective July 1, 2009, stipends for participation in extracurricular activities which are authorized by the appointing authority shall be: Pathfinders/Mountaineering: Inland $950/year Sailing $400/year Art Club Advisor $300/year Drama Club Advisor $300/year Cross Country Skiing $150/year Interscholastic Coaches: Boys’ Basketball $1000/year Girls’ Basketball (if class D) $1000/year Asst. Boys’ Basketball $750/year Asst. Girls’ Basketball (if class D) $750/year Interscholastic Sport: Scorekeeper/Timekeeper $10/game Club Sport Coaches: Soccer $400/year Track $400/year Cross County Running $400/year Girls’ Basketball (if not class D) $400/year Sports Activity Director $400/year Athletic Director $200/year Committee:

  • Target Population The Grantee shall ensure that diversion programs and services provided under this grant are designed to serve juvenile offenders who are at risk of commitment to Department.

  • Historically Underutilized Businesses (“HUBs”). In accordance with state law, it is TFC’s policy to assist HUBs whenever possible to participate in providing goods and services to the agency. TFC encourages those parties with whom it contracts for the provision of goods and services to adhere to this same philosophy in selecting subcontractors to assist in fulfilling PSP’s obligations with TFC. If PSP subcontracts with others for some or all of the services to be performed under an Assignment to this Agreement, PSP shall comply with all HUB requirements pursuant to Chapter 2161 of the Texas Government Code. At or prior to the execution of an Assignment with a value that is anticipated to meet or exceed One Hundred Thousand and No/100 Dollars ($100,000.00), PSP must provide a completed HUB Subcontracting Plan, which shall be approved by TFC prior to execution of the Assignment. A copy of the HUB Subcontracting Form is attached hereto and incorporated herein for all purposes as Exhibit G. PSP shall provide the HUB Program of TFC with pertinent details of any participation by a HUB in fulfilling the duties and obligations arising under an Assignment, on the HUB Subcontracting Plan Progress Assessment Report (“PAR”). A copy of the PAR Form is attached hereto and incorporated herein for all purposes as Exhibit H.

  • Links to Third Party Sites/Third Party Services xxxxxxxxxx.xxx may contain links to other websites ("Linked Sites"). The Linked Sites are not under the control of CURLYWORLD and CURLYWORLD is not responsible for the contents of any Linked Site, including without limitation any link contained in a Linked Site, or any changes or updates to a Linked Site. CURLYWORLD is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by CURLYWORLD of the site or any association with its operators. Certain services made available via xxxxxxxxxx.xxx are delivered by third party sites and organizations. By using any product, service or functionality originating from the xxxxxxxxxx.xxx domain, you hereby acknowledge and consent that CURLYWORLD may share such information and data with any third party with whom CURLYWORLD has a contractual relationship to provide the requested product, service or functionality on behalf of xxxxxxxxxx.xxx users and customers.

Time is Money Join Law Insider Premium to draft better contracts faster.