Monitoring Protocol Sample Clauses

Monitoring Protocol. ‌ The point-intercept method (Xxxxxxx et al. 1998) will be used to quantitatively monitor vegetation. This method is currently being used at several wetland sites managed and monitored by the City of Eugene. Consistency in monitoring methods will allow for repeatability and reliability among monitoring staff, as well as facilitate cross-referencing of monitoring results. Point-intercept sampling will take place in spring or early summer. A baseline will be created along the eastern edge of the site, parallel to Green Hill Road. From this baseline approximately 8-10 transects will extend east to west across the site. Markers will be installed along the baseline providing the location of each transect. Sample points will be taken along each transect at paced intervals of approximately 45 meters, with the first point randomly placed within 5 meters of the baseline. Approximately 125 sample points will be systematically interspersed along transects, and a tripod and steel rod will be used to determine the point location. For each point, every individual plant that intercepts the tip of the rod will be recorded. Each species will be recorded as an individual sample, meaning that cover may exceed 100%. If the rod does not contact any vegetation at the point, the recorder will note the presence of bare ground, xxxx, or litter. Plots with bare ground will be annotated if cause is late inundation. Percent absolute cover of each species will be calculated and an 80% confidence interval will be provided for all estimates. These calculations will be used to determine whether success criteria have been achieved for the current monitoring period. Although point-intercept sampling provides a high level of accuracy, it occasionally discounts the presence of species with low cover values. Therefore, walking surveys will be conducted to provide measurements of species richness by species census. Walking surveys will occur at least twice during the growing season. The surveyor will create a comprehensive list of all plant species observed during the walk-through. Special attention will be paid to recording and mapping the presence of invasive plant species and uncommon native, wetland plant species. A representative set of pools will be sampled for depth in spring when water depths are expected to be at their deepest. A late summer walk-through of the wettest areas will map any persistent standing water areas. Species of concern observed on the Bank will be noted, such as an...
AutoNDA by SimpleDocs
Monitoring Protocol. Medi-Cal Managed Care Health Plans
Monitoring Protocol. Adaptive management requires monitoring of the target species and the associated habitats to observe their response to the different Program activities. Each Program activity shall be periodically evaluated by the Governance Committee to assess its success in meeting Program goals relative to other Program activities. Evaluations will: (1) assess whether the Program activity being examined is working as originally envisioned; (2) recommend modifications if necessary; (3) determine whether there are other or better uses for the resources committed to this activity; and (4) assess whether success or failure could be determined by monitoring over the time period evaluated. Evaluations will include independent peer review by experts selected by the Governance Committee. This information will be used to direct resources to the most beneficial activities.
Monitoring Protocol. The project does not have a detailed monitoring protocol by which indicators, their definition and the methods to measure them in time are explained, which presents some differences in how they are defined and completed during the life of the project. For future projects it is advisable to have this protocol containing definitions, form and frequency measurement with respect to the baseline.
Monitoring Protocol. All Authorized Agencies shall monitor, the use of the NYS DOL / OMH Employment Support System by their Employees, agents, and contractors/service providers in the workplace on a regular ongoing basis to ensure that the data and information is accessed and provided solely in accordance with authorized employment program activities, and shall take appropriate remedial action for any unauthorized use. OMH and XXX agree to the follow monitoring protocol for this purpose. The DOL/OMH Joint Management Committee shall establish, and shall require Authorized Agencies, agents, and contractors/service providers to establish, systems, protocols, and procedure to ensure that Employees, agents, and contractors/service providers are complying with the confidentiality requirements of this Agreement. OMH will delegate access to OMH Authorized Agencies and their respective users. Access will be granted consistent with each user’s need for information access and data security appropriate to each user’s responsibilities in accordance with the NYS DOL / OMH Employment Support System security permissions established by the DOL/OMH Joint Management Committee. In addition, OMH and DOL shall each designate a Security Officer, and require each Authorized Agency, and its agents, or contractors/service providers authorized to access new system, to designate a Security Officer responsible to implement security policies and procedures to ensure and monitor proper use of the NYS DOL / OMH Employment Support System by its Employees. Such policies and procedures must include, but not be limited to: i) facility security to safeguard the facility and the equipment therein from unauthorized physical access, tampering and theft; ii) workstation safeguards to restrict access to authorized users; iii) requiring supervisory staff to conduct periodic and regular walk through office areas to observe and determine whether staff are complying with confidentiality requirements; iv) reviewing records of system activity, such as exception lists and v) promptly reporting security incidents. The Security Officer shall conduct accurate and thorough assessments of the potential risks and vulnerabilities to the confidentiality and integrity of the NYS DOL / OMH Employment Support System’s data available to its staff and take measures to reduce these risks and vulnerabilities. Finally, each security officer shall maintain adequate records to document compliance with both the security protocols and the confi...

Related to Monitoring Protocol

  • Signaling protocol The Parties will interconnect their networks using SS7 signaling where Technically Feasible and available as defined in GR 905 Telcordia Standards including ISDN User Part (ISUP) for trunk signaling and TCAP for CCS-based features in the Interconnection of their networks. All Network Operations Forum (NOF) adopted standards shall be adhered to. Where available, CenturyLink signaling services to link its Signaling Transfer Points (STPs) for CLEC switches which connect to CenturyLink’s STPs via “A” links or for CLEC’s STPs to connect to CenturyLink’s STPs via “D” links which are dedicated to the transport of signaling for local Interconnection, may be ordered from the CenturyLink Tariff.

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Monitoring System In each case in which the Custodian has exercised delegated authority to place Assets with a Foreign Custodian, the Custodian shall establish a system, to re-assess or re-evaluate selected Foreign Custodians, at least annually in accordance with Rule 17f-5(c)(3).

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Evaluation, Testing, and Monitoring 1. The System Agency may review, test, evaluate and monitor Grantee’s Products and services, as well as associated documentation and technical support for compliance with the Accessibility Standards. Review, testing, evaluation and monitoring may be conducted before and after the award of a contract. Testing and monitoring may include user acceptance testing. Neither the review, testing (including acceptance testing), evaluation or monitoring of any Product or service, nor the absence of review, testing, evaluation or monitoring, will result in a waiver of the State’s right to contest the Grantee’s assertion of compliance with the Accessibility Standards. 2. Grantee agrees to cooperate fully and provide the System Agency and its representatives timely access to Products, records, and other items and information needed to conduct such review, evaluation, testing, and monitoring.

  • Review Protocol A narrative description of how the Claims Review was conducted and what was evaluated.

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Maintenance Manual No later than 60 (sixty) days prior to the Project Completion Date, the Contractor shall, in consultation with the Authority’s Engineer, evolve a maintenance manual (the “Maintenance Manual”) for the regular and preventive maintenance of the Project Highway in conformity with the Specifications and Standards, safety requirements and Good Industry Practice, and shall provide 5 (five) copies thereof to the Authority’s Engineer. The Authority’s Engineer shall review the Maintenance Manual within 15 (fifteen) days of its receipt and communicate its comments to the Contractor for necessary modifications, if any.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Testing Procedures Testing will be conducted by an outside certified Agency in such a way to ensure maximum accuracy and reliability by using the techniques, chain of custody procedures, equipment and laboratory facilities which have been approved by the U.S. Department of Health and Human Services. All employees notified of a positive controlled substance or alcohol test result may request an independent test of their split sample at the employee’s expense. If the test result is negative the Employer will reimburse the employee for the cost of the split sample test.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!