Information Acquisition Connecting Transmission Owner and Developer shall each submit specific information regarding the electrical characteristics of their respective facilities to the other, and to NYISO, as described below and in accordance with Applicable Reliability Standards.
Course Curriculum, Instruction, and Grading X. Xxxx College courses offered as dual credit, regardless of where they are taught, follow the same syllabus, course outline, textbook, grading method, and other academic policies as the courses outlined in the Hill College catalog. B. Approved courses being taught for dual credit must follow the approved master syllabus of the discipline and of Hill College. C. Textbooks should be identical to those approved for use by Hill College. Should an instructor propose an alternative textbook, the textbook must be approved in advance by the appropriate instructional department of Hill College and the Vice President of Instruction. Other instructional materials for dual credit/concurrent courses must be identical or at an equivalent level to materials used by Hill College. D. Courses which result in college‐level credit will follow the standard grading practices of Hill College, as identified by college policy and as identified in the appropriately approved course syllabus. The grades used in college records are A (excellent), B (above average), C (average), D (below average), F (failure), I (incomplete), W (withdrawn), WC (withdrawn COVID). The lowest passing grade is D. Grade point averages are computed by assigning values to each grade as follows: A = 4 points, B = 3 points, C = 2 points, D = 1 point, and F = 0 points. Grading criteria may be devised by Hill College and the ISD to allow faculty the opportunity to award high school credit only or high school and college credit depending upon student performance. E. Faculty, who are responsible for teaching dual credit/concurrent classes, are responsible for keeping appropriate records, certifying census date rosters, providing interim grade reports, certifying final grade reports at the end of the semester, certifying attendance, and providing other reports and information as may be required by Hill College and/or the School District.
SMALL BUSINESS PARTICIPATION AND DVBE PARTICIPATION REPORTING REQUIREMENTS a. If for this Contract Contractor made a commitment to achieve small business participation, then Contractor must within 60 days of receiving final payment under this Contract (or within such other time period as may be specified elsewhere in this Contract) report to the awarding department the actual percentage of small business participation that was achieved. (Govt. Code § 14841.) b. If for this Contract Contractor made a commitment to achieve disabled veteran business enterprise (DVBE) participation, then Contractor must within 60 days of receiving final payment under this Contract (or within such other time period as may be specified elsewhere in this Contract) certify in a report to the awarding department: (1) the total amount the prime Contractor received under the Contract; (2) the name and address of the DVBE(s) that participated in the performance of the Contract; (3) the amount each DVBE received from the prime Contractor; (4) that all payments under the Contract have been made to the DVBE; and (5) the actual percentage of DVBE participation that was achieved. A person or entity that knowingly provides false information shall be subject to a civil penalty for each violation. (Mil. & Vets. Code § 999.5(d); Govt. Code § 14841.)
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Ownership and Operations of Merger Sub Parent owns beneficially and of record all of the outstanding capital stock of Merger Sub. Merger Sub was formed solely for the purpose of engaging in the Transactions, has engaged in no other business activities and has conducted its operations only as contemplated hereby.
Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.
Permitted and Required Uses/Disclosures of PHI 3.1 Except as limited in this Agreement, Business Associate may use or disclose PHI to perform Services, as specified in the underlying grant or contract with Covered Entity. The uses and disclosures of Business Associate are limited to the minimum necessary, to complete the tasks or to provide the services associated with the terms of the underlying agreement. Business Associate shall not use or disclose PHI in any manner that would constitute a violation of the Privacy Rule if used or disclosed by Covered Entity in that manner. Business Associate may not use or disclose PHI other than as permitted or required by this Agreement or as Required by Law. 3.2 Business Associate may make PHI available to its employees who need access to perform Services provided that Business Associate makes such employees aware of the use and disclosure restrictions in this Agreement and binds them to comply with such restrictions. Business Associate may only disclose PHI for the purposes authorized by this Agreement: (a) to its agents and Subcontractors in accordance with Sections 9 and 17 or, (b) as otherwise permitted by Section 3. 3.3 Business Associate shall be directly liable under HIPAA for impermissible uses and disclosures of the PHI it handles on behalf of Covered Entity, and for impermissible uses and disclosures, by Business Associate’s Subcontractor(s), of the PHI that Business Associate handles on behalf of Covered Entity and that it passes on to Subcontractors.
