TECHNICAL EVALUATION (a) Detailed technical evaluation shall be carried out by Purchase Committee pursuant to conditions in the tender document to determine the substantial responsiveness of each tender. For this clause, the substantially responsive bid is one that conforms to all the eligibility and terms and condition of the tender without any material deviation. The Institute’s determination of bid’s responsiveness is to be based on the contents of the bid itself without recourse to extrinsic evidence. The Institute shall evaluate the technical bids also to determine whether they are complete, whether required sureties have been furnished, whether the documents have been properly signed and whether the bids are in order. (b) The technical evaluation committee may call the responsive bidders for discussion or presentation to facilitate and assess their understanding of the scope of work and its execution. However, the committee shall have sole discretion to call for discussion / presentation. (c) Financial bids of only those bidders who qualify the technical criteria will be opened provided all other requirements are fulfilled. (d) AIIMS Jodhpur shall have right to accept or reject any or all tenders without assigning any reasons thereof.
Technical Feasibility of String While ICANN has encouraged and will continue to encourage universal acceptance of all top-‐level domain strings across the Internet, certain top-‐level domain strings may encounter difficulty in acceptance by ISPs and webhosters and/or validation by web applications. Registry Operator shall be responsible for ensuring to its satisfaction the technical feasibility of the TLD string prior to entering into this Agreement.
Final Evaluation IC must submit a final report and a project evaluation to the Arts Commission within thirty (30) days after the completion of the Services. Any and all unexpended funds from IC must be returned to City no later than sixty (60) days after the completion of the Services.
Minimum Site Requirements for TIPS Sales (when applicable to TIPS Sale). Cleanup: When performing work on site at a TIPS Member’s property, Vendor shall clean up and remove all debris and rubbish resulting from their work as required or directed by the TIPS Member or as agreed by the parties. Upon completion of work, the premises shall be left in good repair and an orderly, neat, clean and unobstructed condition. Preparation: Vendor shall not begin a project for which a TIPS Member has not prepared the site, unless Vendor does the preparation work at no cost, or until TIPS Member includes the cost of site preparation in the TIPS Sale Site preparation includes, but is not limited to: moving furniture, installing wiring for networks or power, and similar pre‐installation requirements. Registered Sex Offender Restrictions: For work to be performed at schools, Vendor agrees that no employee of Vendor or a subcontractor who has been adjudicated to be a registered sex offender will perform work at any time when students are, or reasonably expected to be, present unless otherwise agreed by the TIPS Member. Vendor agrees that a violation of this condition shall be considered a material breach and may result in the cancellation of the TIPS Sale at the TIPS Member’s discretion. Vendor must identify any additional costs associated with compliance of this term. If no costs are specified, compliance with this term will be provided at no additional charge. Safety Measures: Vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage. Smoking: Persons working under Agreement shall adhere to the TIPS Member’s or local smoking statutes, codes, ordinances, and policies.
PROGRESS EVALUATION Engineer shall, from time to time during the progress of the Engineering Services, confer with County at County’s election. Engineer shall prepare and present such information as may be pertinent and necessary, or as may be reasonably requested by County, in order for County to evaluate features of the Engineering Services. At the request of County or Engineer, conferences shall be provided at Engineer's office, the offices of County, or at other locations designated by County. When requested by County, such conferences shall also include evaluation of the Engineering Services. County may, from time to time, require Engineer to appear and provide information to the Williamson County Commissioners Court. Should County determine that the progress in Engineering Services does not satisfy an applicable Work Authorization or any Supplemental Work Authorization related thereto, then County shall review same with Engineer to determine corrective action required. Engineer shall promptly advise County in writing of events which have or may have a significant impact upon the progress of the Engineering Services, including but not limited to the following: A. Problems, delays, adverse conditions which may materially affect the ability to meet the objectives of an applicable Work Authorization or any Supplemental Work Authorization related thereto, or preclude the attainment of Project Engineering Services units by established time periods; and such disclosure shall be accompanied by statement of actions taken or contemplated, and County assistance needed to resolve the situation, if any; and B. Favorable developments or events which enable meeting goals sooner than anticipated in relation to an applicable Work Authorization’s or any Supplemental Work Authorization related thereto.
Student Evaluations Student evaluations shall be completed by the end of the 12th week of the Fall semester.
Annual Evaluations The purpose of the annual evaluation is to assess and communicate the nature and extent of an employee's performance of assigned duties consistent with the criteria specified below in this Policy. Except for those employees who have received notice of non-reappointment pursuant to the BOT- UFF Policy on Non- reappointment, every employee shall be evaluated at least once annually. Personnel decisions shall take such annual evaluations into account, provided that such decisions need not be based solely on written faculty performance evaluations.
Student Evaluation a. The President of the College or the President’s designee shall be responsible for administering the student evaluation process. b. Student evaluation packets for each class containing instruments and instructions shall be distributed to each faculty member by the first week of December during the fall semester and by the last week in April during the spring semester. c. It is expressly agreed that the faculty member being evaluated shall not be present in the classroom when the student evaluation is being administered and that all instruction to students with regard to such student evaluation shall be included in writing on the instrument, provided further that the designated unit or non-unit professional shall return the student evaluation directly to the President of the College or the President’s designee. The administering of the student evaluation shall be the responsibility of the President of the College or the President’s designee who shall determine who among unit or non-unit professionals shall administer such student evaluation. Student evaluations shall be valid only if signed by the student; provided, however, that faculty members shall not be entitled to the identity of the student responding unless such student evaluation is used as a basis for dismissal or other disciplinary action and such will be communicated to the students. d. The data from the student evaluation shall be tabulated and copies sent to the President of the College or the President’s designee. The raw data shall be retained by the College for a period of one (1) year during which time the faculty member shall have access thereto upon written request. e. The President of the College or the President’s designee shall review the tabulated data and shall forward a data summary to the faculty member by January 23 for the fall semester and by June 15 for the spring semester. f. The faculty member shall have seven (7) working days in which to respond to such data.
JOC EVALUATION If any materials being utilized for a project cannot be found in the RS Means Price Book, this question is what is the markup percentage on those materials? When answering this question please insert the number that represents your percentage of proposed markup. Example: if you are proposing a 30 percent markup, please insert the number "30". Remember that this is a ceiling markup. You may markup a lesser percentage to the TIPS Member customer when pricing the project, but not a greater percentage. EXAMPLE: You need special materials that are not in the RS Means Unit Price Book for a project. You would buy the materials and xxxx them up to the TIPS Member customer by the percentage you propose in this question. If the materials cost you, the contractor, $100 and you proposed a markup on this question for the material of 30 percent, then you would charge the TIPS Member customer $130 for the materials. TIPS/ESC Region 8 is required by Texas Government Code § 791 to be compensated for its work and thus, failure to agree shall render your response void and it will not be considered. Vendor agrees to remit to TIPS the required administration fee or, if resellers are named, guarantee the fee remittance by or for the reseller named by the vendor?
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.