MONITORING TRAIL USE Sample Clauses

MONITORING TRAIL USE. In cooperation and consultation with the STATE, the CLUB shall monitor snowmobile usage on the TRAIL to ensure that the ecological conditions are not substantially diminished or degraded by snowmobile use and that snowmobile use is limited to the designated TRAIL and is done in compliance with current State laws, administrative rules and this MOA. The STATE and the CLUB agree to meet at least annually, before November 15, and more often at the request of either party, to discuss snowmobile use issues that may develop and to consider TRAIL management options.
AutoNDA by SimpleDocs
MONITORING TRAIL USE. In cooperation and consultation with the STATE, the CONTRACTOR shall monitor snowmobile usage on the TRAIL to ensure that the ecological conditions are not substantially diminished or degraded by snowmobile use and that snowmobile use is limited to the designated TRAIL and is done in compliance with current State laws, administrative rules and this AGREEMENT. The STATE and the CONTRACTOR agree to meet at least annually, before November 15th and more often at the request of either party, to discuss the Annual Work Plan, upcoming CONTRACTOR events and to include any snowmobile use issues that may develop and to consider TRAIL management options.

Related to MONITORING TRAIL USE

  • Server Use This agreement does not permit you to install or Use the Software on a computer file server. For information on Use of Software on a computer file server please refer to xxxx://xxx.xxxxx.xxx/go/acrobat_distribute for information about Adobe Reader; or xxxx://xxx.xxxxx.xxx/go/licensing for information about the Adobe Runtimes.

  • Travelling, Transport and Fares (a) An employee required and authorised to use their own motor vehicle in the course of their duties will be paid not less than the allowance set out in item 21 in Table 2.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Monitoring and Inspection The Interconnected Transmission Owner may monitor construction and installation of Interconnection Facilities that the Interconnection Customer is constructing. Upon reasonable notice, authorized personnel of the Interconnected Transmission Owner may inspect any or all of such Interconnection Facilities to assess their conformity with Applicable Standards.

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

  • Alcohol Use Alcohol use is the consumption of any beverage, mixture or preparation including any medication containing alcohol.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.

  • Access, Use, Monitoring and Inspection Site shall provide original or copies (as the case may be) of all Study Data to Quintiles and Sponsor for Sponsor’s use. Site shall afford Sponsor and Quintiles and their representatives and designees reasonable access to Site’s facilities and to Medical Records and Study Data so as to permit Sponsor and Quintiles and their representatives and designees to monitor the Study. 1.3.3.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

Time is Money Join Law Insider Premium to draft better contracts faster.