LOCATION AND DESCRIPTION OF THE PROPERTY The subject property is a single-storey terraced house bearing the postal address of Xx. 00, Xxxxxx 00/XX0, Xxxxxx Xxxxx Xxxxxxx, 00000 Xxxxxxx Xxxxx, Xxxxxx. The subject property will be sold on an “as is where is basis” and subject to a reserve price of RM310,000.00 (RINGGIT MALAYSIA THREE HUNDRED TEN THOUSAND ONLY) and subject to the Conditions of Sale and by way of an Assignment from the above Assignee/Bank subject to the consent being obtained by the Purchaser from the Developer and other relevant authorities if any, including all terms, conditions, stipulations and covenants which were and may be imposed by the Developer and the relevant authorities. Any arrears of quit rent, assessments and service or maintenance charges which may be lawfully due to any relevant authority or the Developer up to the date of auction sale of the property shall be paid out of the purchase money upon receipt of full purchase price. All other fees, costs and charges relating to the transfer and assignment of the property shall be borne by the successful Purchaser. Online bidders are further subject to the Terms & Conditions on xxx.xxxxxxxxxxxxxxxx.xxx. All intending bidders are required to deposit 10% of the fixed reserve price for the said property by Bank Draft or Cashier’s Order in favour of UOBM for KRISHNAMAL A/P MURLIGIAH & XXXXXXXXXXX A/L XXXXXXX or remit the same through online banking transfer, one (1) working day before auction date. The balance of the purchase money shall be paid by the Purchaser within one hundred and twenty (120) days from the date of auction sale to UNITED OVERSEAS BANK (MALAYSIA) BHD via Real Time Electronics Transfer of Funds and Securities (XXXXXX). For online bidders please refer to the Terms & Conditions on xxx.xxxxxxxxxxxxxxxx.xxx on the manner of payment of the deposit. FOR FURTHER PARTICULARS, please contact M/S HOE & MOIRA, of Xxxxx 000X (Xxxxx), 0xx Xxxxx, Xxxxx Xxxxxx Xxxxxx, Xxxxxxxxxx Xxxx, 00000 Xxxxxx, Xxxxxxxx. (Ref:H&M/MT/Z4P/CB23/16) Tel.: 00-000 0000, Fax: 00-000 0000) the Assignee herein or the undermentioned Auctioneer. Suite C-20-3A, Level 20, Block C, Megan Avenue II, / XXXXX XXXXX BIN XXXXXX 00, Xxxxx Xxx Xxxx Xxxx, 50450 Kuala Lumpur (Licensed Auctioneers) Tel No.: 00-0000 0000 Fax No.: 00-0000 0000 Our Ref: LIAN/UOB1035HM Website: xxx.xxxxxxxxxxxxxxxx.xxx E-mail: xxxx@xxxxxxxxxxxxxxxx.xxx [berkuatkuasa dari 1.11.2022, perniagaan perbankan pengguna (consumer banking business) CITIBANK BERHAD (No. Syarikat: 199401011410 (297089-M) telah dipindahmilik kepada xxx diletakhakkan kepada UOB di bawah Perintah Letakhak bertarikh 12.10.2022 melalui Mahkamah Tinggi Kuala Lumpur Saman Pemula No. WA-24NCC-903-09/2022] Dalam menjalankan xxx xxx kuasa xxxx telah diberikan kepada Pihak Pemegang Serahhak/Bank dibawah Perjanjian Kemudahan, Penyerahanhak xxx Surat Kuasa Wakil kesemuanya Bertarikh 09hb Julai, 2001 diantara Pihak Penyerahhak, Pihak Pelanggan xxx Pihak Pemegang Serahhak/Bank yang diperbuat dalam perkara diatas, adalah dengan ini diisytiharkan bahawa Pihak Pemegang Serahhak/Bank tersebut dengan bantuan Pelelong yang tersebut dibawah.
Certain Requirements in Respect of Combination, etc USCo shall not complete any transaction (whether by way of reconstruction, reorganization, consolidation, merger, transfer, sale, lease or otherwise) whereby all or substantially all of its undertaking, property and assets would become the property of any other person or, in the case of a merger, of the continuing entity resulting therefrom unless, and may do so if: (a) such other person or continuing entity (herein called the "USCo Successor"), by operation of law, becomes, without more, bound by the terms and provisions of this Agreement or, if not so bound, executes, prior to or contemporaneously with the consummation of such transaction, an agreement supplemental hereto and such other instruments (if any) as are reasonably necessary or advisable to evidence the assumption by the USCo Successor of liability for all moneys payable and property deliverable hereunder and the covenant of such USCo Successor to pay and deliver or cause to be delivered the same and its agreement to observe and perform all the covenants and obligations of USCo under this Agreement; and (b) such transaction shall be upon such terms and conditions as substantially to preserve and not to impair in any material respect any of the rights, duties, powers and authorities of the other parties hereunder.
Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Certification Regarding Prohibition of Boycotting Israel (Tex. Gov. Code 2271) 5 Certification Regarding Prohibition of Contracts with Certain Foreign-Owned Companies (Tex. Gov. 5 Code 2274) 5 Certification Regarding Prohibition of Discrimination Against Firearm and Ammunition Industries (Tex.