Cooperation on forestry matters and environmental protection 1. The aims of cooperation on forestry matters and environmental protection will be, but not limited to, as follows: (a) establishing bilateral cooperation relations in the forestry sector; (b) developing a training program and studies for sustainable management of forests; (c) improving the rehabilitation and sustainable management of forest with the aim of increasing carbon sinks and reduce the impact of climate change in the Asia-Pacific region; (d) cooperating on the execution of national projects, aimed at: improving the management of forest plantations for its transformation for industrial purposes and environmental protection; (e) elaborating studies on sustainable use of timber; (f) developing new technologies for the transformation and processing of timber and non-timber species; and (g) improving cooperation in agro-forestry technologies. 2. To achieve the objectives of the Article 149 (Objectives), the Parties may focus, as a means of cooperation and negotiations on concluding a bilateral agreement on forestry cooperation between the two Parties. Such collaboration will be as follows: (a) exchanges on science and technology as well as policies and laws relating the sustainable use of forest resources; (b) cooperation in training programs, internships, exchange of experts and projects advisory; (c) advice and technical assistance to public institutions and organizations of the Parties on sustainable use of forest resources and environmental protection; (d) facilitating forest policy dialogue and technical cooperation under the Network of Sustainable Forest Management and Forest Rehabilitation in Asia- Pacific Region, initiated at the 15th Asia Pacific Economic Cooperation (APEC) Meeting; (e) encouraging joint studies, working visits, exchange of experiences, among others; and (f) others activities mutually agreed.
Xxxxxxx Xxxxxxx/Market Abuse Laws You acknowledge that, depending on your country or broker’s country, or the country in which Common Stock is listed, you may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect your ability to accept, acquire, sell or attempt to sell, or otherwise dispose of the shares of Common Stock, rights to shares of Common Stock (e.g., RSUs) or rights linked to the value of Common Stock, during such times as you are considered to have “inside information” regarding the Company (as defined by the laws or regulations in applicable jurisdictions, including the United States and your country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders you placed before possessing inside information. Furthermore, you may be prohibited from (i) disclosing insider information to any third party, including fellow employees and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. You acknowledge that it is your responsibility to comply with any applicable restrictions, and you should speak to your personal advisor on this matter.
Xxxxxxx Xxxxxxx Restrictions/Market Abuse Laws The Participant acknowledges that, depending on his or her country, the broker’s country, or the country in which the Shares are listed, the Participant may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect his or her ability to accept, acquire, sell, or attempt to sell or otherwise dispose of Shares or rights to Shares (e.g., Restricted Share Units), or rights linked to the value of Shares, during such times as he or she is considered to have “inside information” regarding the Company (as defined by applicable laws or regulations in the applicable jurisdictions, including the United States and the Participant’s country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders the Participant placed before possessing inside information. Furthermore, the Participant may be prohibited from (i) disclosing the inside information to any third party, including fellow employees (other than on a “need to know” basis) and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. The Participant acknowledges that it is his or her responsibility to comply with any applicable restrictions, and the Participant should consult his or her personal advisor on this matter.
Criminal Records Bureau Checks The Academy shall comply with the requirements of paragraph 4 of the Schedule to the Education (Independent School Standards) (England) Regulations 2003 (as amended) in relation to carrying out enhanced criminal records checks, obtaining enhanced criminal records certificates and making any further checks, as required and appropriate for members of staff, supply staff, individual Governors and the Chair of the Governing Body.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
XXXXXXXX FAIR EMPLOYMENT PRINCIPLES In accordance with the XxxXxxxx Fair Employment Principles (Chapter 807 of the Laws of 1992), the Contractor hereby stipulates that the Contractor either (a) has no business operations in Northern Ireland, or (b) shall take lawful steps in good faith to conduct any business operations in Northern Ireland in accordance with the XxxXxxxx Fair Employment Principles (as described in Section 165 of the New York State Finance Law), and shall permit independent monitoring of compliance with such principles.
Clean Air Act and Federal Water Pollution Control Act The contractor agrees to comply with all applicable standards, orders or regulations issued pursuant to the Clean Air Act, as amended, 42 U.S.C. § 7401 et seq.
DOMICILIUM CITANDI ET EXECUTANDI 37.1 The Parties and the Participants choose as their domicilia citandi et executandi for all purposes under this Trust Deed, whether in respect of court process, notices or other documents or communications of whatsoever nature, the following addresses and fax numbers and email addresses – 37.1.1 The Company and the Trustees: Harmony Xxxxxx Xxxx, xxx Xxxx Xxxx Xxxx xxx Xxxx Xxxxxx, Randfontein, 1759; Telefax: +00 (0)00 000-0000; email: xxxxx.xxxxxxxxx@xxxxxxx.xx.xx; 37.1.2 Each Participant: the address, telefax number and email address (if any) notified by the Participant to the Company or the Trustees in writing from time to time. 37.2 Any notice or communication required or permitted to be given in terms of this Trust Deed shall be valid and effective only if in writing and, unless otherwise provided by the Trustees, it shall be competent to give notice by telefax and e-mail. 37.3 Any of the parties may by notice to the other parties change the physical address chosen as its domicilium citandi et executandi vis-à-vis that party to another physical address in South Africa or its telefax number, provided that the change shall become effective vis-à-vis that addressee on the fourth business day from the deemed receipt of the notice by the addressee. 37.4 Any notice to a party – 37.4.1 sent by prepaid registered post (by airmail if appropriate) in a correctly addressed envelope to it at its domicilium citandi et executandi shall be deemed to have been received on the 10th (tenth) business day after posting (unless the contrary is proved); 37.4.2 delivered by hand to a responsible person during ordinary business hours at its domicilium citandi et executandi shall be deemed to have been received on the day of delivery; or 37.4.3 sent by telefax or email to its chosen telefax number or email address referred to in clause 37.1.1, shall be deemed to have been received on the date of dispatch (unless the contrary is proved). 37.5 Notwithstanding anything to the contrary herein contained a written notice or communication actually received by a party shall be an adequate written notice or communication to it notwithstanding that it was not sent to or delivered at its chosen domicilium citandi et executandi.
Joint Funded Project with the Ohio Department of Transportation In the event that the Recipient does not have contracting authority over project engineering, construction, or right-of-way, the Recipient and the OPWC hereby assign certain responsibilities to the Ohio Department of Transportation, an authorized representative of the State of Ohio. Notwithstanding Sections 4, 6(a), 6(b), 6(c), and 7 of the Project Agreement, Recipient hereby acknowledges that upon notification by the Ohio Department of Transportation, all payments for eligible project costs will be disbursed by the Grantor directly to the Ohio Department of Transportation. A Memorandum of Funds issued by the Ohio Department of Transportation shall be used to certify the estimated project costs. Upon receipt of a Memorandum of Funds from the Ohio Department of Transportation, the OPWC shall transfer funds directly to the Ohio Department of Transportation via an Intra- State Transfer Voucher. The amount or amounts transferred shall be determined by applying the Participation Percentages defined in Appendix D to those eligible project costs within the Memorandum of Funds. In the event that the Project Scope is for right-of-way only, notwithstanding Appendix D, the OPWC shall pay for 100% of the right-of-way costs not to exceed the total financial assistance provided in Appendix C.
Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.