Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.
Compliance with Consensus Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-‐policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”).
Rights Protection Mechanisms and Abuse Mitigation ‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.
Individual Flexibility Arrangements 38.1 Where the Employer wants to enter into a individual flexibility arrangement (IFA) it must provide a written proposal to the Employee. Where the Employee’s understanding of written English is limited, the Employer must take measures, including translation into an appropriate language, to ensure the Employee understands the proposal. 38.2 The Employer and an Employee covered by this Agreement may agree to make an IFA to vary the effect of terms of the Agreement if: (a) it deals with one or more of the following matters: (i) Time between which ordinary hours are worked; (ii) Salary sacrifice Agreements; (iii) Reduction in ordinary hours; (iv) Increase in annual leave accrual each year; (v) Increase in rate of accrual of Rostered days off; (vi) Increase in wages; (vii) Increase in training leave (Union or otherwise); (b) The IFA meets the genuine needs of the Employer and the Employee covered by this Agreement in relation to one or more of the matters mentioned in paragraph (a) above; and (c) The IFA is genuinely agreed to by the Employer and the Employee. 38.3 The Employer must ensure that the terms of the IFA: (a) are about permitted matters under section 172 of the FW Act; and (b) are not unlawful terms under section 194 of the FW Act; and (c) result in the Employee being better off overall than the Employee would be if no IFA was made. 38.4 The Employer must also ensure that any such IFA is: (a) in writing (including details of the terms that will be varied, how the IFA will vary the effect of the Enterprise Agreement terms, how the Employee will be better off overall in relation to the terms and conditions of his or her employment as a result of the IFA, and the day on which the IFA commences); (b) includes the name of the Employer and Employee; (c) signed by the Employer and the Employee, and if the Employee is under 18, by a parent or guardian of the Employee; and (d) provided to the Employee within 14 days after it is agreed to. 38.5 The Employer or Employee may terminate the IFA by either the Employer or Employee giving written notice of not more than 28 days, or at any time by both parties agreeing in writing. 38.6 Where any of the requirements of ss 202 and 203 of the FW Act are not met, the IFA is of no effect.
Coverage Types and Policy Limits The types of coverage and policy limits required from the Contractor are specified in Paragraph B Insurance Requirements below.
Subproviders and Suppliers List Pursuant to requirements of 43 Texas Administrative Code §9.350 et seq., the Engineer must provide the State a list (Exhibit H-5/DBE or Exhibit H-6/HUB) of all Subproviders and suppliers that submitted quotes or proposals for subcontracts. This list shall include subproviders and suppliers names, addresses, telephone numbers, and type of work desired.
Service Level Agreements If a Service or a Plan includes a Service Level Agreement (SLA): (a) we are liable for any remedy or rebate specified by the SLA; and (b) subject to clauses 40 to 42, and to the express terms of the SLA, our liability for breach of the SLA is limited to such remedy or rebate.
Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.
Compliance with Federal and State Work Authorization and Immigration Laws The Contractor and all subcontractors, suppliers and consultants must comply with all federal and state work authorization and immigration laws, and must certify compliance using the form set forth in Section 7 (“Georgia Security and Immigration Compliance Act Affidavits”). The required certificates must be filed with the Owner and copied maintained by the Contractor as of the beginning date of this contract and each subcontract, supplier contract, or consultant contract, and upon final payment to the subcontractor or consultant. State officials, including officials of the Georgia Department of Audits and Accounts, officials of the Owner, retain the right to inspect and audit the Project Site and employment records of the Contractor, subcontractors and consultants without notice during normal working hours until Final Completion, and as otherwise specified by law and by Rules and Regulations of the Georgia Department of Audits and Accounts.
CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.